Software vulnerability detection system based on uniform intermediate representation

被引:0
|
作者
Wang, Jinding [1 ]
Wang, Jiajie [2 ]
Cheng, Shaoyin [1 ]
Jiang, Fan [1 ]
机构
[1] School of Science and Technology, University of Science and Technology of China, Hefei 230027, China
[2] China Information Technology Security Evaluation Center, Beijing 100085, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
13
引用
收藏
页码:1502 / 1507
相关论文
共 50 条
  • [1] Rule-based system for vulnerability detection of software
    Cho, Sung-Hoon
    Jang, Chang-Bok
    Lee, Moo-Hun
    Choi, Eui-In
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1630 - 1633
  • [2] HGVul: A Code Vulnerability Detection Method Based on Heterogeneous Source-Level Intermediate Representation
    Song, Zihua
    Wang, Junfeng
    Liu, Shengli
    Fang, Zhiyang
    Yang, Kaiyuan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [3] Vulnerability Detection for software-intensive system
    Othman, Refat
    PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 510 - 515
  • [4] Vulnerability Localization Based On Intermediate Code Representation and Feature Fusion
    Zhu, Chenguang
    Wei, Renzheng
    Chen, Liwei
    Wu, Tongshuai
    Du, Gewangzi
    Shi, Gang
    COMPUTER JOURNAL, 2024, 67 (09): : 2749 - 2762
  • [5] Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning
    Li, Xin
    Wang, Lu
    Xin, Yang
    Yang, Yixian
    Chen, Yuling
    APPLIED SCIENCES-BASEL, 2020, 10 (05):
  • [6] Reverse Analysis and Vulnerability Detection for Network System Software
    Pan, Wei
    Li, Weihua
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 451 - 456
  • [7] Vulnerability Detection Based on Enhanced Graph Representation Learning
    Xiao, Peng
    Xiao, Qibin
    Zhang, Xusheng
    Wu, Yumei
    Yang, Fengyu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5120 - 5135
  • [8] Graph representation learning and software homology matching based A study of JAVA']JAVA code vulnerability detection techniques
    Yang, Yibin
    Bo, Xin
    Wang, Zitong
    Shao, Xinrui
    Xie, Xinjie
    2023 2ND ASIA CONFERENCE ON ALGORITHMS, COMPUTING AND MACHINE LEARNING, CACML 2023, 2023, : 131 - 142
  • [9] HCRVD: A Vulnerability Detection System Based on CST-PDG Hierarchical Code Representation Learning
    Song, Zhihui
    Xu, Jinchen
    Li, Kewei
    Shan, Zheng
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (03): : 4573 - 4601
  • [10] Ontology-based services for software vulnerability detection: a survey
    Wang, Bingquan
    Cui, Baojiang
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2019, 13 (04) : 333 - 339