Software vulnerability detection system based on uniform intermediate representation

被引:0
|
作者
Wang, Jinding [1 ]
Wang, Jiajie [2 ]
Cheng, Shaoyin [1 ]
Jiang, Fan [1 ]
机构
[1] School of Science and Technology, University of Science and Technology of China, Hefei 230027, China
[2] China Information Technology Security Evaluation Center, Beijing 100085, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
13
引用
收藏
页码:1502 / 1507
相关论文
共 50 条
  • [31] VulSPG: Vulnerability detection based on slice property graph representation learning
    Zheng, Weining
    Jiang, Yuan
    Su, Xiaohong
    2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), 2021, : 457 - 467
  • [32] Predicting Severity of Software Vulnerability Based on Grey System Theory
    Geng, Jinkun
    Ye, Daren
    Luo, Ping
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 143 - 152
  • [33] AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism
    An, Wenyan
    Chen, Liwei
    Wang, Jinxin
    Du, Gewangzi
    Shi, Gang
    Meng, Dan
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 337 - 344
  • [34] VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs
    Fan, Yuanhai
    Wan, Chuanhao
    Fu, Cai
    Han, Lansheng
    Xu, Hao
    COMPUTERS & SECURITY, 2023, 130
  • [35] Configuration Fuzzing for Software Vulnerability Detection
    Dai, Huning
    Murphy, Christian
    Kaiser, Gail
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 525 - 530
  • [36] Survey of software vulnerability detection techniques
    School of Computer Science and Engineering, Beihang University, Beijing
    100191, China
    不详
    410073, China
    Jisuanji Xuebao, 4 (717-732):
  • [37] Software vulnerability code clone detection method based on characteristic metrics
    Gan, Shui-Tao
    Qin, Xiao-Jun
    Chen, Zuo-Ning
    Wang, Lin-Zhang
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (02): : 348 - 363
  • [38] A Mutation-Based Data Enhancement Approach for Software Vulnerability Detection
    Su, Lianyi
    Hu, Jie
    Zheng, Wei
    JOURNAL OF INTERNET TECHNOLOGY, 2024, 25 (06): : 931 - 943
  • [39] Research on Software Vulnerability Detection Method Based on Improved CNN Model
    Qiang, Gao
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [40] A new method of software vulnerability detection based on a quantum neural network
    Zhou, Xin
    Pang, Jianmin
    Yue, Feng
    Liu, Fudong
    Guo, Jiayu
    Liu, Wenfu
    Song, Zhihui
    Shu, Guoqiang
    Xia, Bing
    Shan, Zheng
    SCIENTIFIC REPORTS, 2022, 12 (01)