{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:48:00Z","timestamp":1743119280760,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031646256"},{"type":"electronic","value":"9783031646263"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-64626-3_10","type":"book-chapter","created":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T13:01:58Z","timestamp":1720875718000},"page":"165-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Vulnerabilities via\u00a0Explicitly Leveraging Vulnerability Features on\u00a0Program Slices"],"prefix":"10.1007","author":[{"given":"Haoyu","family":"Guo","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,14]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: Vulpecker: an automated vulnerability detection system based on code similarity analysis. In: Proceedings of the 32nd Annual Conference on Computer Security Applications (2016)","DOI":"10.1145\/2991079.2991102"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Kim, S., et al.: Vuddy: a scalable approach for vulnerable code clone discovery. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE (2017)","DOI":"10.1109\/SP.2017.62"},{"key":"10_CR3","unstructured":"Wheeler, D.A.: Flawfinder (2016). https:\/\/www.dwheeler.com\/flawfinder\/. Accessed 20 May 2018"},{"key":"10_CR4","unstructured":"Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. Pearson Education, London (2007)"},{"key":"10_CR5","unstructured":"Newsome, J., Song, D.X.: Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software. In: NDSS, vol. 5 (2005)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Zaazaa, O., El Bakkali, H.: Dynamic vulnerability detection approaches and tools: state of the art. In: 2020 Fourth International Conference On Intelligent Computing in Data Sciences (ICDS). IEEE (2020)","DOI":"10.1109\/ICDS50568.2020.9268686"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: Vuldeepecker: a deep learning-based system for vulnerability detection. arXiv preprint arXiv:1801.01681 (2018)","DOI":"10.14722\/ndss.2018.23158"},{"key":"10_CR8","unstructured":"Zou, D., et al. : $$\\mu $$ VulDeePecker: a deep learning-based system for multiclass vulnerability detection. IEEE Trans. Dependable Secure Comput. 18(5), 2224\u20132236 (2019)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Russell, R., et al.: Automated vulnerability detection in source code using deep representation learning. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE (2018)","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: VR: a deep learning-based fine-grained vulnerability detector. IEEE Trans. Dependable Secure Comput. 19(4), 2821\u20132837 (2021)","DOI":"10.1109\/TDSC.2021.3076142"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: Combining graph-based learning with automated data collection for code vulnerability detection. IEEE Trans. Inf. Forensics Secur. 16, 1943\u20131958 (2020)","DOI":"10.1109\/TIFS.2020.3044773"},{"key":"10_CR12","unstructured":"Zhuang, Y., et al.: Software vulnerability detection via deep learning over disaggregated code graph representation. arXiv preprint arXiv:2109.03341 (2021)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Thapa, C., et al.: Transformer-based language models for software vulnerability detection. In: Proceedings of the 38th Annual Computer Security Applications Conference (2022)","DOI":"10.1145\/3564625.3567985"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Purba, M.D., et al.: Software vulnerability detection using large language models. In: 2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE (2023)","DOI":"10.1109\/ISSREW60843.2023.00058"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: VulD-Transformer: source code vulnerability detection via transformer. In: Proceedings of the 14th Asia-Pacific Symposium on Internetware (2023)","DOI":"10.1145\/3609437.3609451"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., et al.: Deep learning based vulnerability detection: are we there yet? In: ACM\/IEEE International Conference on Software Engineering (2022)","DOI":"10.1109\/TSE.2021.3087402"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Zeng, P., et al.: Software vulnerability analysis and discovery using deep learning techniques: a survey. IEEE Access 8, 197158\u2013197172 (2020)","DOI":"10.1109\/ACCESS.2020.3034766"},{"key":"10_CR18","unstructured":"Chung, J., et al.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Sennrich, R., Haddow, B., Birch, A.: Neural machine translation of rare words with subword units. arXiv preprint arXiv:1508.07909 (2015)","DOI":"10.18653\/v1\/P16-1162"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Fan, J., et al.: AC\/C++ code vulnerability dataset with code changes and CVE summaries. In: Proceedings of the 17th International Conference on Mining Software Repositories (2020)","DOI":"10.1145\/3379597.3387501"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"4","author":"M Weiser","year":"1984","unstructured":"Weiser, M.: Program slicing. IEEE Trans. Softw. Eng. 4, 352\u2013357 (1984)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: SySeVR: a framework for using deep learning to detect software vulnerabilities. IEEE Trans. Dependable Secure Comput. 19(04), 2244\u20132258 (2022)","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"10_CR23","unstructured":"Joern[EB\/OL]. https:\/\/github.com\/octopus-platform\/joern\/"},{"issue":"2","key":"10_CR24","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd, S.: Least squares quantization in PCM. IEEE Trans. Inf. Theory 28(2), 129\u2013137 (1982)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10_CR25","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"10_CR26","unstructured":"Zaremba, W., Sutskever, I., Vinyals, O.: Recurrent neural network regularization. arXiv preprint arXiv:1409.2329 (2014)"},{"key":"10_CR27","unstructured":"Shi, X., et al.: Convolutional LSTM network: a machine learning approach for precipitation nowcasting. Adv. Neural Inf. Process. Syst. 28 (2015)"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: Codet5: identifier-aware unified pre-trained encoder-decoder models for code understanding and generation. arXiv preprint arXiv:2109.00859 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Feng, Z., et al.: CodeBERT: a pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155 (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"10_CR30","unstructured":"Lu, S., et al.: Codexglue: a machine learning benchmark dataset for code understanding and generation. arXiv preprint arXiv:2102.04664 (2021)"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Fu, M., Tantithamthavorn, C.: Linevul: a transformer-based line-level vulnerability prediction. In: Proceedings of the 19th International Conference on Mining Software Repositories (2022)","DOI":"10.1145\/3524842.3528452"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Ding, Y., et al.: VELVET: a novel ensemble learning approach to automatically locate vulnerable statements. In: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE (2022)","DOI":"10.1109\/SANER53432.2022.00114"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Nguyen, V.-A., et al.: ReGVD: revisiting graph neural networks for vulnerability detection. In: Proceedings of the ACM\/IEEE 44th International Conference on Software Engineering: Companion Proceedings (2022)","DOI":"10.1145\/3510454.3516865"},{"key":"10_CR34","unstructured":"Zhou, Y., et al.: Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"10_CR35","unstructured":"Zou, D., et al.: mVulPreter: a multi-granularity vulnerability detection system with interpretations. IEEE Trans. Dependable Secure Comput. (2022)"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Nguyen, V., et al.: Information-theoretic source code vulnerability highlighting. In: 2021 International Joint Conference on Neural Networks (IJCNN). IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9533907"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Learning to locate and describe vulnerabilities. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE (2023)","DOI":"10.1109\/ASE56229.2023.00045"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Hin, D., et al.: LineVD: statement-level vulnerability detection using graph neural networks. In: Proceedings of the 19th International Conference on Mining Software Repositories (2022)","DOI":"10.1145\/3524842.3527949"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-64626-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T16:16:54Z","timestamp":1741796214000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-64626-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031646256","9783031646263"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-64626-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Theoretical Aspects of Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guiyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tase2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/tase2024.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}