2019
DOI: 10.1109/tfuzz.2019.2958558
|View full text |Cite
|
Sign up to set email alerts
|

DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
32
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 67 publications
(44 citation statements)
references
References 48 publications
1
32
0
Order By: Relevance
“…Another difficulty in vulnerability prediction is the class imbalance prob-lem, arising from the fact that the number of vulnerable code samples is far less than the number of healthy code samples, which makes it hard to perform good prediction performance without giving too many false alarms. In this sense, the study [29] deals with the class imbalance problem in ML-based vulnerability detection approaches, and proposes a fuzzy oversampling method to balance the training data by generating synthetic samples for the minority class (i.e. vulnerable code samples).…”
Section: Related Workmentioning
confidence: 99%
“…Another difficulty in vulnerability prediction is the class imbalance prob-lem, arising from the fact that the number of vulnerable code samples is far less than the number of healthy code samples, which makes it hard to perform good prediction performance without giving too many false alarms. In this sense, the study [29] deals with the class imbalance problem in ML-based vulnerability detection approaches, and proposes a fuzzy oversampling method to balance the training data by generating synthetic samples for the minority class (i.e. vulnerable code samples).…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the proposed technique means is applicable. Moreover, with regard to malware and vulnerability detection, the proposed attack method is applicable, because the method bypasses detection in the way of detecting malicious code or vulnerabilities presented by [15,16]. Specifically, this approach uses system-provided functions that are free from having vulnerabilities, so that an attack tool is not vulnerable or detected as malware.…”
Section: Usefulness Applicability and Performance Of The Proposed Tmentioning
confidence: 99%
“…However, this paper's detection granularity is not fine-grained enough to allow code inspectors to pinpoint the vulnerabilities related to specific code lines because it only works at the file level. The DBN used for learning semantic representations has motivated follow-up researchers to apply various types of neural networks for learning abstract feature representations for defect and vulnerability detection, such as [29], [35]- [37], [42], [47], [59]. Hence, expert-defined features are not the necessity when deep learning is involved.…”
Section: A Identifying Game Changersmentioning
confidence: 99%