2020
DOI: 10.1109/access.2020.3011909
|View full text |Cite
|
Sign up to set email alerts
|

Code Characterization With Graph Convolutions and Capsule Networks

Abstract: We propose SiCaGCN, a learning system to predict the similarity of a given software code to a set of codes that are permitted to run on a computational resource, such as a supercomputer or a cloud server. This code characterization allows us to detect abusive codes. Our system relies on a structural analysis of the control-flow graph of the software codes and two different graph similarity measures: Graph Edit Distance (GED) and a singular values based metric. SiCaGCN combines elements of Graph Convolutional N… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…While in reality, when testing and evaluating software vulnerabilities, there is a big difference between vulnerable and non-vulnerable source code about record counts. Because of these problems, recent studies often focus on combining graph analysis techniques with machine learning or deep learning algorithms [3,4,12,13,14,15,16]. Accordingly, the approaches often extract source code into graphs such as Abstract syntax tree (AST) [17], Control Flow Graph (CFG) [18], and Program Dependence Graph (PDG) [19], and then use machine learning or deep learning techniques to classify vulnerable and nonvulnerable source code.…”
Section: Problemmentioning
confidence: 99%
“…While in reality, when testing and evaluating software vulnerabilities, there is a big difference between vulnerable and non-vulnerable source code about record counts. Because of these problems, recent studies often focus on combining graph analysis techniques with machine learning or deep learning algorithms [3,4,12,13,14,15,16]. Accordingly, the approaches often extract source code into graphs such as Abstract syntax tree (AST) [17], Control Flow Graph (CFG) [18], and Program Dependence Graph (PDG) [19], and then use machine learning or deep learning techniques to classify vulnerable and nonvulnerable source code.…”
Section: Problemmentioning
confidence: 99%
“…Moreover, DL applicability is also found in several areas, such as fraud detection, AD, consensus optimization, and privacy-preserving smart contracts. In summary, the collaboration among researchers from academic and government institutions has resulted in the development of SiCaGCN [235]. In the current BC landscape, scalability poses a significant bottleneck as transaction frequency increases, impeding the overall growth of BC systems.…”
Section: ) Dl/graph Convolutional Neural Network (Gcn) Enabled Tackli...mentioning
confidence: 99%
“…Nowadays, investments in cryptocurrencies are more reliable than before. For example, many researchers are working on the security of cryptocurrencies to prevent cryptojacking [19] [25]. Plenty of research is already carried out to make crypto mining efficient by reducing the mining cost [26].…”
Section: A Preliminariesmentioning
confidence: 99%
“…Also, the researchers, companies, startups, and universities across the globe are working to make this new technology more reliable, mature, and secure. Many researchers are working to make crypto mining more efficient, cheaper [17], [18] and to prevent cryptojacking [19].…”
Section: Introductionmentioning
confidence: 99%