Studying Vulnerable Code Entities in R

被引:0
|
作者
Zhao, Zixiao [1 ]
Das, Millon Madhur [2 ]
Fard, Fatemeh H. [1 ]
机构
[1] Univ British Columbia, Kelowna, BC, Canada
[2] Indian Inst Technol, Kharagpur, WB, India
基金
加拿大自然科学与工程研究理事会;
关键词
R; Pre-Trained Code Language Models;
D O I
10.1145/3643916.3644398
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Pre-trained Code Language Models (Code-PLMs) have shown many advancements and achieved state-of-the-art results for many software engineering tasks in the past few years. These models are mainly targeted at popular programming languages such as Java and Python, leaving out many others like R. Though R has a wide community of developers and users, there is little known about the applicability of Code-PLMs for R. In this preliminary study, we aim to investigate the vulnerability of Code-PLMs for code entities in R. For this purpose, we use an R dataset of code and comment pairs and then apply CodeAttack, a black-box attack model that uses the structure of code to generate adversarial code samples. We investigate how the model can attack different entities in R. This is the first step towards understanding the importance of R token types, compared to popular programming languages (e.g., Java). We limit our study to code summarization. Our results show that the most vulnerable code entity is the identifier, followed by some syntax tokens specific to R. The results can shed light on the importance of token types and help in developing models for code summarization and method name prediction for the R language.
引用
收藏
页码:328 / 332
页数:5
相关论文
共 50 条
  • [21] An empirical study on the importance of source code entities for requirements traceability
    Nasir Ali
    Zohreh Sharafi
    Yann-Gaël Guéhéneuc
    Giuliano Antoniol
    Empirical Software Engineering, 2015, 20 : 442 - 478
  • [22] An empirical study on the importance of source code entities for requirements traceability
    Ali, Nasir
    Sharafi, Zohreh
    Gueheneuc, Yann-Gael
    Antoniol, Giuliano
    EMPIRICAL SOFTWARE ENGINEERING, 2015, 20 (02) : 442 - 478
  • [23] Deep Domain Adaptation for Vulnerable Code Function Identification
    Van Nguyen
    Trung Le
    Le, Tue
    Khanh Nguyen
    DeVel, Olivier
    Montague, Paul
    Qu, Lizhen
    Dinh Phung
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [24] VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery
    Kim, Seulbae
    Woo, Seunghoon
    Lee, Heejo
    Oh, Hakjoo
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 595 - 614
  • [25] Discovering Vulnerable Functions: A Code Similarity Based Approach
    Chandran, Aditya
    Jain, Lokesh
    Rawat, Sanjay
    Srinathan, Kannan
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 390 - 402
  • [26] Identifying the Characteristics of Vulnerable Code Changes: An Empirical Study
    Bosu, Amiangshu
    Carver, Jeffrey C.
    Hafiz, Munawar
    Hilley, Patrick
    Janni, Derek
    22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, : 257 - 268
  • [27] Program Slice based Vulnerable Code Clone Detection
    Song, Xiaonan
    Yu, Aimin
    Yu, Haibo
    Liu, Shirun
    Bai, Xin
    Cai, Lijun
    Meng, Dan
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 293 - 300
  • [28] A Dataset of Vulnerable Code Changes of the Chromium OS project
    Paul, Rajshakhar
    Turzo, Asif Kamal
    Bosu, Amiangshu
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), 2021, : 244 - 245
  • [29] VGRAPH: A Robust Vulnerable Code Clone Detection System Using Code Property Triplets
    Bowman, Benjamin
    Huang, H. Howie
    2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 53 - 69
  • [30] Code Aggregate Graph: Effective Representation for Graph Neural Networks to Detect Vulnerable Code
    Nguyen, Hoang Viet
    Zheng, Junjun
    Inomata, Atsuo
    Uehara, Tetsutaro
    IEEE Access, 2022, 10 : 123786 - 123800