{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:37:14Z","timestamp":1742960234434,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819975839"},{"type":"electronic","value":"9789819975846"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-7584-6_22","type":"book-chapter","created":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T00:05:39Z","timestamp":1699488339000},"page":"291-297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability Detection via\u00a0Typestate-Guided Code Representation Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5456-3827","authenticated-orcid":false,"given":"Xiao","family":"Cheng","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,9]]},"reference":[{"key":"22_CR1","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: Are we there yet? CoRR (2020)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Cheng, X., et al.: Static detection of control-flow-related vulnerabilities using graph embedding. In: ICECCS (2019)","DOI":"10.1109\/ICECCS.2019.00012"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, X., Nie, X., Li, N., Wang, H., Zheng, Z., Sui, Y.: How about bug-triggering paths? - understanding and characterizing learning-based vulnerability detectors. In: TDSC (2022)","DOI":"10.1109\/TDSC.2022.3192419"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, X., Wang, H., Hua, J., Xu, G., Sui, Y.: Deepwukong: Statically detecting software vulnerabilities using deep graph neural network. In: TOSEM (2021)","DOI":"10.1145\/3436877"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, X., Zhang, G., Wang, H., Sui, Y.: Path-sensitive code embedding via contrastive learning for software vulnerability detection. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis. ISSTA \u201922, ACM (2022)","DOI":"10.1145\/3533767.3534371"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Fan, J., Li, Y., Wang, S., Nguyen, T.N.: A c\/c++ code vulnerability dataset with code changes and cve summaries. In: MSR (2020)","DOI":"10.1145\/3379597.3387501"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Lei, Y., Sui, Y., Ding, S., Zhang, Q.: Taming transitive redundancy for context-free language reachability. In: OOPSLA (2022)","DOI":"10.1145\/3563343"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Lei, Y., Sui, Y., Tan, S.H., Zhang, Q.: Recursive state machine guided graph folding for context-free language reachability. In: PLDI (2023)","DOI":"10.1145\/3591233"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Li, T., Bai, J.J., Sui, Y., Hu, S.M.: Path-sensitive and alias-aware typestate analysis for detecting os bugs. In: ASPLOS (2022)","DOI":"10.1145\/3503222.3507770"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, S., Nguyen, T.N.: Vulnerability detection with fine-grained interpretations. In: FSE (2021)","DOI":"10.1145\/3468264.3468597"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., Chen, Z., Zhu, Y., Jin, H.: Vuldeelocator: A deep learning-based fine-grained vulnerability detector. In: TDSC (2021)","DOI":"10.1109\/TDSC.2021.3076142"},{"key":"22_CR12","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., Chen, Z.: Sysevr: A framework for using deep learning to detect software vulnerabilities. In: TDSC (2018)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: Vuldeepecker: A deep learning-based system for vulnerability detection. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23158"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Sui, Y., Cheng, X., Zhang, G., Wang, H.: Flow2vec: Value-flow-based precise code embedding. In: OOPSLA (2020)","DOI":"10.1145\/3428301"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Sui, Y., Xue, J.: SVF: Interprocedural static value-flow analysis in LLVM. In: CC (2016)","DOI":"10.1145\/2892208.2892235"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Sui, Y., Ye, D., Xue, J.: Static memory leak detection using full-sparse value-flow analysis. In: ISSTA (2012)","DOI":"10.1145\/2338965.2336784"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Sui, Y., Ye, D., Xue, J.: Detecting memory leaks statically with full-sparse value-flow analysis. In: TSE (2014)","DOI":"10.1109\/TSE.2014.2302311"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Yan, H., Sui, Y., Chen, S., Xue, J.: Spatio-temporal context reduction: A pointer-analysis-based static approach for detecting use-after-free vulnerabilities. In: ICSE (2018)","DOI":"10.1145\/3180155.3180178"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Zheng, Y., et al.: D2a: A dataset built for AI-based vulnerability detection methods using differential analysis. In: ICSE-SEIP (2021)","DOI":"10.1109\/ICSE-SEIP52600.2021.00020"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Zhong, Z., et al.: Scalable compositional static taint analysis for sensitive data tracing on industrial micro-services. In: ICSE-SEIP (2023)","DOI":"10.1109\/ICSE-SEIP58684.2023.00015"},{"key":"22_CR21","unstructured":"Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In: NIPS (2019)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7584-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T22:08:46Z","timestamp":1703110126000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7584-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819975839","9789819975846"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7584-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICFEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Engineering Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brisbane, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icfem2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/formal-analysis.com\/icfem\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This proceedings includes one invited paper and eight doctoral symposium papers.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}