Deep security analysis of program code

نویسندگان

چکیده

Abstract Due to the continuous digitalization of our society, distributed and web-based applications become omnipresent making them more secure gains paramount relevance. Deep learning (DL) its representation approach are increasingly been proposed for program code analysis potentially providing a powerful means in software systems less vulnerable. This systematic literature review (SLR) is aiming thorough comparison 32 primary studies on DL-based vulnerability code. We found rich variety approaches, embeddings network topologies. discuss these techniques alternatives detail. By compiling commonalities differences we identify current state research this area future directions. also provide an overview publicly available datasets order foster stronger benchmarking approaches. SLR provides starting point researchers interested deep

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deep Analysis of Binary Code to Recover Program Structure

Title of dissertation: DEEP ANALYSIS OF BINARY CODE TO RECOVER PROGRAM STRUCTURE Khaled ElWazeer, Doctor of Philosophy, 2014 Dissertation directed by: Professor Rajeev Barua Department of Electrical and Computer Engineering Reverse engineering binary executable code is gaining more interest in the research community. Agencies as diverse as anti-virus companies, security consultants, code forens...

متن کامل

a swot analysis of the english program of a bilingual school in iran

با توجه به جایگاه زبان انگلیسی به عنوان زبانی بین المللی و با در نظر گرفتن این واقعیت که دولت ها و مسئولان آموزش و پرورش در سراسر جهان در حال حاضر احساس نیاز به ایجاد موقعیتی برای کودکان جهت یاد گیری زبان انگلیسی درسنین پایین در مدارس دو زبانه می کنند، تحقیق حاضر با استفاده از مدل swot (قوت ها، ضعف ها، فرصتها و تهدیدها) سعی در ارزیابی مدرسه ای دو زبانه در ایران را دارد. جهت انجام این تحقیق در م...

15 صفحه اول

Static Program Analysis for Security

In this chapter, we discuss static analysis of the security of a system. First, we discuss the background on what types of static analysis is feasible in principle and then move on to what is practical. We next discuss static analysis of buffer overflow and mobile code followed by access control. Finally, we discuss static analysis of information flow expressed in a language that has been annot...

متن کامل

Wide application security by low-level program code obfuscation techniques

The goal of our research project is to protect security of applications and software systems in a whole new way: by diversifying implementations of all the software layers and their interfaces on the binary level. The system call interface of the operating system is diversified uniquely for each system and all the entry points to this interface are diversified in applications and libraries acco...

متن کامل

Java Mobile Code Security by Bytecode Analysis

Since mobile code can migrate from a remote site to a host and can interact with the resources and facilities of the host, security becomes the key to the success of mobile code computation. Existing mobile code security mechanisms such as access control are not able to fully address the import security properties of the host including confidentiality and integrity. And these practices tend to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Empirical Software Engineering

سال: 2021

ISSN: ['1382-3256', '1573-7616']

DOI: https://doi.org/10.1007/s10664-021-10029-x