2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES) 2017
DOI: 10.1109/iesys.2017.8233558
|View full text |Cite
|
Sign up to set email alerts
|

Convolutional neural networks on assembly code for predicting software defects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(20 citation statements)
references
References 17 publications
0
20
0
Order By: Relevance
“…However, their results were not as good as results for Li's model [24]. There is also research on deep defect prediction targeting assembly code [54,55], both of which leveraged a CNN model to learn from assembly instructions.…”
Section: Defect Prediction Based On Deep Featuresmentioning
confidence: 95%
“…However, their results were not as good as results for Li's model [24]. There is also research on deep defect prediction targeting assembly code [54,55], both of which leveraged a CNN model to learn from assembly instructions.…”
Section: Defect Prediction Based On Deep Featuresmentioning
confidence: 95%
“…Guo et al [31] presented a solution that utilizes recurrent neural network models to perform software traceability. In addition, deep learning models have also been used in vulnerability detection [25], [26], bug localization [23], [24], defect prediction on assembly code [54], [55], etc.…”
Section: B Deep Learning and Software Engineeringmentioning
confidence: 99%
“…Each nonleaf node holds a vector θ that has the same dimension as the word vector. After providing the central word w context projection x w as input, the formula for predicting the conditional probability of the word w is show in (1) and (2).…”
Section: Hierarchical Softmaxmentioning
confidence: 99%
“…We used the open-source Python project called javalang [29] as the tool to parse the Java code in the PROMISE library into the AST. Following Phan et al 's research [2], we pick only three types of AST nodes as tokens: The first type is nodes associated with class instantiation and method invocation; we use their method name or class name as token. The second type is declare nodes, such as method declarations, type declarations, interface declarations and enumeration declarations.…”
Section: B Parsing Source Code and Select Ast Node We Needmentioning
confidence: 99%