Results 31 to 40 of about 100,345 (312)
Symbolic execution is well known as a dynamic vulnerability discovery technique. Its greatest advantage is the capability to analyze the execution information of the program and to explore the path in the program deterministically.
Xinglu He, Pengfei Wang, Kai Lu, Xu Zhou
doaj +1 more source
JACLNet:Application of adaptive code length network in JavaScript malicious code detection.
Currently, JavaScript malicious code detection methods are becoming more and more effective. Still, the existing methods based on deep learning are poor at detecting too long or too short JavaScript code.
Zhining Zhang +5 more
doaj +1 more source
FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis
To handle relentlessly emerging Android malware, deep learning has been widely adopted in the research community. Prior work proposed deep learning-based approaches that use different features of malware, and reported a high accuracy in malware detection,
Younghoon Ban +4 more
doaj +1 more source
Code Embedding Method Based on Neural Network [PDF]
There are many application scenarios for code analysis and research,such as code plagiarism detection and software vulnerability search.With the development of artificial intelligence,neural network technology has been widely used in code analysis and ...
SUN Xuekai, JIANG Liehui
doaj +1 more source
Automatic Code Annotation Generation Based on Multi-dimensional Heterogeneous Graph Structure [PDF]
The task of automatic code annotation generation has become a research hotspot considering code annotations can enhance the readability of source code and assist the software development process.While some researchers have exploited the sequence ...
RONG Keyao, XIONG Yun
doaj +1 more source
Synthesis Algorithm of Homology Detection Based on AHP [PDF]
Traditional software homology detection techniques based on text, token, abstract syntax tree in many cases get the real similarity inaccurately when they work alone.
Baojiang Cui +5 more
doaj +1 more source
Smart Contract Vulnerability Detection Technology Based on Abstract Syntax Tree Embedding [PDF]
Currently, in deep learning-based smart contract vulnerability detection solutions, the direct use of bytecode or source code for textual sequence feature representation lacks a comprehensive understanding of program semantics.
XU Ying, FU Ziwei, ZHANG Wei, CHEN Yunfang
doaj +1 more source
A Novel Refactoring and Semantic Aware Abstract Syntax Tree Differencing Tool and a Benchmark for Evaluating the Accuracy of Diff Tools [PDF]
Software undergoes constant changes to support new requirements, address bugs, enhance performance, and ensure maintainability. Thus, developers spend a great portion of their workday trying to understand and review the code changes of their teammates ...
Pouria Alikhanifard, Nikolaos Tsantalis
semanticscholar +1 more source
Generalized vulnerability extrapolation using abstract syntax trees [PDF]
The discovery of vulnerabilities in source code is a key for securing computer systems. While specific types of security flaws can be identified automatically, in the general case the process of finding vulnerabilities cannot be automated and vulnerabilities are mainly discovered by manual analysis.
Fabian Yamaguchi +2 more
openaire +1 more source
Code Clone Detection Based on Program Vector Tree
Code cloning facilitates software development but also causes recurring bugs and software quality problems. Some types of code clones have very low similarity in literal, leading to difficulty of detection.
ZENG Jie, BEN Kerong, ZHANG Xian, LI Xiaowei, ZHOU Quan
doaj +1 more source

