2022
DOI: 10.36227/techrxiv.19783456.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Vulnerability Detection With Graph Attention Network And Metric Learning

Abstract: Static code vulnerability detection is a critical topic in software security. Existing software analysis methods have a high rate of false positives and false negatives. Researchers are interested in employing deep learning to discover vulnerabilities automatically, thanks to the recent success of deep learning algorithms in other application domains.This paper aims at the problem of insufficient and effective extraction of syntax and semantics, the issue of data imbalance, and the problem of overlapping featu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 49 publications
0
2
0
Order By: Relevance
“…In addition, Self-attention calculates the similarity between all nodes pairwise, resulting in a quadratic computational complexity. To alleviate this problem, methods (Dwivedi and Bresson 2020;Zhang et al 2020a) limit the number of nodes involved in computation through sampling. However, the sampling strategies are still node-centric rather than link-centric.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, Self-attention calculates the similarity between all nodes pairwise, resulting in a quadratic computational complexity. To alleviate this problem, methods (Dwivedi and Bresson 2020;Zhang et al 2020a) limit the number of nodes involved in computation through sampling. However, the sampling strategies are still node-centric rather than link-centric.…”
Section: Related Workmentioning
confidence: 99%
“…It can be seen that traditional approaches use only graph networks to extract CPG. Zhang et al [38] proposed a combined model of the Graph Attention Network and Metric Learning to extract and classify source code vulnerabilities based on CPG. Consequently, he used a Graph Attention Network to extract information of the source code based on CPG and used Metric Learning for classification.…”
Section: Related Studiesmentioning
confidence: 99%