ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1803.04497
  4. Cited By
Automated software vulnerability detection with machine learning

Automated software vulnerability detection with machine learning

14 February 2018
Jacob A. Harer
Louis Y. Kim
Rebecca L. Russell
Onur Ozdemir
Leonard Kosta
Akshay Rangamani
Lei H. Hamilton
Gabriel I. Centeno
Jonathan R. Key
Paul M. Ellingwood
Erik Antelman
Alan Mackay
M. McConley
J. M. Opper
Peter Chin
Tomo Lazovich
ArXivPDFHTML

Papers citing "Automated software vulnerability detection with machine learning"

42 / 42 papers shown
Title
LLMSecConfig: An LLM-Based Approach for Fixing Software Container Misconfigurations
LLMSecConfig: An LLM-Based Approach for Fixing Software Container Misconfigurations
Ziyang Ye
T. H. Le
Muhammad Ali Babar
83
0
0
04 Feb 2025
Assessing Vulnerability in Smart Contracts: The Role of Code Complexity Metrics in Security Analysis
Assessing Vulnerability in Smart Contracts: The Role of Code Complexity Metrics in Security Analysis
Masoud Jamshidiyan Tehrani
Sattar Hashemi
111
0
0
26 Nov 2024
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium
  Approach for Binary Vulnerability Detection
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection
Litao Li
Steven H. H. Ding
Andrew Walenstein
P. Charland
Benjamin C. M. Fung
34
0
0
03 Apr 2024
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
B.K. Casey
Joanna C. S. Santos
George Perry
63
5
0
15 Mar 2024
A Survey of Large Language Models in Cybersecurity
A Survey of Large Language Models in Cybersecurity
Gabriel de Jesus Coelho da Silva
Carlos Becker Westphall
37
6
0
26 Feb 2024
A Closer Look at AUROC and AUPRC under Class Imbalance
A Closer Look at AUROC and AUPRC under Class Imbalance
Matthew B. A. McDermott
Lasse Hyldig Hansen
Haoran Zhang
Giovanni Angelotti
Jack Gallifant
46
30
0
11 Jan 2024
VULNERLIZER: Cross-analysis Between Vulnerabilities and Software
  Libraries
VULNERLIZER: Cross-analysis Between Vulnerabilities and Software Libraries
Irdin Pekaric
Michael Felderer
P. Steinmüller
11
2
0
18 Sep 2023
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in
  Source Code Using Neural Networks
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Mst. Shapna Akter
Hossain Shahriar
Juan Rodriguez Cardenas
S. Ahamed
A. Cuzzocrea
41
1
0
01 Jun 2023
Sequential Graph Neural Networks for Source Code Vulnerability
  Identification
Sequential Graph Neural Networks for Source Code Vulnerability Identification
Ammar Ahmed
Anwar Said
Mudassir Shabbir
X. Koutsoukos
GNN
16
0
0
23 May 2023
HyMo: Vulnerability Detection in Smart Contracts using a Novel
  Multi-Modal Hybrid Model
HyMo: Vulnerability Detection in Smart Contracts using a Novel Multi-Modal Hybrid Model
M. Khodadadi
J. Tahmoresnezhad
9
4
0
25 Apr 2023
Beware of the Unexpected: Bimodal Taint Analysis
Beware of the Unexpected: Bimodal Taint Analysis
Yiu Wai Chow
Max Schäfer
Michael Pradel
28
15
0
25 Jan 2023
A Structural Approach to the Design of Domain Specific Neural Network
  Architectures
A Structural Approach to the Design of Domain Specific Neural Network Architectures
Gerrit Nolte
13
0
0
23 Jan 2023
Open RAN Security: Challenges and Opportunities
Open RAN Security: Challenges and Opportunities
Madhusanka Liyanage
An Braeken
Shahriar Shahabuddin
Pasika Sashmal Ranaweera
39
84
0
03 Dec 2022
DCDetector: An IoT terminal vulnerability mining system based on distributed deep ensemble learning under source code representation
Wen Zhou
16
0
0
29 Nov 2022
Test2Vec: An Execution Trace Embedding for Test Case Prioritization
Test2Vec: An Execution Trace Embedding for Test Case Prioritization
E. Jabbar
Soheila Zangeneh
Hadi Hemmati
R. Feldt
54
5
0
28 Jun 2022
An Exploratory Study on Code Attention in BERT
An Exploratory Study on Code Attention in BERT
Rishab Sharma
Fuxiang Chen
Fatemeh H. Fard
David Lo
27
25
0
05 Apr 2022
LAMNER: Code Comment Generation Using Character Language Model and Named
  Entity Recognition
LAMNER: Code Comment Generation Using Character Language Model and Named Entity Recognition
Rishab Sharma
Fuxiang Chen
Fatemeh H. Fard
50
2
0
05 Apr 2022
Featherweight Assisted Vulnerability Discovery
Featherweight Assisted Vulnerability Discovery
D. Binkley
Leon Moonen
Sibren Isaacman
AAML
13
0
0
06 Feb 2022
Predicting sensitive information leakage in IoT applications using
  flows-aware machine learning approach
Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach
H. Naeem
Manar H. Alalfi
31
1
0
07 Jan 2022
VarCLR: Variable Semantic Representation Pre-training via Contrastive
  Learning
VarCLR: Variable Semantic Representation Pre-training via Contrastive Learning
Qibin Chen
Jeremy Lacomis
Edward J. Schwartz
Graham Neubig
Bogdan Vasilescu
Claire Le Goues
VLM
24
35
0
05 Dec 2021
