Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors
Abstract
References
Index Terms
- Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors
Recommendations
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and AnalysisTraditional vulnerability detection methods have limitations due to their need for extensive manual labor. Using automated means for vulnerability detection has attracted research interest, especially deep learning, which has achieved remarkable ...
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringSoftware vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as function-level vulnerability ...
Learning-based Vulnerability Detection in Binary Code
ICMLC '22: Proceedings of the 2022 14th International Conference on Machine Learning and ComputingCyberattacks typically exploit software vulnerabilities to compromise computers and smart devices. To address vulnerabilities, many approaches have been developed to detect vulnerabilities using deep learning. However, most learning-based approaches ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Transactions on Software Engineering and Methodology](/cms/asset/4a0213fc-1fcc-4d3d-8ff9-2393c5cc110f/3618079.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 295Total Downloads
- Downloads (Last 12 months)295
- Downloads (Last 6 weeks)74
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in