2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) 2022
DOI: 10.1109/issrew55968.2022.00042
|View full text |Cite
|
Sign up to set email alerts
|

VulDeBERT: A Vulnerability Detection System Using BERT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…This approach is evaluated on binary and multi-class vulnerability detection tasks using different datasets (such as VulDeePecker, Draper, and REVEAL). VulDeBERT [25], is another DL-based vulnerability detection system for C and C++ source code based on BERT model. They created their own code gadget generation method to detect the vulnerabilities related to system function calls.…”
Section: ) Vulnerable Code Pattern Identification Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach is evaluated on binary and multi-class vulnerability detection tasks using different datasets (such as VulDeePecker, Draper, and REVEAL). VulDeBERT [25], is another DL-based vulnerability detection system for C and C++ source code based on BERT model. They created their own code gadget generation method to detect the vulnerabilities related to system function calls.…”
Section: ) Vulnerable Code Pattern Identification Techniquesmentioning
confidence: 99%
“…• We start by generating an AST for source code representation, then applying BERT tokenizer for code tokenization. [11], [23], [24], and [25] on the Software Assurance Reference Database (SARD) [26] dataset in terms of precision, recall, and F1-score, with 0.0% FNR which is the lowest amongst the rates reported in the literature. The paper is organized as follows: Section II presents the relevant background and the most related works.…”
Section: Introductionmentioning
confidence: 99%
“…Various approaches have been explored, with many studies leveraging machine learning techniques. Static analysis methods, which extract key features from code for input into machine learning models, have been a focal point of some studies (Kim et al, 2022;Li et al, 2016. In contrast, others have utilized dynamic analysis, where the code is executed, and its behavior monitored to identify vulnerabilities (Alharbi, Hijji & Aljaedi, 2021;Salimi & Kharrazi, 2022).…”
Section: Related Workmentioning
confidence: 99%
“…VulDeeLocator [23] attempts to increase the accuracy of vulnerability analysis by eliminating false alarms using deep learning based on source code analysis. VulDeBERT [24] applied the BERT model to vulnerability logs collected from the static analysis tools to eliminate false positives and enhance the accuracy of vulnerability analysis.…”
Section: Related Studiesmentioning
confidence: 99%
“…VulDeBERT [24] converts information related to variable and function calls from a program's source code into code gadgets. Ambiguous code gadgets that might be misclassified as vulnerabilities are removed.…”
Section: Runtime Error Types and Datasetmentioning
confidence: 99%