Social Media Monitoring for IoT Cyber-Threats
Social Media Monitoring for IoT Cyber-Threats
Sofia Alevizopoulou
Paris Koloveas
Christos Tryfonopoulos
Paraskevi Raftopoulou
11
6
0
09 Sep 2021
Software Vulnerability Detection via Deep Learning over Disaggregated
  Code Graph Representation
Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Yufan Zhuang
Sahil Suneja
Veronika Thost
Giacomo Domeniconi
Alessandro Morari
Jim Laredo
GNN
27
15
0
07 Sep 2021
Vulnerability Detection with Fine-grained Interpretations
Vulnerability Detection with Fine-grained Interpretations
Yi Li
Shaohua Wang
T. Nguyen
AAML
24
212
0
19 Jun 2021
On using distributed representations of source code for the detection of
  C security vulnerabilities
On using distributed representations of source code for the detection of C security vulnerabilities
D. Coimbra
Sofia Reis
Rui Abreu
Corina Puasuareanu
H. Erdogmus
28
18
0
01 Jun 2021
SPI: Automated Identification of Security Patches via Commits
SPI: Automated Identification of Security Patches via Commits
Yaqin Zhou
J. Siow
Chenyu Wang
Shangqing Liu
Yang Liu
11
61
0
30 May 2021
A comparative study of neural network techniques for automatic software
  vulnerability detection
A comparative study of neural network techniques for automatic software vulnerability detection
Gaigai Tang
Lianxiao Meng
Shuangyin Ren
Weipeng Cao
Qiang Wang
Lin Yang
15
17
0
29 Apr 2021
Multi-context Attention Fusion Neural Network for Software Vulnerability
  Identification
Multi-context Attention Fusion Neural Network for Software Vulnerability Identification
Anshul Tanwar
Hariharan Manikandan
Krishnan Sundaresan
Prasanna Ganesan
Sathish Kumar Chandrasekaran
S. Ravi
AAML
14
6
0
19 Apr 2021
Exploiting Method Names to Improve Code Summarization: A Deliberation
  Multi-Task Learning Approach
Exploiting Method Names to Improve Code Summarization: A Deliberation Multi-Task Learning Approach
Rui Xie
Wei Ye
Jinan Sun
Shikun Zhang
28
26
0
21 Mar 2021
Embedding Code Contexts for Cryptographic API Suggestion:New
  Methodologies and Comparisons
Embedding Code Contexts for Cryptographic API Suggestion:New Methodologies and Comparisons
Ya Xiao
Salman Ahmed
Wen-Kai Song
Xinyang Ge
Bimal Viswanath
D. Yao
13
4
0
15 Mar 2021
Learning to Make Compiler Optimizations More Effective
Learning to Make Compiler Optimizations More Effective
Rahim Mammadli
Marija Selakovic
F. Wolf
Michael Pradel
21
13
0
24 Feb 2021
PalmTree: Learning an Assembly Language Model for Instruction Embedding
PalmTree: Learning an Assembly Language Model for Instruction Embedding
Xuezixiang Li
Qu Yu
Heng Yin
24
144
0
21 Jan 2021
STRATA: Simple, Gradient-Free Attacks for Models of Code
STRATA: Simple, Gradient-Free Attacks for Models of Code
Jacob Mitchell Springer
Bryn Reinstadler
Una-May O’Reilly
AAML
33
8
0
28 Sep 2020
Multimodal Deep Learning for Flaw Detection in Software Programs
Multimodal Deep Learning for Flaw Detection in Software Programs
S. Heidbrink
Kathryn N. Rodhouse
Daniel M. Dunlavy
14
7
0
09 Sep 2020
Learning to map source code to software vulnerability using
  code-as-a-graph
Learning to map source code to software vulnerability using code-as-a-graph
Sahil Suneja
Yunhui Zheng
Yufan Zhuang
Jim Laredo
Alessandro Morari
11
30
0
15 Jun 2020
SCELMo: Source Code Embeddings from Language Models
SCELMo: Source Code Embeddings from Language Models
Rafael-Michael Karampatsis
Charles Sutton
24
51
0
28 Apr 2020
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector
Zhuguo Li
Deqing Zou
Shouhuai Xu
Zhaoxuan Chen
Yawei Zhu
Hai Jin
23
182
0
08 Jan 2020
IdBench: Evaluating Semantic Representations of Identifier Names in
  Source Code
IdBench: Evaluating Semantic Representations of Identifier Names in Source Code
Yaza Wainakh
Moiz Rauf
Michael Pradel
10
5
0
11 Oct 2019
ArduCode: Predictive Framework for Automation Engineering
ArduCode: Predictive Framework for Automation Engineering
A. Canedo
Palash Goyal
Di Huang
Amit Pandey
Gustavo Quiros
AI4CE
11
6
0
06 Sep 2019
Neural Bug Finding: A Study of Opportunities and Challenges
Neural Bug Finding: A Study of Opportunities and Challenges
Andrew Habib
Michael Pradel
14
17
0
01 Jun 2019
A Literature Study of Embeddings on Source Code
A Literature Study of Embeddings on Source Code
Zimin Chen
Monperrus Martin
49
82
0
05 Apr 2019
Learning to Repair Software Vulnerabilities with Generative Adversarial
  Networks
Learning to Repair Software Vulnerabilities with Generative Adversarial Networks
Jacob A. Harer
Onur Ozdemir
Tomo Lazovich
Christopher P. Reale
Rebecca L. Russell
Louis Y. Kim
Peter Chin
GAN
21
71
0
18 May 2018
Convolutional Neural Networks for Sentence Classification
Convolutional Neural Networks for Sentence Classification
Yoon Kim
AILaw
VLM
309
13,373
0
25 Aug 2014
1