BBVD: A BERT-based Method for Vulnerability Detection

نویسندگان

چکیده

Software vulnerability detection is one of the key tasks in field software security. Detecting source code advance can effectively prevent malicious attacks. Traditional methods are often ineffective and inefficient when dealing with large amounts code. In this paper, we present BBVD approach, which treats high-level programming languages as another natural language uses BERT-based models processing domain to automate detection. Our experimental results on both SARD Big-Vul datasets demonstrate good performance proposed detecting vulnerability.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

islanding detection methods for microgrids

امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...

15 صفحه اول

Damage Detection of Axially Loaded Beam: A Frequency-Based Method

The present study utilizes an analytical method to formulate the three lowest modal frequencies of axially-loaded notched beam through both crack location and load level in a specific format that can be used in existing frequency-based crack-identification methods. The proposed formula provides a basis to shift into two states, one with axial loading and the other without any loading whatsoever...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

A Hybrid Method for Mammography Mass Detection Based on Wavelet Transform

Introduction:  Breast  cancer  is  a  leading  cause  of  death  among  females  throughout  the  world.  Currently,  radiologists are able to detect only 75% of breast cancer cases. Making use of computer-aided design (CAD)  can play an important role in helping radiologists perform more accurate diagnoses.   Material and Methods: Using our hybrid method, the background and the pectoral muscle...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2022

ISSN: ['2158-107X', '2156-5570']

DOI: https://doi.org/10.14569/ijacsa.2022.01312103