BBVD: A BERT-based Method for Vulnerability Detection
نویسندگان
چکیده
Software vulnerability detection is one of the key tasks in field software security. Detecting source code advance can effectively prevent malicious attacks. Traditional methods are often ineffective and inefficient when dealing with large amounts code. In this paper, we present BBVD approach, which treats high-level programming languages as another natural language uses BERT-based models processing domain to automate detection. Our experimental results on both SARD Big-Vul datasets demonstrate good performance proposed detecting vulnerability.
منابع مشابه
islanding detection methods for microgrids
امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...
15 صفحه اولDamage Detection of Axially Loaded Beam: A Frequency-Based Method
The present study utilizes an analytical method to formulate the three lowest modal frequencies of axially-loaded notched beam through both crack location and load level in a specific format that can be used in existing frequency-based crack-identification methods. The proposed formula provides a basis to shift into two states, one with axial loading and the other without any loading whatsoever...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملA Hybrid Method for Mammography Mass Detection Based on Wavelet Transform
Introduction: Breast cancer is a leading cause of death among females throughout the world. Currently, radiologists are able to detect only 75% of breast cancer cases. Making use of computer-aided design (CAD) can play an important role in helping radiologists perform more accurate diagnoses. Material and Methods: Using our hybrid method, the background and the pectoral muscle...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2022
ISSN: ['2158-107X', '2156-5570']
DOI: https://doi.org/10.14569/ijacsa.2022.01312103