Sort by
Refine Your Search
-
Category
-
Employer
-
Field
-
. Preference is given to candidates who already have knowledge of programming languages such as Java and JavaScript, with particular emphasis on technologies like Spring, VueJS, or NodeJS. Contest Procedure
-
refine, formalize, and extend an existing perturbation methodology to construct a principled, security-aware dataset of real-world vulnerable and secure JavaScript code. The work plan includes: 1
-
JavaScript code using contrastive learning with a tailored security-aware loss function. The student will fine-tune selected models using secure-insecure code pairs derived from Tasks 1 and 2 and evaluate
-
insecure JavaScript code from open-source repositories. Identify and label security-related commits using diff-based analysis. Integrate synthetic data generation (e.g., AST-based vulnerability injection
-
utilizing modern programming tools and languages tailored to the project's requirements (e.g., Python, JavaScript, Django, among others). The activities may also include testing and validation on both