基于异构图表征的源代码漏洞检测方法
|
张学军,梁书滨,白万荣,张奉鹤,黄海燕,郭梅凤,陈卓
|
Source code vulnerability detection method based on heterogeneous graph representation
|
Xuejun ZHANG,Shubin LIANG,Wanrong BAI,Fenghe ZHANG,Haiyan HUANG,Meifeng GUO,Zhuo CHEN
|
|
表 4 对4种语法规则漏洞的检测性能对比 |
Tab.4 Detection performance comparison for 4 types of syntax rule vulnerabilities % |
|
模型 | AE | | FC | | AU | | PU | Acc | P | R | | Acc | P | R | | Acc | P | R | | Acc | P | R | VulDeePecker | 66.30 | 70.32 | 68.54 | | 65.60 | 71.14 | 69.38 | | 64.68 | 69.03 | 70.20 | | 70.06 | 75.19 | 70.31 | SySeVR | 78.74 | 81.12 | 77.68 | | 75.69 | 83.11 | 80.03 | | 74.14 | 79.27 | 77.77 | | 79.43 | 81.21 | 79.45 | mVulSniffer | 92.60 | 93.02 | 88.30 | | 92.74 | 90.69 | 83.17 | | 92.10 | 74.77 | 83.17 | | 91.50 | 91.07 | 92.69 | FUNDED | 93.81 | 94.40 | 92.13 | | 93.73 | 95.74 | 94.30 | | 94.22 | 90.67 | 92.45 | | 92.41 | 91.89 | 92.62 | VDoTR | 94.04 | 95.14 | 94.05 | | 95.17 | 95.33 | 90.15 | | 94.35 | 94.79 | 94.64 | | 92.05 | 90.48 | 87.83 | VulHetG | 95.12 | 96.26 | 95.17 | | 96.05 | 96.18 | 93.45 | | 94.33 | 94.61 | 94.70 | | 93.18 | 92.14 | 92.45 |
|
|
|