计算机科学
抽象语法树
指针(用户界面)
源代码
深度学习
人工智能
抽象语法
静态程序分析
程序设计语言
语法
原始数据
自然语言处理
机器学习
软件
软件开发
作者
Yue Ding,Qian Wu,Yinzhu Li,Dongdong Wang,Jiaxin Huang
标识
DOI:10.1109/aitest58265.2023.00025
摘要
The progress made in deep learning for natural language understanding has inspired researchers to explore similar techniques for programming language understanding. Various methods have been proposed for identifying vulnerabilities in code, including those that work on raw code or use abstract syntax tree (AST) and data-flow analysis. However, these methods only perform single-function analysis and cannot precisely pinpoint bugs. This study introduces a pipeline for detecting and locating null pointer vulnerabilities in C++ source code through cross-function analysis. The pipeline includes a data-flow analyzer capable of analyzing function call relationships and a deep learning model. We evaluate our approach on an industrial dataset and compare it with cppcheck using a user study. Our findings indicate that our method is an effective complement to cppcheck.
科研通智能强力驱动
Strongly Powered by AbleSci AI