A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

A systematic literature review on automated software vulnerability detection using machine learning

N Shiri Harzevili, A Boaye Belle, J Wang… - ACM Computing …, 2024 - dl.acm.org
In recent years, numerous Machine Learning (ML) models, including Deep Learning (DL)
and classic ML models, have been developed to detect software vulnerabilities. However …

Linevul: A transformer-based line-level vulnerability prediction

M Fu, C Tantithamthavorn - … of the 19th International Conference on …, 2022 - dl.acm.org
Software vulnerabilities are prevalent in software systems, causing a variety of problems
including deadlock, information loss, or system failures. Thus, early predictions of software …

LineVD: statement-level vulnerability detection using graph neural networks

D Hin, A Kan, H Chen, MA Babar - Proceedings of the 19th international …, 2022 - dl.acm.org
Current machine-learning based software vulnerability detection methods are primarily
conducted at the function-level. However, a key limitation of these methods is that they do …

Data quality for software vulnerability datasets

R Croft, MA Babar, MM Kholoosi - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
The use of learning-based techniques to achieve automated software vulnerability detection
has been of longstanding interest within the software security domain. These data-driven …

MVD: memory-related vulnerability detection based on flow-sensitive graph neural networks

S Cao, X Sun, L Bo, R Wu, B Li, C Tao - Proceedings of the 44th …, 2022 - dl.acm.org
Memory-related vulnerabilities constitute severe threats to the security of modern software.
Despite the success of deep learning-based approaches to generic vulnerability detection …

An empirical study of deep learning models for vulnerability detection

B Steenhoek, MM Rahman, R Jiles… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Deep learning (DL) models of code have recently reported great progress for vulnerability
detection. In some cases, DL-based models have outperformed static analysis tools …

Sok: Explainable machine learning for computer security applications

A Nadeem, D Vos, C Cao, L Pajola… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …

Multitask-based evaluation of open-source llm on software vulnerability

X Yin, C Ni, S Wang - IEEE Transactions on Software …, 2024 - ieeexplore.ieee.org
This paper proposes a pipeline for quantitatively evaluating interactive Large Language
Models (LLMs) using publicly available datasets. We carry out an extensive technical …

Vulexplainer: A transformer-based hierarchical distillation for explaining vulnerability types

M Fu, V Nguyen, CK Tantithamthavorn… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Deep learning-based vulnerability prediction approaches are proposed to help under-
resourced security practitioners to detect vulnerable functions. However, security …