Fault injection attacks represent a type of active, physical attack agai...
Masking is a widely-used effective countermeasure against power side-cha...
Due to the development of pre-trained language models, automated code
ge...
Automatic test generation can help verify and develop the behavior of mo...
A Dockerfile defines a set of instructions to build Docker images, which...
Deep learning has become a promising programming paradigm in software
de...
Pre-trained code generation models (PCGMs) have been widely applied in n...
Recent work has shown that Just-In-Time (JIT) compilation can introduce
...
Regular expressions are a classical concept in formal language theory.
R...
Deep neural networks (DNNs) have shown remarkable performance in a varie...
Verifying and explaining the behavior of neural networks is becoming
inc...
We provide a novel approach to synthesize controllers for nonlinear
cont...
Strings are widely used in programs, especially in web applications. Int...
Side-channel attacks, which are capable of breaking secrecy via side-cha...
In recent years, the Finger Texture (FT) has attracted considerable a...
Developers often need to use appropriate APIs to program efficiently, bu...
JavaScript has become one of the most widely used languages for Web
deve...
In the current mobile app development, novel and emerging DevOps practic...
Power side-channel attacks, which can deduce secret data via statistical...
Alternating-time temporal logics (ATL/ATL*) represent a family of modal
...
The design and implementation of decision procedures for checking path
f...
We identify difference-bound set constraints (DBS), an analogy of
differ...
In this paper, we study the parameter synthesis problem for a class of
p...
Recently, it was shown that any theory of strings containing the
string-...