SedSVD: Statement-level software vulnerability detection based on Relational Graph Convolutional Network with subgraph embedding

Y Dong, Y Tang, X Cheng, Y Yang, S Wang - Information and Software …, 2023 - Elsevier
Context: Current deep-learning based vulnerability detection methods have been proven
more automatic and correct to a certain extent, nonetheless, they are limited to detect at …

Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features

Y Xue - Journal of Cyber Security and Mobility, 2023 - journals.riverpublishers.com
The existence of vulnerabilities is a serious threat to the security of networks, which needs to
be detected timely. In this paper, machine learning methods were mainly studied. Firstly …

[PDF][PDF] Low Level Source Code Vulnerability Detection Using Advanced BERT Language Model.

M Alqarni, A Azim - Canadian AI, 2022 - assets.pubpub.org
In software security and reliability, automated vulnerability detection is an essential and
compulsory task. Software needs to be tested and checked before it goes to the client for …

TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IOT

L Xu, B An, X Li, D Zhao, H Peng… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Current vulnerability detection methods encounter challenges, such as inadequate feature
representation, constrained feature extraction capabilities, and coarse-grained detection. To …

Vulnerability Localization Based On Intermediate Code Representation and Feature Fusion

C Zhu, R Wei, L Chen, T Wu, G Du… - The Computer …, 2024 - academic.oup.com
Vulnerability localization can assist security professionals in vulnerability validation and
analysis. This study proposes an intelligent vulnerability localization method based on fine …

Evdd-a novel dataset for embedded system vulnerability detection mechanism

M Alqarni, A Azim, T Singh - 2022 21st IEEE International …, 2022 - ieeexplore.ieee.org
In the digital world where the smart device is a ubiquitous feature of modern life, embedded
systems are almost everywhere. From the smart home, to the smart office, to the smart …

A survey on graph-based methods for Software Vulnerability Detection

ENA Abu-Huliqah, GH Al Gaphari… - 2024 1st International …, 2024 - ieeexplore.ieee.org
In computer security, finding software vulnerabilities is essential since they provide serious
security hazards to both individuals and companies. Known vulnerability variations or …

Software Vulnerabilities Detection in Agile Process using graph method and Deep Neural Network

DK Srivastava, R Makhija… - … on Advancements in Smart …, 2022 - ieeexplore.ieee.org
Software development is rapidly growing at a global level. It requires a lot of technical
knowledge and a well-structured skill set. Due to these and other factors, software …

Enhancing Embedded IoT Systems for Intrusion Detection Using a Hybrid Model

M Alqarni, A Azim - Artificial Intelligence for Security: Enhancing Protection …, 2024 - Springer
Intrusion detection in Internet of Things (IoT) networks is a critical challenge due to the
dynamic and evolving nature of cyber threats. To address this issue, we propose a novel …

Mining Large Data to Create a Balanced Vulnerability Detection Dataset for Embedded Linux System

M Alqarni, A Azim - … IEEE/ACM International Conference on Big …, 2022 - ieeexplore.ieee.org
The security of embedded systems is particularly crucial given the prevalence of embedded
devices in daily life, business, and national defense. Firmware for embedded systems poses …