An empirical study of deep learning models for vulnerability detection

B Steenhoek, MM Rahman, R Jiles… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Deep learning (DL) models of code have recently reported great progress for vulnerability
detection. In some cases, DL-based models have outperformed static analysis tools …

Vulnerability detection with graph simplification and enhanced graph representation learning

XC Wen, Y Chen, C Gao, H Zhang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated
software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in …

A novel approach for software vulnerability detection based on intelligent cognitive computing

C Do Xuan, DH Mai, MC Thanh, B Van Cong - The Journal of …, 2023 - Springer
Improving and enhancing the effectiveness of software vulnerability detection methods is
urgently needed today. In this study, we propose a new source code vulnerability detection …

Developer's roadmap to design software vulnerability detection model using different ai approaches

S Pooja, CB Chandrakala, LK Raju - IEEE Access, 2022 - ieeexplore.ieee.org
Automatic software vulnerability detection has caught the eyes of researchers as because
software vulnerabilities are exploited vehemently causing major cyber-attacks. Thus …

[PDF][PDF] 基于图深度学习的漏洞检测

董继平, 郭启全, 高春东, 郝蒙蒙, 江东 - 科技导报, 2023 - kjdb.org
摘要图深度学习技术在处理非欧氏结构数据中显示了巨大潜力, 大量研究工作尝试将图嵌入或图
神经网络应用到漏洞检测中. 梳理了基于图深度学习的漏洞检测方法, 按其一般流程 …

A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures

X Zhou, W Niu, X Zhang, R Chen, Y Wang - International Conference on …, 2022 - Springer
Code similarity analysis quantitatively measures the similarity between two existing source
codes by matching their signatures defined by code analyst. It is proven to be a promising …

CVulDetector: Cross-domain Vulnerability Detection Based on Transfer Learning

G Zeng, W Zhou, Z Qin, X Sun… - 2023 8th International …, 2023 - ieeexplore.ieee.org
Software vulnerabilities pose a significant threat to computer security, and accurate
identification of vulnerabilities has become a challenging task. Although previous work on …

Survey of vulnerability detection based on graph deep learning

J DONG, Q GUO, C GAO, M HAO, D JIANG - Science & Technology …, 2023 - kjdb.org
The recent advances made by graph-based deep learning have demonstrated its great
potential in processing non-Euclidean structured data, and a large number of research …