10304 research outputs found
Sort by
Out of Sight, Out of Mind:Better Automatic Vulnerability Repair by Broadening Input Ranges and Sources
The advances of deep learning (DL) have paved the way for automatic software vulnerability repair approaches, which effectively learn the mapping from the vulnerable code to the fixed code. Nevertheless, existing DL-based vulnerability repair methods face notable limitations: 1) they struggle to handle lengthy vulnerable code, 2) they treat code as natural language texts, neglecting its inherent structure, and 3) they do not tap into the valuable expert knowledge present in the expert system. To address this, we propose VulMaster, a Transformer-based neural network model that excels at generating vulnerability repairs by comprehensively understanding the entire vulnerable code, irrespective of its length. This model also integrates diverse information, encompassing vulnerable code structures and expert knowledge from the CWE system. We evaluated VulMaster on a real-world C/C++ vulnerability repair dataset comprising 1,754 projects with 5,800 vulnerable functions. The experimental results demonstrated that VulMaster exhibits substantial improvements compared to the learning-based state-of-the-art vulnerability repair approach. Specifically, VulMaster improves the EM, BLEU, and CodeBLEU scores from 10.2% to 20.0%, 21.3% to 29.3%, and 32.5% to 40.9%, respectively
ZKP Enabled Identity and Reputation Verification in P2P Marketplaces
In the realm of Distributed Ledger Technology, privacy and regulatory challenges loom large for marketplaces. Regulation requires to conduct Know Your Customer (KYC) procedures to verify the identity of participants, while privacy concerns necessitate the protection of personal data. Current approaches to KYC are inefficient and are potentially even harmful to privacy due to centralization and data exposure.This paper proposes a zero-knowledge proof enabled KYC scheme, utilizing Soulbound Tokens (SBT) to create a discreet, compliant, and secure KYC process. We present a privacy-preserving mechanism that shares only essential information while adhering to Self-Sovereign Identity (SSI) principles, placing users in the full control of their data. The proposed scheme further introduces the usage of SBTs for reputation to incentivize good conduct and build trust within marketplaces
Scene-selectivity in CA1/subicular complex:Multivoxel pattern analysis at 7T
Prior univariate functional magnetic resonance imaging (fMRI) studies in humans suggest that the anteromedial subicular complex of the hippocampus is a hub for scene-based cognition. However, it is possible that univariate approaches were not sufficiently sensitive to detect scene-related activity in other subfields that have been implicated in spatial processing (e.g., CA1). Further, as connectivity-based functional gradients in the hippocampus do not respect classical subfield boundary definitions, category sensitivity may be distributed across anatomical subfields. Region-of-interest approaches, therefore, may limit our ability to observe category selectivity across discrete subfield boundaries. To address these issues, we applied searchlight multivariate pattern analysis to 7T fMRI data of healthy adults who undertook a simultaneous visual odd-one-out discrimination task for scene and non-scene (including face) visual stimuli, hypothesising that scene classification would be possible in multiple hippocampal regions within, but not constrained to, anteromedial subicular complex and CA1. Indeed, we found that the scene-selective searchlight map overlapped not only with anteromedial subicular complex (distal subiculum, pre/para subiculum), but also inferior CA1, alongside retrosplenial and parahippocampal cortices. Probabilistic overlap maps revealed gradients of scene category selectivity, with the strongest overlap located in the medial hippocampus, converging with searchlight findings. This was contrasted with gradients of face category selectivity, which had stronger overlap in more lateral hippocampus, supporting ideas of parallel processing streams for these two categories. Our work helps to map the scene, in contrast to, face processing networks within, and connected to, the human hippocampus