2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR) 2019
DOI: 10.1109/msr.2019.00017
|View full text |Cite
|
Sign up to set email alerts
|

Lessons Learned from Using a Deep Tree-Based Model for Software Defect Prediction in Practice

Abstract: Defects are common in software systems and can potentially cause various problems to software users. Different methods have been developed to quickly predict the most likely locations of defects in large code bases. Most of them focus on designing features (e.g. complexity metrics) that correlate with potentially defective code. Those approaches however do not sufficiently capture the syntax and different levels of semantics of source code, an important capability for building accurate prediction models. In th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
99
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 130 publications
(99 citation statements)
references
References 31 publications
0
99
0
Order By: Relevance
“…A recent development is to exploit deep learning, which has a great potential in reducing the burden on human experts for defining features. VulDeePecker [13] is the first system using deep learning to detect vulnerabilities at slice-level, while noting that there are also related studies on using deep learning for vulnerability discovery at the function level [14], [51], defect prediction [15] and related tasks [16]. Above systems are binary classifiers by telling whether a piece of code is vulnerable or not.…”
Section: Pattern-based Vulnerability Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…A recent development is to exploit deep learning, which has a great potential in reducing the burden on human experts for defining features. VulDeePecker [13] is the first system using deep learning to detect vulnerabilities at slice-level, while noting that there are also related studies on using deep learning for vulnerability discovery at the function level [14], [51], defect prediction [15] and related tasks [16]. Above systems are binary classifiers by telling whether a piece of code is vulnerable or not.…”
Section: Pattern-based Vulnerability Detectionmentioning
confidence: 99%
“…These solutions reduce the workload on human experts because they only need to roughly define features for learning machine learning-based models that can detect vulnerabilities, rather than defining vulnerability patterns manually. Compared with traditional machine learning techniques, researchers have started using deep learning for detecting vulnerabilities [13], [14] and software defects [15], [16].…”
Section: Introductionmentioning
confidence: 99%
“…A method is suggested for estimating defectiveness of source code by Kapur and Sodhi [21]. Dam et al [22] introduced a deep tree-based model for software defect prediction.…”
Section: B Code Miningmentioning
confidence: 99%
“…Most of the software defect prediction techniques focus on complexity software metrics of the defective code. These techniques do not capture different levels of source code semantics which are vital elements for constructing a good prediction models [14]. So, Hoa Khanh Dam et al developed a novel prediction model that can learn the features that represent a source code automatically and can be used for prediction.…”
Section: Literature Surveymentioning
confidence: 99%
“…So, Hoa Khanh Dam et al developed a novel prediction model that can learn the features that represent a source code automatically and can be used for prediction. They applied Long Short Term Memory (LSTM) and deep learning techniques [14] for capturing features like structure of programs and their semantic information. Jian.…”
Section: Literature Surveymentioning
confidence: 99%