Studying Vulnerable Code Entities in R

被引:0
|
作者
Zhao, Zixiao [1 ]
Das, Millon Madhur [2 ]
Fard, Fatemeh H. [1 ]
机构
[1] Univ British Columbia, Kelowna, BC, Canada
[2] Indian Inst Technol, Kharagpur, WB, India
基金
加拿大自然科学与工程研究理事会;
关键词
R; Pre-Trained Code Language Models;
D O I
10.1145/3643916.3644398
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Pre-trained Code Language Models (Code-PLMs) have shown many advancements and achieved state-of-the-art results for many software engineering tasks in the past few years. These models are mainly targeted at popular programming languages such as Java and Python, leaving out many others like R. Though R has a wide community of developers and users, there is little known about the applicability of Code-PLMs for R. In this preliminary study, we aim to investigate the vulnerability of Code-PLMs for code entities in R. For this purpose, we use an R dataset of code and comment pairs and then apply CodeAttack, a black-box attack model that uses the structure of code to generate adversarial code samples. We investigate how the model can attack different entities in R. This is the first step towards understanding the importance of R token types, compared to popular programming languages (e.g., Java). We limit our study to code summarization. Our results show that the most vulnerable code entity is the identifier, followed by some syntax tokens specific to R. The results can shed light on the importance of token types and help in developing models for code summarization and method name prediction for the R language.
引用
收藏
页码:328 / 332
页数:5
相关论文
共 50 条