{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T14:44:51Z","timestamp":1750689891464,"version":"3.40.3"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031230196"},{"type":"electronic","value":"9783031230202"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-23020-2_1","type":"book-chapter","created":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T07:03:04Z","timestamp":1670310184000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Vulnerability Detection Using Deep Learning Based Function Classification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2162-7331","authenticated-orcid":false,"given":"Huihui","family":"Gong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3479-5713","authenticated-orcid":false,"given":"Siqi","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6353-8359","authenticated-orcid":false,"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4756-0609","authenticated-orcid":false,"given":"Chang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,7]]},"reference":[{"key":"1_CR1","unstructured":"Apple: Clang Static Analyzer. https:\/\/clang-analyzer.llvm.org\/"},{"key":"1_CR2","unstructured":"Atwood, J., Spolsky, J.: Stack overflow. https:\/\/stackoverflow.com\/"},{"key":"1_CR3","unstructured":"Corporation, C.P.B.: The Linux Kernel Archives. https:\/\/www.kernel.org\/"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Gens, D., Schmitt, S., Davi, L., Sadeghi, A.R.: K-Miner: Uncovering memory corruption in Linux. In: Network and Distributed System Security Symposium (2018)","DOI":"10.14722\/ndss.2018.23326"},{"key":"1_CR5","unstructured":"Google: Google Web Trillion Word Corpus. https:\/\/ai.googleblog.com\/2006\/08\/all-our-n-gram-are-belong-to-you.html"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Grieco, G., Grinblat, G.L., Uzal, L.C., Rawat, S., Feist, J., Mounier, L.: Toward large-scale vulnerability discovery using machine learning. In: ACM Conference on Data and Application Security and Privacy (2016)","DOI":"10.1145\/2857705.2857720"},{"key":"1_CR7","unstructured":"Gu, Y., et al.: Domain-specific language model pretraining for biomedical natural language processing. arXiv preprint arXiv:2007.15779 (2020)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Gu, Z., Wu, J., Li, C., Zhou, M., Gu, M.: SSLDoc: automatically diagnosing incorrect SSL API Usages in C Programs. In: International Conference on Software Engineering and Knowledge Engineering (2019)","DOI":"10.18293\/SEKE2019-006"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. arXiv preprint arXiv:1512.03385 (2015)","DOI":"10.1109\/CVPR.2016.90"},{"key":"1_CR10","unstructured":"Huo, X., Li, M., Zhou, Z.: Learning unified features from natural and programming languages for locating buggy source code. In: International Joint Conference on Artificial Intelligence (2016)"},{"key":"1_CR11","unstructured":"Jenks, G.: Python word segmentation. https:\/\/pypi.org\/project\/wordsegment\/"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Johnson, R., Zhang, T.: Deep pyramid convolutional neural networks for text categorization. In: Annual Meeting of the Association for Computational Linguistics (2017)","DOI":"10.18653\/v1\/P17-1052"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of tricks for efficient text classification. In: Conference of the European Chapter of the Association for Computational Linguistics (2017)","DOI":"10.18653\/v1\/E17-2068"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Kim, S., Woo, S., Lee, H., Oh, H.: VUDDY: a scalable approach for vulnerable code clone discovery. In: IEEE Symposium on Security and Privacy (2017)","DOI":"10.1109\/SP.2017.62"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: Conference on Empirical Methods in Natural Language Processing (2014)","DOI":"10.3115\/v1\/D14-1181"},{"key":"1_CR16","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems (2012)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-319-46493-0_29","volume-title":"Computer Vision \u2013 ECCV 2016","author":"T Kroeger","year":"2016","unstructured":"Kroeger, T., Timofte, R., Dai, D., Van Gool, L.: Fast Optical flow using dense inverse search. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9908, pp. 471\u2013488. