Journal on Communications ›› 2021, Vol. 42 ›› Issue (11): 233-241.doi: 10.11959/j.issn.1000-436x.2021196
• Correspondences • Previous Articles Next Articles
Bing ZHANG1,2, Zheng WEN1,2, Yuxuan ZHAO1, Ning WANG1, Jiadong REN1,2
Revised:
2021-09-23
Online:
2021-11-25
Published:
2021-11-01
Supported by:
CLC Number:
Bing ZHANG, Zheng WEN, Yuxuan ZHAO, Ning WANG, Jiadong REN. Dual-granularity lightweight model for vulnerability code slicing method assessment[J]. Journal on Communications, 2021, 42(11): 233-241.
[1] | LIN G J , WEN S , HAN Q L ,et al. Software vulnerability detection using deep neural networks:a survey[J]. Proceedings of the IEEE, 2020,108(10): 1825-1848. |
[2] | 李珍, 邹德清, 王泽丽 ,等. 面向源代码的软件漏洞静态检测综述[J]. 网络与信息安全学报, 2019,5(1): 1-14. |
LI Z , ZOU D Q , WANG Z L ,et al. Survey on static software vulnerability detection for source code[J]. Chinese Journal of Network and Information Security, 2019,5(1): 1-14. | |
[3] | RAMOS U J . Using tf-idf to determine word relevance in document queries[J]. Proceedings of the First Instructional Conference on Machine Learning, 2003,242: 133-142. |
[4] | 李韵, 黄辰林, 王中锋 ,等. 基于机器学习的软件漏洞挖掘方法综述[J]. 软件学报, 2020,31(7): 2040-2061. |
LI Y , HUANG C L , WANG Z F ,et al. Survey of software vulnerability mining methods based on machine learning[J]. Journal of Software, 2020,31(7): 2040-2061. | |
[5] | PETERS M E , NEUMANN M , IYYER M ,et al. Deep contextualized word representations[J]. arXiv Preprint,arXiv:1802.05365, 2018. |
[6] | DEVLIN J , CHANG M W , LEE K ,et al. Bert:pre-training of deep bidirectional transformers for language understanding[J]. arXiv Preprint,arXiv:1810.04805, 2018. |
[7] | BURATTI L , PUJAR S , BORNEA M ,et al. Exploring software naturalness through neural language models[J]. arXiv Preprint,arXiv:2006.12641, 2020. |
[8] | KARAMPATSIS R M , BABII H , ROBBES R ,et al. Big code != big vocabulary:open-vocabulary models for source code[C]// Proceedings of Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. New York:ACM Press, 2020: 1073-1085. |
[9] | BROWN P F , DELLA PIETRA V J , SOUZA P V ,et al. Class-based N-gram models of natural language[J]. Computational Linguistics, 1992,18(4): 467-479. |
[10] | DIETTERICH T G . Ensemble learning[J]. The Handbook of Brain Theory and Neural Networks, 2002,2(1): 110-125. |
[11] | MIKOLOV T , CHEN K , CORRADO G ,et al. Efficient estimation of word representations in vector space[J]. arXiv Preprint,arXiv:1301.3781, 2013. |
[12] | FENG Z Y , GUO D Y , TANG D Y ,et al. Codebert:a pre-trained model for programming and natural languages[J]. arXiv Preprint,arXiv:2002.08155, 2020. |
[13] | GUO D Y , REN S , LU S ,et al. GraphCodeBERT:pre-training code representations with data flow[J]. arXiv Preprint,arXiv:2009.08366, 2020. |
[14] | SALIMI S , EBRAHIMZADEH M , KHARRAZI M . Improving real-world vulnerability characterization with vulnerable slices[C]// Proceedings of Proceedings of the 16th ACM International Conference on Predictive Models and Data Analytics in Software Engineering. New York:ACM Press, 2020: 11-20. |
[15] | LI Z , ZOU D Q , XU S H ,et al. VulDeePecker:a deep learning-based system for vulnerability detection[J]. arXiv Preprint,arXiv:1801.01681, 2018. |
[16] | ZOU D Q , WANG S J , XU S H ,et al. μVulDeePecker:a deep learning-based system for multiclass vulnerability detection[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(5): 2224-2236. |
[17] | LI Z , ZOU D Q , XU S H ,et al. SySeVR:a framework for using deep learning to detect software vulnerabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2021,PP(99): 1. |
