2020
DOI: 10.1016/j.infsof.2020.106289
|View full text |Cite
|
Sign up to set email alerts
|

BVDetector: A program slice-based binary code vulnerability intelligent detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(23 citation statements)
references
References 5 publications
0
23
0
Order By: Relevance
“…We compare the proposed system with the approaches presented in [35] (denoted as VulDeePecker) and [15] (denoted as BVDetector). VulDeePecke detects vulnerabilities at the source code level, while BVDetector detects vulnerabilities at the assembly code level.…”
Section: Resultmentioning
confidence: 99%
See 2 more Smart Citations
“…We compare the proposed system with the approaches presented in [35] (denoted as VulDeePecker) and [15] (denoted as BVDetector). VulDeePecke detects vulnerabilities at the source code level, while BVDetector detects vulnerabilities at the assembly code level.…”
Section: Resultmentioning
confidence: 99%
“…Liu et al [22] employed the attention mechanism on top of a bidirectional long short-term memory to detect assembly code vulnerabilities. Tian et al [15] extracted code slices from assembly codes in their vulnerability detection system. A summary of the above studies is presented in Table 1, where we have highlighted the key differences of different works.…”
Section: Vulnerability Detection By Assembly Codementioning
confidence: 99%
See 1 more Smart Citation
“…The source code of the smart contract is in unstructured form; thus, we need to learn the structure features of the smart contract code for better Ponzi scheme contract detection [ 48 , 49 , 50 ]. Therefore, instead of using the plain source code directly as the input of the model, we parse the source code into an Abstract Syntax Tree (AST) according to the ANTLR [ 51 ] syntax rules and then generate a Structure-Based Traversal (SBT) sequence from the AST using the SBT method [ 12 ].…”
Section: Smart Ponzi Scheme Detection Modelmentioning
confidence: 99%
“…the opcode and operand fragments, are encoded using a custom word2vec [16] model. BVDetector [20] operates based on pre-extracted program slices. It relies on a per-token word2vec encoding.…”
Section: Vulnerability Detection Using Assembly Language Representationsmentioning
confidence: 99%