2021
DOI: 10.1007/s00500-021-05994-w
|View full text |Cite
|
Sign up to set email alerts
|

Detecting vulnerability in source code using CNN and LSTM network

Abstract: Vulnerabilities can have very serious consequences for information security, with huge implications for economic, social, and even national security. Automated vulnerability detection has always been a keen topic for researchers. From traditional manual vulnerability mining to static detection and dynamic detection, all rely on human experts to define features. The rapid development of machine learning and deep learning has alleviated the tedious task of manually defining features by human experts while reduci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…Zagane et al [23] constructed a data set containing 16 code metrics from publicly available data sets and, unlike previous approaches using long-and shortterm memory networks and K-neighborhood algorithms, the proposed vulnerability detection model uses Multi-Layer Perceptron (MLP) for representation learning and achieves 76.9% accuracy in the real-world code metric data set. In addition, based on the existing code metric-based vulnerability detection, Guo et al [24] constructed a data set containing 21 code metrics, including two new complexity metrics, and proposed a compound deep learning-based vulnerability model VulExplore for this data set. e model obtained a precision of over 81% and reduced both the FNR and FPR to under 20%.…”
Section: Pattern-basedmentioning
confidence: 99%
“…Zagane et al [23] constructed a data set containing 16 code metrics from publicly available data sets and, unlike previous approaches using long-and shortterm memory networks and K-neighborhood algorithms, the proposed vulnerability detection model uses Multi-Layer Perceptron (MLP) for representation learning and achieves 76.9% accuracy in the real-world code metric data set. In addition, based on the existing code metric-based vulnerability detection, Guo et al [24] constructed a data set containing 21 code metrics, including two new complexity metrics, and proposed a compound deep learning-based vulnerability model VulExplore for this data set. e model obtained a precision of over 81% and reduced both the FNR and FPR to under 20%.…”
Section: Pattern-basedmentioning
confidence: 99%
“…Research has evolved from early applications of multi-layer perceptron (MLP) to more recent studies using CNNs or LSTMs, 42,43 and until recently using GNNs-based approaches. 44 The evolving network structure suggests that researchers have invested a significant amount of research effort to explore the potential of neural networks for semantic reasoning about code, as well as for facilitating rich patterns of vulnerability discovery.…”
Section: Deep Learning Modelsmentioning
confidence: 99%
“…Network models for vulnerability detection are becoming more sophisticated and expressive in order to better learn the code semantics of vulnerable code fragments, and to reduce the amount of effort required for code analysis efforts. Research has evolved from early applications of multi‐layer perceptron (MLP) to more recent studies using CNNs or LSTMs, 42,43 and until recently using GNNs‐based approaches 44 . The evolving network structure suggests that researchers have invested a significant amount of research effort to explore the potential of neural networks for semantic reasoning about code, as well as for facilitating rich patterns of vulnerability discovery.…”
Section: Related Workmentioning
confidence: 99%
“…But these algorithms have failed to provide high levels of accuracy. After the deep learning evolution, some researchers have applied convolutional neural network (CNN), recurrent network (RNN), and long short term memory (LSTM) options to detect different kinds of vulnerabilities [16] [17]. These deep learning models can provide an advanced performance than common machine learning algorithms and the accuracy of experimental results are also better than previous traditional machine learning algorithms.…”
Section: Related Workmentioning
confidence: 99%