Comparative analysis of approaches to source code vulnerability detection based on deep learning methods
نویسندگان
چکیده
The object of research this work is the methods deep learning for source code vulnerability detection. One most problematic areas use only one approach in analysis process: based on AST (abstract syntax tree) or program dependence graph (PDG). In paper, a comparative two approaches detection was conducted: and PDG. various topologies neural networks were analyzed. They are used As result comparison, advantages disadvantages each determined, results summarized corresponding comparison tables. analysis, it determined that BLSTM (Bidirectional Long Short Term Memory) BGRU Gated Linear Unit) gives best terms problems showed, effective systems method uses an intermediate representation code, which allows getting language-independent tool. Also, work, our own algorithm system proposed, able to perform following operations: predict vulnerability, classify generate patch found vulnerability. A detailed proposed system’s unresolved issues provided, planned investigate future researches. could help speed up software development process as well reduce number vulnerabilities. Software developers, specialists field cybersecurity, can be stakeholders system.
منابع مشابه
A Hybrid Malicious Code Detection Method based on Deep Learning
In this paper, we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of t...
متن کاملon the comparison of keyword and semantic-context methods of learning new vocabulary meaning
the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...
15 صفحه اولVulDeePecker: A Deep Learning-Based System for Vulnerability Detection
The automatic detection of software vulnerabilities is an important research problem. However, existing solutions to this problem rely on human experts to define features and often miss many vulnerabilities (i.e., incurring high false negative rate). In this paper, we initiate the study of using deep learning-based vulnerability detection to relieve human experts from the tedious and subjective...
متن کاملapplying transitivity theory to gender analysis of efl textbook: : a comparative study.
efl/esl textbooks have been regarded as essential language teaching materials with which the learners spend about 70 up to 90 percent of their class time. the important role they play and their vast use make them not only influential in learning the language but also in shaping values and attitudes. put it another way, textbooks socialize learners using their contents (i.e. texts, illustrations...
15 صفحه اولDetection of children's activities in smart home based on deep learning approach
Monitoring behavior of children in the home is the extremely important to avoid the possible injuries. Therefore, an automated monitoring system for monitoring behavior of children by researchers has been considered. The first step for designing and executing an automated monitoring system on children's behavior in closed spaces is possible with recognize their activity by the sensors in the e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Technology audit and production reserves
سال: 2021
ISSN: ['2664-9969', '2706-5448']
DOI: https://doi.org/10.15587/2706-5448.2021.233534