[1] |
LIN G J , WEN S , HAN Q L ,et al. Software vulnerability detection using deep neural networks:a survey[J]. Proceedings of the IEEE, 2020,108(10): 1825-1848.
|
[2] |
李珍, 邹德清, 王泽丽 ,等. 面向源代码的软件漏洞静态检测综述[J]. 网络与信息安全学报, 2019,5(1): 1-14.
|
|
LI Z , ZOU D Q , WANG Z L ,et al. Survey on static software vulnerability detection for source code[J]. Chinese Journal of Network and Information Security, 2019,5(1): 1-14.
|
[3] |
RAMOS U J . Using tf-idf to determine word relevance in document queries[J]. Proceedings of the First Instructional Conference on Machine Learning, 2003,242: 133-142.
|
[4] |
李韵, 黄辰林, 王中锋 ,等. 基于机器学习的软件漏洞挖掘方法综述[J]. 软件学报, 2020,31(7): 2040-2061.
|
|
LI Y , HUANG C L , WANG Z F ,et al. Survey of software vulnerability mining methods based on machine learning[J]. Journal of Software, 2020,31(7): 2040-2061.
|
[5] |
PETERS M E , NEUMANN M , IYYER M ,et al. Deep contextualized word representations[J]. arXiv Preprint,arXiv:1802.05365, 2018.
|
[6] |
DEVLIN J , CHANG M W , LEE K ,et al. Bert:pre-training of deep bidirectional transformers for language understanding[J]. arXiv Preprint,arXiv:1810.04805, 2018.
|
[7] |
BURATTI L , PUJAR S , BORNEA M ,et al. Exploring software naturalness through neural language models[J]. arXiv Preprint,arXiv:2006.12641, 2020.
|
[8] |
KARAMPATSIS R M , BABII H , ROBBES R ,et al. Big code != big vocabulary:open-vocabulary models for source code[C]// Proceedings of Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. New York:ACM Press, 2020: 1073-1085.
|
[9] |
BROWN P F , DELLA PIETRA V J , SOUZA P V ,et al. Class-based N-gram models of natural language[J]. Computational Linguistics, 1992,18(4): 467-479.
|
[10] |
DIETTERICH T G . Ensemble learning[J]. The Handbook of Brain Theory and Neural Networks, 2002,2(1): 110-125.
|
[11] |
MIKOLOV T , CHEN K , CORRADO G ,et al. Efficient estimation of word representations in vector space[J]. arXiv Preprint,arXiv:1301.3781, 2013.
|
[12] |
FENG Z Y , GUO D Y , TANG D Y ,et al. Codebert:a pre-trained model for programming and natural languages[J]. arXiv Preprint,arXiv:2002.08155, 2020.
|
[13] |
GUO D Y , REN S , LU S ,et al. GraphCodeBERT:pre-training code representations with data flow[J]. arXiv Preprint,arXiv:2009.08366, 2020.
|
[14] |
SALIMI S , EBRAHIMZADEH M , KHARRAZI M . Improving real-world vulnerability characterization with vulnerable slices[C]// Proceedings of Proceedings of the 16th ACM International Conference on Predictive Models and Data Analytics in Software Engineering. New York:ACM Press, 2020: 11-20.
|
[15] |
LI Z , ZOU D Q , XU S H ,et al. VulDeePecker:a deep learning-based system for vulnerability detection[J]. arXiv Preprint,arXiv:1801.01681, 2018.
|
[16] |
ZOU D Q , WANG S J , XU S H ,et al. μVulDeePecker:a deep learning-based system for multiclass vulnerability detection[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(5): 2224-2236.
|
[17] |
LI Z , ZOU D Q , XU S H ,et al. SySeVR:a framework for using deep learning to detect software vulnerabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2021,PP(99): 1.
|
[18] |
CHOWDHURY I , ZULKERNINE M . Using complexity,coupling,and cohesion metrics as early indicators of vulnerabilities[J]. Journal of Systems Architecture, 2011,57(3): 294-313.
|
[19] |
MOU L L , LI G , ZHANG L ,et al. Convolutional neural networks over tree structures for programming language processing[J]. arXiv Preprint,arXiv:1409.5718, 2014.
|
[20] |
ZHOU Y , LIU S , SIOW J ,et al. Devign:effective vulnerability identification by learning comprehensive program semantics via graph neural networks[J]. arXiv Preprint,arXiv:1909.03496, 2019.
|
[21] |
HINDLE A , BARR E T , GABEL M ,et al. On the naturalness of software[J]. Communications of the ACM, 2016,59(5): 122-131.
|
[22] |
SCANDARIATO R , WALDEN J , HOVSEPYAN A ,et al. Predicting vulnerable software components via text mining[J]. IEEE Transactions on Software Engineering, 2014,40(10): 993-1006.
|
[23] |
PENNINGTON J , SOCHER R , MANNING C . Glove:global vectors for word representation[C]// Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). Stroudsburg:Association for Computational Linguistics, 2014: 1532-1543.
|