Neural software vulnerability analysis using rich intermediate graph representations of programs
From MaRDI portal
Publication:2123552
Recommendations
- Pattern-based vulnerability discovery
- The flowing nature matters: feature learning from the control flow graph of source code for bug localization
- \textsc{SparrowHawk}: memory safety flaw detection via data-driven source code annotation
- Machine learning for black-box fuzzing of network protocols
- Survey of software vulnerability taxonomies
Cites work
Cited in
(5)- Meta-heuristic-based hybrid deep learning model for vulnerability detection and prevention in software system
- Machine learning for black-box fuzzing of network protocols
- Pattern-based vulnerability discovery
- The flowing nature matters: feature learning from the control flow graph of source code for bug localization
- A memory-related vulnerability detection approach based on vulnerability model with Petri Net
This page was built for publication: Neural software vulnerability analysis using rich intermediate graph representations of programs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2123552)