Deep security analysis of program code
نویسندگان
چکیده
Abstract Due to the continuous digitalization of our society, distributed and web-based applications become omnipresent making them more secure gains paramount relevance. Deep learning (DL) its representation approach are increasingly been proposed for program code analysis potentially providing a powerful means in software systems less vulnerable. This systematic literature review (SLR) is aiming thorough comparison 32 primary studies on DL-based vulnerability code. We found rich variety approaches, embeddings network topologies. discuss these techniques alternatives detail. By compiling commonalities differences we identify current state research this area future directions. also provide an overview publicly available datasets order foster stronger benchmarking approaches. SLR provides starting point researchers interested deep
منابع مشابه
Deep Analysis of Binary Code to Recover Program Structure
Title of dissertation: DEEP ANALYSIS OF BINARY CODE TO RECOVER PROGRAM STRUCTURE Khaled ElWazeer, Doctor of Philosophy, 2014 Dissertation directed by: Professor Rajeev Barua Department of Electrical and Computer Engineering Reverse engineering binary executable code is gaining more interest in the research community. Agencies as diverse as anti-virus companies, security consultants, code forens...
متن کاملa swot analysis of the english program of a bilingual school in iran
با توجه به جایگاه زبان انگلیسی به عنوان زبانی بین المللی و با در نظر گرفتن این واقعیت که دولت ها و مسئولان آموزش و پرورش در سراسر جهان در حال حاضر احساس نیاز به ایجاد موقعیتی برای کودکان جهت یاد گیری زبان انگلیسی درسنین پایین در مدارس دو زبانه می کنند، تحقیق حاضر با استفاده از مدل swot (قوت ها، ضعف ها، فرصتها و تهدیدها) سعی در ارزیابی مدرسه ای دو زبانه در ایران را دارد. جهت انجام این تحقیق در م...
15 صفحه اولStatic Program Analysis for Security
In this chapter, we discuss static analysis of the security of a system. First, we discuss the background on what types of static analysis is feasible in principle and then move on to what is practical. We next discuss static analysis of buffer overflow and mobile code followed by access control. Finally, we discuss static analysis of information flow expressed in a language that has been annot...
متن کاملWide application security by low-level program code obfuscation techniques
The goal of our research project is to protect security of applications and software systems in a whole new way: by diversifying implementations of all the software layers and their interfaces on the binary level. The system call interface of the operating system is diversified uniquely for each system and all the entry points to this interface are diversified in applications and libraries acco...
متن کاملJava Mobile Code Security by Bytecode Analysis
Since mobile code can migrate from a remote site to a host and can interact with the resources and facilities of the host, security becomes the key to the success of mobile code computation. Existing mobile code security mechanisms such as access control are not able to fully address the import security properties of the host including confidentiality and integrity. And these practices tend to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Empirical Software Engineering
سال: 2021
ISSN: ['1382-3256', '1573-7616']
DOI: https://doi.org/10.1007/s10664-021-10029-x