2018 5th International Conference on Systems and Informatics (ICSAI) 2018
DOI: 10.1109/icsai.2018.8599360
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Detection for Source Code Using Contextual LSTM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(17 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…Some of the reviewed works use a single form of graphical representation for their feature extraction [14–19, 71, 73, 75, 80, 87 ] (b) Code block‐based feature representation: For code block‐based feature representation, studies under this category utilise DNNs for extracting feature representations from sequential code entities such as function calls, code snippets, code gadgets, and so on. Some of the reviewed papers rely on the use of code block‐based representations of source code [67, 70, 72, 74, 76, 77, 82, 83, 85 ] (c) Text‐based feature representation: For this category of feature, representations are learned directly from the source code text surface. Examples include Lexed code representation and using the source code files directly.…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
See 4 more Smart Citations
“…Some of the reviewed works use a single form of graphical representation for their feature extraction [14–19, 71, 73, 75, 80, 87 ] (b) Code block‐based feature representation: For code block‐based feature representation, studies under this category utilise DNNs for extracting feature representations from sequential code entities such as function calls, code snippets, code gadgets, and so on. Some of the reviewed papers rely on the use of code block‐based representations of source code [67, 70, 72, 74, 76, 77, 82, 83, 85 ] (c) Text‐based feature representation: For this category of feature, representations are learned directly from the source code text surface. Examples include Lexed code representation and using the source code files directly.…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
“…However, in [86 ], the lexed source code representation is used in conjunction with CFGs as a form of build based feature extraction. (e) Others: Among the reviewed works, several other forms of source code representation are utilised as portable output features. Such feature source representations include utilising the source code files themselves [78 ], representing the source code as code tokens [67, 74, 76 ], dividing source code files into code slices [72, 84 ] and using function calls [70 ]. Besides, other forms of representation include the use of vectors such as binary feature vectors [60 ] and bags of characters [79 ].…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
See 3 more Smart Citations