2021
DOI: 10.1016/j.cose.2021.102417
|View full text |Cite
|
Sign up to set email alerts
|

VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…To address the current situation where existing work requires a large amount of labeled data, Sun et al prepared a smaller data set consisting of vulnerabilities and associated patches and attempted to detect similarity in terms of similarity between vulnerabilities and differences between a pair of vulnerabilities and patches. To this end, they constructed VDSimilar [18], a joint detection model using Siamese networks, Bi-LSTM, and Attention to process source code. e proposed model achieves an AUC value of 97.17 on OpenSSL and Linux on a data set of 876 samples.…”
Section: Rule-basedmentioning
confidence: 99%
“…To address the current situation where existing work requires a large amount of labeled data, Sun et al prepared a smaller data set consisting of vulnerabilities and associated patches and attempted to detect similarity in terms of similarity between vulnerabilities and differences between a pair of vulnerabilities and patches. To this end, they constructed VDSimilar [18], a joint detection model using Siamese networks, Bi-LSTM, and Attention to process source code. e proposed model achieves an AUC value of 97.17 on OpenSSL and Linux on a data set of 876 samples.…”
Section: Rule-basedmentioning
confidence: 99%
“…Specifically, we use the method of multi-step decay to adjust the learning rate. For hyperparameter settings, the milestones are set to 5 , 13 , 15 , gamma is set to 0.1 and initial learning rate is set to 0.01. In order to ensure the comparability of experiments, we also use SGD optimizer and a cross-entropy loss function to train 10 epochs.…”
Section: Resultsmentioning
confidence: 99%
“…It is worth noting that with the rise of machine learning technology, vulnerability detection based on machine learning has become a hot issue. At present, this field includes attribute-based software code measurement 12 , code similarity detection 13 – 15 , etc. To detect the unknown vulnerability in an actual application environment, the combination of word embedding and vulnerability detection came into being.…”
Section: Introductionmentioning
confidence: 99%
“…Code similarity approaches find matches between target codes with known vulnerabilities for classification. VD-Similar [12] and VUDDY [13] are two examples. Although VDSimilar uses a Siamese network [14] along with BiLSTM to improve the detection accuracy, VUDDY improves the scalability of vulnerable code clone detection using functionlevel granularity and a length-filtering technique.…”
Section: Related Workmentioning
confidence: 99%