2019
DOI: 10.1109/access.2019.2923227
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks

Abstract: Thousands of vulnerabilities are discovered in programs every day, which is extremely harmful to software security. Thus, discovering vulnerabilities in projects has become a central issue. Facing a sustained growth of software complexity and large code size, manual code auditing becomes time-consuming and labor-intensive. With more open source programs available and a high degree of code formalization, it is possible to study features from source code to guide vulnerability discovery work. In this paper, we p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
1

Year Published

2020
2020
2025
2025

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(27 citation statements)
references
References 25 publications
0
24
1
Order By: Relevance
“…The discovery of these lines of code with a higher accuracy allows for the focus on those specific code lines since the probability of its vulnerability is higher. This vulnerability aspect is focused on by several of the surveyed papers [15, 17, 78–87 ] Table 7.…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
See 4 more Smart Citations
“…The discovery of these lines of code with a higher accuracy allows for the focus on those specific code lines since the probability of its vulnerability is higher. This vulnerability aspect is focused on by several of the surveyed papers [15, 17, 78–87 ] Table 7.…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
“…Among the reviewed works several of them use some form of RNNs. classical RNNs [86 ], long short‐term memory (LSTM) [16, 67, 69, 70, 73, 76, 83 ], contextual long short‐term memory (CLSTM) [72 ], bidirectional recurrent neural networks (BRNNs) [17, 74 ], bidirectional gated recurrent unit (BGRU) [83 ], and bidirectional long short‐term memory (BLSTM) [14, 15, 19, 77, 79, 82–85 ].…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
See 3 more Smart Citations