Function Level Code Vulnerability Detection Method of Graph Neural Network Based on Extended AST [PDF]
With the increase of software vulnerabilities year by year,security problems are becoming more and more serious.Vulnerability detection of original code in the delivery stage of software project can effectively avoid security vulnerabilities in later run-
GU Shouke, CHEN Wen
doaj +1 more source
Understanding the Influence of AST-JS for Improving Malicious Webpage Detection
JavaScript-based attacks injected into a webpage to perpetrate malicious activities are still the main problem in web security. Recent works have leveraged advances in artificial intelligence by considering many feature representations to improve the ...
Muhammad Fakhrur Rozi+5 more
doaj +1 more source
Barat - a front end for java [PDF]
This paper presents a front-end for Java, called Barat, that supports static analysis of Java programs. Barat builds a complete abstract syntax tree from Java source code files, enriched with name and type analysis information.
Bokowski, Boris, Spiegel, André
core +1 more source
RDF Modelling and SPARQL Processing of SQL Abstract Syntax Trees
Most enterprise systems rely on relational databases, and therefore SQL queries, to populate dynamic documents such as business intelligence reports, dashboards or spreadsheets. These queries represent metadata about the documents, thus they can feed information retrieval systems such as recommender systems or search engines.
Corentin Follenfant+3 more
openalex +3 more sources
An algorithm for generating abstract syntax trees [PDF]
The notion of an abstract syntax is discussed. An algorithm is presented for automatically deriving an abstract syntax directly from a BNF grammar. The implementation of this algorithm and its application to the grammar for Modula are discussed.
openaire +2 more sources
Clone Detection and Elimination for Haskell [PDF]
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code makes maintenance and code understanding more complex and time consuming.
Brown, Christopher, Thompson, Simon
core +1 more source
Software defect prediction using hybrid model (CBIL) of convolutional neural network (CNN) and bidirectional long short-term memory (Bi-LSTM) [PDF]
In recent years, the software industry has invested substantial effort to improve software quality in organizations. Applying proactive software defect prediction will help developers and white box testers to find the defects earlier, and this will ...
Ahmed Bahaa Farid+3 more
doaj +2 more sources
A Grammatical Inference Approach to Language-Based Anomaly Detection in XML [PDF]
False-positives are a problem in anomaly-based intrusion detection systems. To counter this issue, we discuss anomaly detection for the eXtensible Markup Language (XML) in a language-theoretic view.
Lampesberger, Harald
core +1 more source
READSUM: Retrieval-Augmented Adaptive Transformer for Source Code Summarization
Code summarization is the process of automatically generating brief and informative summaries of source code to aid in software comprehension and maintenance.
Yunseok Choi+3 more
doaj +1 more source
Pointer Analysis for C Programs Through AST Traversal [PDF]
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantled intermediate form of the source program, making them difficult to apply ...
Buss, Marcio+3 more
core +2 more sources