[1] |
李韵, 黄辰林, 王中锋 ,等. 基于机器学习的软件漏洞挖掘方法综述[J]. 软件学报, 2020,31(7): 2040-2061.
|
|
LI Y , HUANG C L , WANG Z F ,et al. Survey of software vulnerability mining methods based on machine learning[J]. Journal of Software, 2020,31(7): 2040-2061.
|
[2] |
陈肇炫, 邹德清, 李珍 ,等. 基于抽象语法树的智能化漏洞检测系统[J]. 信息安全学报, 2020,5(4): 1-13.
|
|
CHEN Z X , ZOU D Q , LI Z ,et al. Intelligent vulnerability detection system based on abstract syntax tree[J]. Journal of Cyber Security, 2020,5(4): 1-13.
|
[3] |
LI Z , ZOU D Q , XU S H ,et al. VulDeePecker:a deep learning-based system for vulnerability detection[C]// The Network and Distributed System Security Symposium. 2018.
|
[4] |
XIAO Y , CHEN B H , YU C D ,et al. MVP:Detecting vulnerabilities using patch-enhanced vulnerability signatures[C]// USENIX Security Symposium. 2018.
|
[5] |
GUSTAVO G , GUILLERMO L G , UZAL L ,et al. Toward large-scale vulnerability discovery using machine learning[C]// The 6th ACM on Conference on Data and Application Security and Privacy (CODASPY'16). 2016: 85-96.
|
[6] |
STEPHAN N , THOMAS Z , CHRISTIAN H ,et al. Predicting vulnerable software components[C]// 2007 ACM Conference on Computer and Communications Security (CCS'07). 2007: 529-540.
|
[7] |
FABIAN Y , MARKUS L , KONRAD R . Generalized vulnerability extrapolation using abstract syntax trees[C]// The 28th Annual Computer Security Applications Conference. 2012: 359-368.
|
[8] |
FABIAN Y , ALWIN M , HUGO G ,et al. Automatic inference of search patterns for taint-style vulnerabilities[C]// IEEE Symposium on Security and Privacy (S&P'15). 2015: 797-812.
|
[9] |
ZOU D Q , WANG S J , XU S H ,et al. ?VulDeePecker:a deep learning-based system for multiclass vulnerability detection[J]. IEEE Transactions on Dependable and Secure Computing, 2021,15(5): 2224-2236.
|
[10] |
LI Z , ZOU D Q , XU S H ,et al. VulDeeLocator:a deep learning-based fine-grained vulnerability detector[J]. IEEE Transactions on Dependable and Secure Computing, 2021.
|
[11] |
LI Z , ZOU D Q , XU S H ,et al. SySeVR:a Framework for using deep learning to detect software vulnerabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2021.
|
[12] |
LIN G J , XIAO W , ZHANG J ,et al. Deep Learning-based vulnerable function detection:a benchmark[C]// The 21st International Conference on Information and Communications Security. 2019: 219-232.
|
[13] |
LIN G J , ZHANG J , LUO W ,et al. POSTER:vulnerability discovery with function representation learning from unlabeled projects[C]// ACM SIGSAC Conference on Computer and Communications Security. 2017: 2539-2541.
|
[14] |
LIN G J , ZHANG J , LUO W ,et al. Cross-project transfer representation learning for vulnerable function discovery[J]. IEEE Trans Industrial Informatics, 2018,14(7): 329-3297.
|
[15] |
LIU S G , LIN G J , QU L Z ,et al. CD-VulD:cross-domain vulnerability discovery based on deep domain adaptation[J]. IEEE Transactions on Dependable and Secure Computing, 2020.
|
[16] |
VAN N , TRUNG L , TUE L ,et al. Deep domain adaptation for vulnerable code function identification[C]// International Joint Conference on Neural Networks. 2019: 1-8.
|
[17] |
REBECCA , LOUISK , LEI H , ET A L . Automated vulnerability detection in source code using deep representation learning[C]// The 17th IEEE International Conference on Machine Learning and Applications(ICMLA). 2018: 757-762.
|
[18] |
TIM S , . Machine-learning supported vulnerability detection in source code[C]// The 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering(ESEC/FSE). 2019: 1180-1183.
|
[19] |
WANG H T , YE G X , TANG Z Y ,et al. Combining graph-based learning with automated data collection for code vulnerability detection[J]. IEEE Transactions on Dependable and Secure Computing. 2020.
|
[20] |
DUAN X , WU H , JI S L ,et al. VulSniper:focus your attention to shoot fine-grained vulnerabilities[C]// The 28th International Joint Conference on Artificial Intelligence. 2019: 4665-4671.
|
[21] |
ZHOU Y Q , LIU S Q , SIOW J ,et al. Devign:effective vulnerability identification by learning comprehensive program semantics via graph neural networks[C]// Annual Conference on Neural Information Processing Systems(NeurIPS). 2019: 10197-10207.
|