Automatic detection of Java cryptographic API misuses: Are we there yet?

Y Zhang, MMA Kabir, Y Xiao, D Yao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …

LineVD: statement-level vulnerability detection using graph neural networks

D Hin, A Kan, H Chen, MA Babar - Proceedings of the 19th international …, 2022 - dl.acm.org
Current machine-learning based software vulnerability detection methods are primarily
conducted at the function-level. However, a key limitation of these methods is that they do …

Vulnerability detection with fine-grained interpretations

Y Li, S Wang, TN Nguyen - Proceedings of the 29th ACM Joint Meeting …, 2021 - dl.acm.org
Despite the successes of machine learning (ML) and deep learning (DL)-based vulnerability
detectors (VD), they are limited to providing only the decision on whether a given code is …

Deepwukong: Statically detecting software vulnerabilities using deep graph neural network

X Cheng, H Wang, J Hua, G Xu, Y Sui - ACM Transactions on Software …, 2021 - dl.acm.org
Static bug detection has shown its effectiveness in detecting well-defined memory errors, eg,
memory leaks, buffer overflows, and null dereference. However, modern software systems …

Vuldeepecker: A deep learning-based system for vulnerability detection

Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng… - arXiv preprint arXiv …, 2018 - arxiv.org
The automatic detection of software vulnerabilities is an important research problem.
However, existing solutions to this problem rely on human experts to define features and …

VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection

D Zou, S Wang, S Xu, Z Li, H Jin - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Fine-grained software vulnerability detection is an important and challenging problem.
Ideally, a detection system (or detector) not only should be able to detect whether or not a …

Vulcnn: An image-inspired scalable vulnerability detection system

Y Wu, D Zou, S Dou, W Yang, D Xu, H Jin - Proceedings of the 44th …, 2022 - dl.acm.org
Since deep learning (DL) can automatically learn features from source code, it has been
widely used to detect source code vulnerability. To achieve scalable vulnerability scanning …

Vuddy: A scalable approach for vulnerable code clone discovery

S Kim, S Woo, H Lee, H Oh - 2017 IEEE symposium on security …, 2017 - ieeexplore.ieee.org
The ecosystem of open source software (OSS) has been growing considerably in size. In
addition, code clones-code fragments that are copied and pasted within or between software …

An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis

W Zheng, P Deng, K Gui, X Wu - Information and Software Technology, 2023 - Elsevier
Context: Zero-day vulnerabilities are highly destructive and sudden. However, traditional
static and dynamic testing methods cannot efficiently detect them. Objective: In this paper, a …

Vuldeelocator: a deep learning-based fine-grained vulnerability detector

Z Li, D Zou, S Xu, Z Chen, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automatically detecting software vulnerabilities is an important problem that has attracted
much attention from the academic research community. However, existing vulnerability …