[18] | CHOWDHURY I , ZULKERNINE M . Using complexity,coupling,and cohesion metrics as early indicators of vulnerabilities[J]. Journal of Systems Architecture, 2011,57(3): 294-313. |
[19] | MOU L L , LI G , ZHANG L ,et al. Convolutional neural networks over tree structures for programming language processing[J]. arXiv Preprint,arXiv:1409.5718, 2014. |
[20] | ZHOU Y , LIU S , SIOW J ,et al. Devign:effective vulnerability identification by learning comprehensive program semantics via graph neural networks[J]. arXiv Preprint,arXiv:1909.03496, 2019. |
[21] | HINDLE A , BARR E T , GABEL M ,et al. On the naturalness of software[J]. Communications of the ACM, 2016,59(5): 122-131. |
[22] | SCANDARIATO R , WALDEN J , HOVSEPYAN A ,et al. Predicting vulnerable software components via text mining[J]. IEEE Transactions on Software Engineering, 2014,40(10): 993-1006. |
[23] | PENNINGTON J , SOCHER R , MANNING C . Glove:global vectors for word representation[C]// Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). Stroudsburg:Association for Computational Linguistics, 2014: 1532-1543. |
[1] | Shuai LIU, Jie GUAN, Bin HU, Sudong MA. Differential analysis of lightweight cipher algorithm ACE based on MILP [J]. Journal on Communications, 2023, 44(1): 39-48. |
[2] | Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG. Design of efficient anonymous identity authentication protocol for lightweight IoT devices [J]. Journal on Communications, 2022, 43(7): 49-61. |
[3] | Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI. Lightweight decentralized learning-based automatic modulation classification method [J]. Journal on Communications, 2022, 43(7): 134-142. |
[4] | Xinchun YIN, Mengyu WANG, Jianting NING. Lightweight searchable medical data sharing scheme [J]. Journal on Communications, 2022, 43(5): 110-122. |
[5] | Zilong JIANG, Chenhui JIN. Impossible differential cryptanalysis of Saturnin algorithm [J]. Journal on Communications, 2022, 43(3): 53-62. |
[6] | Wei LI, Menglin WANG, Dawu GU, Jiayao LI, Tianpei CAI, Guangwei XU. Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm [J]. Journal on Communications, 2021, 42(3): 135-149. |
[7] | Min XIE,Jiaqi LI,Feng TIAN. Differential fault attack on FeW [J]. Journal on Communications, 2020, 41(4): 143-149. |
[8] | Rongna XIE,Hui LI,Guozhen SHI,Yunchuan GUO. Attribute-based lightweight reconfigurable access control policy [J]. Journal on Communications, 2020, 41(2): 112-122. |
[9] | Yu ZHAO,Jie YANG,Miao LIU,Jinlong SUN,Guan GUI. Federated learning based intelligent edge computing technique for video surveillance [J]. Journal on Communications, 2020, 41(10): 109-115. |
[10] | Xiaonian WU,Yingxin LI,Yongzhuang WEI,Yaping SUN. Impossible differential distinguisher analysis of GRANULE and MANTRA algorithm [J]. Journal on Communications, 2020, 41(1): 94-101. |
[11] | Min XIE,Feng TIAN,Jiaqi LI. Related-key impossible boomerang cryptanalysis on TWINE [J]. Journal on Communications, 2019, 40(9): 184-192. |
[12] | Wei LI,Yixin WU,Dawu GU,Jiayao LI,Shan CAO,Menglin WANG,Tianpei CAI,Xiangwu DING,Zhiqiang LIU. Ciphertext-only fault analysis of the SIMON lightweight cipher [J]. Journal on Communications, 2019, 40(11): 122-137. |
[13] | Yang GAO,Yong-juan WANG,Lei WANG,Tao WANG. Improvement Differential fault attack on TWINE [J]. Journal on Communications, 2017, 38(Z2): 178-184. |
[14] | Min XIE,Yan-li MU. Related-key impossible boomerang cryptanalysis on LBlock [J]. Journal on Communications, 2017, 38(5): 66-71. |
[15] | Yan XIN,Xia FENG,Ting-ting LI. Position related lightweight Sybil detection approach in VANET [J]. Journal on Communications, 2017, 38(4): 110-119. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|