Author:
Gribkov N. A.,Ovasapyan T. D.,Moskvin D. A.
Reference33 articles.
1. Gu, X., Zhang, H., and Kim, S., Deep code search, Proc. 40th Int. Conf. on Software Engineering, Gothenburg, Sweden, 2018, New York: Association for Computing Machinery, 2018, pp. 933–944. https://doi.org/10.1145/3180155.3180167
2. McMillan, C., Grechanik, M., Poshyvanyk, D., Xie, Q., and Fu, C., Portfolio: Finding relevant functions and their usage, Proc. 33rd Int. Conf. on Software Engineering, Waikiki, Honolulu, Hawaii, 2011, New York: Association for Computing Machinery, 2011, pp. 111–120. https://doi.org/10.1145/1985793.1985809
3. Open Source Security and Analysis Report | Synopsys. https://www.synopsys.com/software-integrity/resources/analyst-reports/open-source-security-risk-analysis.html. Cited April 14, 2023.
4. State of Open Source Security 2022. https://snyk.io/reports/open-source-security/. Cited April 14, 2023.
5. Ovasapyan, T.D., Knyazev, P.V., and Moskvin, D.A., Automated search for vulnerabilities in ARM software using dynamic symbolic execution, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 932–940. https://doi.org/10.3103/s014641162108023x