2022
DOI: 10.4018/ijsi.292020
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Representation to Locate Vulnerable Lines of Code

Abstract: Locating vulnerable lines of code in large software systems needs huge efforts from human experts. This explains the high costs in terms of budget and time needed to correct vulnerabilities. To minimize these costs, automatic solutions of vulnerabilities prediction have been proposed. Existing machine learning (ML)-based solutions face difficulties in predicting vulnerabilities in coarse granularity and in defining suitable code features that limit their effectiveness. To addressee these limitations, in the pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 32 publications
(2 reference statements)
0
1
0
Order By: Relevance
“…This process is repeated so that all file names in each co-change are used as the query item and also as part of the recommendation. The final performance results are then calculated by averaging the results of all the iterations [40].…”
Section: A Evaluation Protocolmentioning
confidence: 99%
“…This process is repeated so that all file names in each co-change are used as the query item and also as part of the recommendation. The final performance results are then calculated by averaging the results of all the iterations [40].…”
Section: A Evaluation Protocolmentioning
confidence: 99%