Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence 2019
DOI: 10.24963/ijcai.2019/648
|View full text |Cite
|
Sign up to set email alerts
|

VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities

Abstract: With the explosive development of information technology, vulnerabilities have become one of the major threats to computer security. Most vulnerabilities with similar patterns can be detected effectively by static analysis methods. However, some vulnerable and non-vulnerable code is hardly distinguishable, resulting in low detection accuracy. In this paper, we define the accurate identification of vulnerabilities in similar code as a fine-grained vulnerability detection problem. We propose VulSniper which is d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
28
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 78 publications
(47 citation statements)
references
References 9 publications
0
28
0
Order By: Relevance
“…The main idea behind the use of CPGs as a portable output feature is capturing the characteristics brought about by the representations mentioned above and offering the advantages as a single representation. To enhance the semantic information that can be gathered by code representations as features, a few of the surveyed works utilise CPGs [71, 80 ]. In order to generate CPGs, tools such a Joern [71, 80, 87 ] are utilised for C/C++ code. (d) Lexed representation of source code: Lexing is a process which involves the use of a lexer in order to generate useful features from raw source code.…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
See 4 more Smart Citations
“…The main idea behind the use of CPGs as a portable output feature is capturing the characteristics brought about by the representations mentioned above and offering the advantages as a single representation. To enhance the semantic information that can be gathered by code representations as features, a few of the surveyed works utilise CPGs [71, 80 ]. In order to generate CPGs, tools such a Joern [71, 80, 87 ] are utilised for C/C++ code. (d) Lexed representation of source code: Lexing is a process which involves the use of a lexer in order to generate useful features from raw source code.…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
“…To enhance the semantic information that can be gathered by code representations as features, a few of the surveyed works utilise CPGs [71, 80 ]. In order to generate CPGs, tools such a Joern [71, 80, 87 ] are utilised for C/C++ code. (d) Lexed representation of source code: Lexing is a process which involves the use of a lexer in order to generate useful features from raw source code. In lexing, critical tokens are captured from source code functions while the representation is kept generic and the total vocabulary size is minimised.…”
Section: Taxonomy Of Deep Learning Techniques For Source Code Vulnementioning
confidence: 99%
See 3 more Smart Citations