Deep learning based vulnerability detection: Are we there yet?

S Chakraborty, R Krishna, Y Ding… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automated detection of software vulnerabilities is a fundamental problem in software
security. Existing program analysis techniques either suffer from high false positives or false …

Smart contract development: Challenges and opportunities

W Zou, D Lo, PS Kochhar, XBD Le, X Xia… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Smart contract, a term which was originally coined to refer to the automation of legal
contracts in general, has recently seen much interest due to the advent of blockchain …

Unixcoder: Unified cross-modal pre-training for code representation

D Guo, S Lu, N Duan, Y Wang, M Zhou… - arXiv preprint arXiv …, 2022 - arxiv.org
Pre-trained models for programming languages have recently demonstrated great success
on code intelligence. To support both code-related understanding and generation tasks …

Codexglue: A machine learning benchmark dataset for code understanding and generation

S Lu, D Guo, S Ren, J Huang, A Svyatkovskiy… - arXiv preprint arXiv …, 2021 - arxiv.org
Benchmark datasets have a significant impact on accelerating research in programming
language tasks. In this paper, we introduce CodeXGLUE, a benchmark dataset to foster …

Combining graph neural networks with expert knowledge for smart contract vulnerability detection

Z Liu, P Qian, X Wang, Y Zhuang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart contract vulnerability detection draws extensive attention in recent years due to the
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …

Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks

Y Zhou, S Liu, J Siow, X Du… - Advances in neural …, 2019 - proceedings.neurips.cc
Vulnerability identification is crucial to protect the software systems from attacks for cyber
security. It is especially important to localize the vulnerable functions among the source code …

Graph neural networks in particle physics

J Shlomi, P Battaglia, JR Vlimant - Machine Learning: Science …, 2020 - iopscience.iop.org
Particle physics is a branch of science aiming at discovering the fundamental laws of matter
and forces. Graph neural networks are trainable functions which operate on graphs—sets of …

An extensive study on pre-trained models for program understanding and generation

Z Zeng, H Tan, H Zhang, J Li, Y Zhang… - Proceedings of the 31st …, 2022 - dl.acm.org
Automatic program understanding and generation techniques could significantly advance
the productivity of programmers and have been widely studied by academia and industry …

A novel neural source code representation based on abstract syntax tree

J Zhang, X Wang, H Zhang, H Sun… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Exploiting machine learning techniques for analyzing programs has attracted much
attention. One key problem is how to represent code fragments well for follow-up analysis …

Learning and evaluating contextual embedding of source code

A Kanade, P Maniatis… - … on machine learning, 2020 - proceedings.mlr.press
Recent research has achieved impressive results on understanding and improving source
code by building up on machine-learning techniques developed for natural languages. A …