2018 10th International Conference on Advanced Infocomm Technology (ICAIT) 2018
DOI: 10.1109/icait.2018.8686548
|View full text |Cite
|
Sign up to set email alerts
|

CPGVA: Code Property Graph based Vulnerability Analysis by Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…Examples include ASTs, CFGs, PDGs, or a combined representation of graph‐like structures. Some examples of tools used to extract graph‐based representations from the source code files include Joern [71, 80, 87 ] and CodeSensor [14, 15, 19 ]. Graph‐based representations of source code use some form of abstract representation that preserves the semantic information along with the syntax.…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
See 4 more Smart Citations
“…Examples include ASTs, CFGs, PDGs, or a combined representation of graph‐like structures. Some examples of tools used to extract graph‐based representations from the source code files include Joern [71, 80, 87 ] and CodeSensor [14, 15, 19 ]. Graph‐based representations of source code use some form of abstract representation that preserves the semantic information along with the syntax.…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
“…The main idea behind the use of CPGs as a portable output feature is capturing the characteristics brought about by the representations mentioned above and offering the advantages as a single representation. To enhance the semantic information that can be gathered by code representations as features, a few of the surveyed works utilise CPGs [71, 80 ]. In order to generate CPGs, tools such a Joern [71, 80, 87 ] are utilised for C/C++ code. (d) Lexed representation of source code: Lexing is a process which involves the use of a lexer in order to generate useful features from raw source code.…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
See 3 more Smart Citations