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46493-0_29"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Kroening, D., Tautschnig, M.: CBMC-C bounded model checker. In: International Conference on Tools and Algorithms for the Construction and Analysis of Systems (2014)","DOI":"10.1007\/978-3-642-54862-8_26"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Lai, S., Xu, L., Liu, K., Zhao, J.: Recurrent convolutional neural networks for text classification. In: AAAI Conference on Artificial Intelligence (2015)","DOI":"10.1609\/aaai.v29i1.9513"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Li, J., He, P., Zhu, J., Lyu, M.R.: Software defect prediction via convolutional neural network. In: IEEE International Conference on Software Quality, Reliability and Security (2017)","DOI":"10.1109\/QRS.2017.42"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Qi, H., Hu, J.: VulPecker: an automated vulnerability detection system based on code similarity analysis. In: Annual Conference on Computer Security Applications (2016)","DOI":"10.1145\/2991079.2991102"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: VulDeePecker: a deep learning-based system for vulnerability detection. In: Annual Network and Distributed System Security Symposium (2018)","DOI":"10.14722\/ndss.2018.23158"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Lin, G., Zhang, J., Luo, W., Pan, L., Xiang, Y.: POSTER: vulnerability discovery with function representation learning from unlabeled projects. In: ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3138840"},{"key":"1_CR24","unstructured":"Liu, P., Qiu, X., Huang, X.: Recurrent neural network for text classification with multi-task learning. In: International Joint Conference on Artificial Intelligence (2016)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Long, J., Shelhamer, E., Darrell, T.: Fully convolutional networks for semantic segmentation. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2015)","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"1_CR26","unstructured":"Machiry, A., Spensky, C., Corina, J., Stephens, N., Kruegel, C., Vigna, G.: Dr.Checker: a soundy analysis for Linux Kernel drivers. In: USENIX Security Symposium USENIX Security (2017)"},{"key":"1_CR27","unstructured":"Microsoft: API reference docs for Windows Driver Kit (WDK). https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/ddi\/"},{"key":"1_CR28","unstructured":"Microsoft: GitHub. https:\/\/github.com\/"},{"key":"1_CR29","unstructured":"Microsoft: Windows API sets. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/apiindex\/windows-apisets"},{"key":"1_CR30","unstructured":"MITRE: Common Weakness Enumeration. https:\/\/cwe.mitre.org\/data\/index.html"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Neuhaus, S., Zimmermann, T., Holler, C., Zeller, A.: Predicting vulnerable software components. In: ACM Conference on Computer and Communications Security (2007)","DOI":"10.1145\/1315245.1315311"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Neumann, M., King, D., Beltagy, I., Ammar, W.: Scispacy: fast and robust models for biomedical natural language processing. arXiv preprint arXiv:1902.07669 (2019)","DOI":"10.18653\/v1\/W19-5034"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Qiu, S., Chang, G.H., Panagia, M., Gopal, D.M., Au, R., Kolachalama, V.B.: Fusion of deep learning models of MRI scans, mini-mental state examination, and logical memory test enhances diagnosis of mild cognitive impairment. Diag. Assess. Prog. 10, 737\u2013749 (2018)","DOI":"10.1016\/j.dadm.2018.08.013"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Qiu, Z., Yao, T., Mei, T.: Learning deep spatio-temporal dependence for semantic video segmentation. IEEE Trans. Multim. 20, 939\u2013949 (2018)","DOI":"10.1109\/TMM.2017.2759504"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Russell, R.L., et al.: Automated vulnerability detection in source code using deep representation learning. In: IEEE International Conference on Machine Learning and Applications (2018)","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"1_CR36","unstructured":"Segaran, T., Hammerbacher, J.: Beautiful Data: The Stories Behind Elegant Data Solutions. O\u2019Reilly Media, Inc. Beijing (2009)"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Shar, L.K., Tan, H.B.K., Briand, L.C.: Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis. In: International Conference on Software Engineering (2013)","DOI":"10.1109\/ICSE.2013.6606610"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Shi, Q., Xiao, X., Wu, R., Zhou, J., Fan, G., Zhang, C.: