Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Enginee 2022
DOI: 10.1145/3540250.3549098
|View full text |Cite
|
Sign up to set email alerts
|

VulRepair: a T5-based automated software vulnerability repair

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 83 publications
(52 citation statements)
references
References 35 publications
0
52
0
Order By: Relevance
“…Besides, researchers use long short-term memory (LSTM) architecture to capture the long-distance dependencies among code sequences [20,107]. Recently, as a variant of the Seq2Seq model, Transformer [150] has been considered the state-of-the-art NMT repair architecture due to the self-attention mechanism [25,26,40].…”
Section: Neural Machine Translationmentioning
confidence: 99%
See 3 more Smart Citations
“…Besides, researchers use long short-term memory (LSTM) architecture to capture the long-distance dependencies among code sequences [20,107]. Recently, as a variant of the Seq2Seq model, Transformer [150] has been considered the state-of-the-art NMT repair architecture due to the self-attention mechanism [25,26,40].…”
Section: Neural Machine Translationmentioning
confidence: 99%
“…More importantly, it is pretty difficult for repair models to meaningful input representations as characters alone do not have semantic meaning. Generally, there exist two main granularities of code tokenizers used in learning-based APR techniques: word-level tokenizers and [40] and subword-level tokenization [26].…”
Section: Code Tokenizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Stable and secure software complexes attract a large customer base. According to S. Pooja [1], which is based on an analysis of The National Vulnerability Database (NVD) (USA), over the past three years, the number of digital code vulnerabilities has increased by 26.6% (2019 -17.3 thousand records / 2021 -21.9 thousand records), data from M. Fu [2] points to the rapid growth of software code vulnerabilities -in 5 times during the last decade, J. Zhou [3] points out that about 64% of the core software of the banks of the global financial community have digital code vulnerabilities, which according to 2021 is estimated in the losses from cybercrime of $ 6 trillion. Analysis of the data presented in the aforementioned publications, as well as in other relevant publications on the specified research vector [4][5][6][7][8][9][10][11][12][13], allows us to come to the following conclusion: 90% of software vulnerabilities are caused by the violations and defects in the source code, 21% of incidents involving loss of confidential data are caused by vulnerabilities in the digital code of software products used, every third software application being implemented and used at present has a digital code body, and in 1000 lines of software code it is revealed up to 60 % of the vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%