With the advancement of deep learning (DL) in various fields, there are many attempts to reveal software vulnerabilities by data-driven approach. Nonetheless, such existing works lack the effective representation that can retain the non-sequential semantic characteristics and contextual relationship of source code attributes. Hence, in this work, we propose XGV-BERT, a framework that combines the pre-trained CodeBERT model and Graph Neural Network (GCN) to detect software vulnerabilities. By jointly training the CodeBERT and GCN modules within XGV-BERT, the proposed model leverages the advantages of large-scale pre-training, harnessing vast raw data, and transfer learning by learning representations for training data through graph convoluti...
Static bug detection has shown its effectiveness in detecting well-defined memory errors, e.g., memo...
Due to the continuous digitalization of our society, distributed and web-based applications become o...
There is an increasing trend to mine vulnerabilities from software repositories and use machine lear...
AbstractDetecting source code vulnerabilities is an essential issue today. In this paper, to improve...
One of the most important challenges in the field of a software code audit is the presence of vulner...
In recent years, with the rise of Internet technology, software vulnerabilities have also flooded, m...
Detecting source-code level vulnerabilities at the development phase is a cost-effective solution to...
Vulnerability detection is a critical problem in software security and attracts growing attention bo...
The identification of vulnerabilities is an important element of the software development process to...
Deep learning-based vulnerability detection has shown great performance and, in some studies, outper...
The object of research of this work is the methods of deep learning for source code vulnerability de...
Security vulnerabilities in source code are traditionally detected manually by software developers b...
The object of research of this work is the methods of deep learning for source code vulnerability de...
Attackers exploiting vulnerabilities in software can cause severe damage to affected victims. Despit...
The ubiquitousness of software in modern society and the boom in open-source software have made soft...
Static bug detection has shown its effectiveness in detecting well-defined memory errors, e.g., memo...
Due to the continuous digitalization of our society, distributed and web-based applications become o...
There is an increasing trend to mine vulnerabilities from software repositories and use machine lear...
AbstractDetecting source code vulnerabilities is an essential issue today. In this paper, to improve...
One of the most important challenges in the field of a software code audit is the presence of vulner...
In recent years, with the rise of Internet technology, software vulnerabilities have also flooded, m...
Detecting source-code level vulnerabilities at the development phase is a cost-effective solution to...
Vulnerability detection is a critical problem in software security and attracts growing attention bo...
The identification of vulnerabilities is an important element of the software development process to...
Deep learning-based vulnerability detection has shown great performance and, in some studies, outper...
The object of research of this work is the methods of deep learning for source code vulnerability de...
Security vulnerabilities in source code are traditionally detected manually by software developers b...
The object of research of this work is the methods of deep learning for source code vulnerability de...
Attackers exploiting vulnerabilities in software can cause severe damage to affected victims. Despit...
The ubiquitousness of software in modern society and the boom in open-source software have made soft...
Static bug detection has shown its effectiveness in detecting well-defined memory errors, e.g., memo...
Due to the continuous digitalization of our society, distributed and web-based applications become o...
There is an increasing trend to mine vulnerabilities from software repositories and use machine lear...