基于异构图表征的源代码漏洞检测方法
张学军,梁书滨,白万荣,张奉鹤,黄海燕,郭梅凤,陈卓

Source code vulnerability detection method based on heterogeneous graph representation
Xuejun ZHANG,Shubin LIANG,Wanrong BAI,Fenghe ZHANG,Haiyan HUANG,Meifeng GUO,Zhuo CHEN
表 4 对4种语法规则漏洞的检测性能对比
Tab.4 Detection performance comparison for 4 types of syntax rule vulnerabilities %
模型AEFCAUPU
AccPRAccPRAccPRAccPR
VulDeePecker66.3070.3268.5465.6071.1469.3864.6869.0370.2070.0675.1970.31
SySeVR78.7481.1277.6875.6983.1180.0374.1479.2777.7779.4381.2179.45
mVulSniffer92.6093.0288.3092.7490.6983.1792.1074.7783.1791.5091.0792.69
FUNDED93.8194.4092.1393.7395.7494.3094.2290.6792.4592.4191.8992.62
VDoTR94.0495.1494.0595.1795.3390.1594.3594.7994.6492.0590.4887.83
VulHetG95.1296.2695.1796.0596.1893.4594.3394.6194.7093.1892.1492.45