Neural software vulnerability analysis using rich intermediate graph representations of programs
DOI10.1016/J.INS.2020.11.053zbMATH Open1483.68078OpenAlexW3111397039WikidataQ121088144 ScholiaQ121088144MaRDI QIDQ2123552FDOQ2123552
Authors: Seyed Mohammad Ghaffarian, Hamid Reza Shahriari
Publication date: 14 April 2022
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2020.11.053
Recommendations
- Pattern-based vulnerability discovery
- The flowing nature matters: feature learning from the control flow graph of source code for bug localization
- \textsc{SparrowHawk}: memory safety flaw detection via data-driven source code annotation
- Machine learning for black-box fuzzing of network protocols
- Survey of software vulnerability taxonomies
artificial neural networksmachine learninggraph neural networksautomated vulnerability analysissoftware security vulnerability
Learning and adaptive systems in artificial intelligence (68T05) Graph theory (including graph drawing) in computer science (68R10) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Cites Work
Cited In (5)
- Pattern-based vulnerability discovery
- Meta-heuristic-based hybrid deep learning model for vulnerability detection and prevention in software system
- The flowing nature matters: feature learning from the control flow graph of source code for bug localization
- A memory-related vulnerability detection approach based on vulnerability model with Petri Net
- Machine learning for black-box fuzzing of network protocols
Uses Software
This page was built for publication: Neural software vulnerability analysis using rich intermediate graph representations of programs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2123552)