A new approach to software vulnerability detection based on CPG analysis
نویسندگان
چکیده
Detecting source code vulnerabilities is an essential issue today. In this paper, to improve the efficiency of detecting in software written C/C++, we propose use a combination Deep Graph Convolutional Neural Network (DGCNN) and property graph (CPG). Specifically, 3 main proposed phases research method include: phase 1: building feature profiles code. At step, suggest using analysis techniques such as Word2vec, one hot encoding standardize analyze code; 2: extracting features based on profiles. Accordingly, at phase, model extract 3: classifying extracted 2 find normal containing security vulnerabilities. Some scenarios for comparing evaluating study compared with other approaches have taken show superior effectiveness our approach. Besides, result proves that paper not only correct reasonable, but it also opens up new approach task
منابع مشابه
a new approach to credibility premium for zero-inflated poisson models for panel data
هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...
15 صفحه اولA New Approach to Nonstandard Analysis
In this paper, we propose a new approach to nonstandard analysis without using the ultrafilters. This method is very simple in practice. Moreover, we construct explicitly the total order relation in the new field of the infinitesimal numbers. To illustrate the importance of this work, we suggest comparing a few applications of this approach with the former methods.
متن کاملA Software Engineering Approach for Vulnerability Analysis
Due to the increasing dependency on networked computer system, it is important to make a network reliable and dependent. This is even more relevant as new threats of attack are constantly being revealed, compromising the security of systems. This paper addresses this problem by presenting an attack injection methodology for the automatic discovery of vulnerabilities in software components. The ...
متن کاملA New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation
The literature review shows software development projects often neither meet time deadlines, nor run within the allocated budgets. One common reason can be the inaccurate cost estimation process, although several approaches have been proposed in this field. Recent research studies suggest that in order to increase the accuracy of this process, estimation models have to be revised. The Construct...
متن کاملiranian english learners’ perception and personality: a dual approach to investigating influential factors on willingness to communicate
abstract previous studies on willingness to communicate (wtc) have shown the influence of many individual or situational factors on students’ tendency to engage in classroom communication, in which wtc has been viewed either at the trait-level or situational level. however, due to the complexity of the notion of willingness to communicate, the present study suggests that these two strands are ...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cogent engineering
سال: 2023
ISSN: ['2331-1916']
DOI: https://doi.org/10.1080/23311916.2023.2221962