Pinpoint: fast and precise sparse value flow analysis for million lines of code. In: ACM SIGPLAN Conference on Programming Language Design and Implementation (2018)","DOI":"10.1145\/3192366.3192418"},{"key":"1_CR39","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"1_CR40","unstructured":"Tencent: TscanCode. https:\/\/github.com\/Tencent\/TscanCode"},{"key":"1_CR41","unstructured":"Tutorial, C.: Finding Declarations. https:\/\/xinhuang.github.io\/posts\/2014-10-19-clang-tutorial-finding-declarations.html"},{"key":"1_CR42","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Conference on Neural Information Processing Systems. In: 36th Proceedings of the Conference on Advances in Neural Information Processing Systems (NIPS 2017) (2017)"},{"key":"1_CR43","unstructured":"Wang, J., et al.: NLP-EYE: detecting memory corruptions via semantic-aware memory operation function identification. In: International Symposium on Research in Attacks, Intrusions and Defenses (2019)"},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Wang, S., Liu, T., Tan, L.: Automatically learning semantic features for defect prediction. In: International Conference on Software Engineering (2016)","DOI":"10.1145\/2884781.2884804"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Wei, X., Wolf, M.: A survey on HTTPS implementation by Android Apps: Issues and countermeasures. Appl. Comput. Inform. 13, 101\u2013117 (2017)","DOI":"10.1016\/j.aci.2016.10.001"},{"key":"1_CR46","unstructured":"Wheeler, D.A.: Flawfinder. https:\/\/dwheeler.com\/flawfinder\/"},{"key":"1_CR47","unstructured":"Xing, H.: Chinese-Text-Classification-Pytorch. https:\/\/github.com\/649453932\/Chinese-Text-Classification-Pytorch (2020)"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Lottmann, M., Rieck, K.: Generalized vulnerability extrapolation using abstract syntax trees. In: Annual Computer Security Applications Conference (2012)","DOI":"10.1145\/2420950.2421003"},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Wressnegger, C., Gascon, H., Rieck, K.: Chucky: exposing missing checks in source code for vulnerability discovery. In: ACM SIGSAC Conference on Computer and Communications Security (2013)","DOI":"10.1145\/2508859.2516665"},{"key":"1_CR50","doi-asserted-by":"crossref","unstructured":"Yan, H., Sui, Y., Chen, S., Xue, J.: Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities. In: IEEE\/ACM International Conference on Software Engineering (2018)","DOI":"10.1145\/3180155.3180178"},{"key":"1_CR51","doi-asserted-by":"crossref","unstructured":"Yan, X., et al.: Video scene parsing: An overview of deep learning methods and datasets. Comput. Vis. Image Underst. 201, 103077(2020)","DOI":"10.1016\/j.cviu.2020.103077"},{"key":"1_CR52","doi-asserted-by":"crossref","unstructured":"Yang, X., Lo, D., Xia, X., Zhang, Y., Sun, J.: Deep learning for just-in-time defect prediction. In: IEEE International Conference on Software Quality, Reliability and Security (2015)","DOI":"10.1109\/QRS.2015.14"},{"key":"1_CR53","unstructured":"Yunlongs: Clang-function-prototype. https:\/\/github.com\/Yunlongs\/clang-function-prototype"},{"key":"1_CR54","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. arXiv preprint arXiv:1605.07146 (2016)","DOI":"10.5244\/C.30.87"},{"key":"1_CR55","doi-asserted-by":"crossref","unstructured":"Zhou, P., et al.: Attention-based bidirectional long short-term memory networks for relation classification. In: Annual Meeting of the Association for Computational Linguistics (2016)","DOI":"10.18653\/v1\/P16-2034"},{"key":"1_CR56","doi-asserted-by":"crossref","unstructured":"Zou, D., Wang, S., Xu, S., Li, Z., Jin, H.: $$\\mu $$VulDeePecker: a deep learning-based system for multiclass vulnerability detection. IEEE Trans. Depend. Sec. Comput. 18 (2019)","DOI":"10.1109\/TDSC.2019.2942930"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23020-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T07:05:06Z","timestamp":1670310306000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23020-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031230196","9783031230202"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23020-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denarau Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fiji","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"83","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}