A Survey of Using Machine Learning to Detect Vulnerability Based on Source Code
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 오희국 | - |
dc.date.accessioned | 2025-04-01T06:01:26Z | - |
dc.date.available | 2025-04-01T06:01:26Z | - |
dc.date.issued | 2021-06 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/122426 | - |
dc.description.abstract | With the rise of the artificial intelligence industry, many machine learning methods have tried to solve the problem of software vulnerability mining. In this way to reduce the high false positive rate and high false negative rate of traditional vulnerability mining methods. In order to better preserve the semantic features of the code, it is necessary to convert the code into an intermediate representation, and convert the intermediate representation into a vector for machine learning. This paper introduce the intermediate representation form as the classification basis to classify and integrate the existing source code-based research, find out the challenges in the field of using machine learning to detect vulnerabilities, and look forward to the development trend of this field. | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.title | A Survey of Using Machine Learning to Detect Vulnerability Based on Source Code | - |
dc.type | Conference | - |
dc.citation.title | 한국정보보호학회 하계학술대회 | - |
dc.citation.volume | 31 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 604 | - |
dc.citation.endPage | 607 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.