...
首页> 外文期刊>IEEE transactions on industrial informatics >Vulnerable Code Clone Detection for Operating System Through Correlation-Induced Learning
【24h】

Vulnerable Code Clone Detection for Operating System Through Correlation-Induced Learning

机译:通过相关诱导的学习,易受攻击的代码克隆检测操作系统

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Vulnerable code clones in the operating system (OS) threaten the safety of smart industrial environment, and most vulnerable OS code clone detection approaches neglect correlations between functions that limits the detection effectiveness. In this article, we propose a two-phase framework to find vulnerable OS code clones by learning on correlations between functions. On the training phase, functions as the training set are extracted from the latest code repository and function features are derived by their AST structure. Then, external and internal correlations are explored by graph modeling of functions. Finally, the graph convolutional network for code clone detection (GCN-CC) is trained using function features and correlations. On the detection phase, functions in the to-be-detected OS code repository are extracted and the vulnerable OS code clones are detected by the trained GCN-CC. We conduct experiments on five real OS code repositories, and experimental results show that our framework outperforms the state-of-the-art approaches.
机译:操作系统(OS)中的易受攻击的代码克隆威胁到智能工业环境的安全性,并且大多数易受伤害的OS代码克隆检测方法忽略了限制检测效果之间的功能之间的相关性。在本文中,我们提出了一个两阶段框架,通过学习函数之间的相关性来找到易受攻击的操作系统代码克隆。在训练阶段,从最新的代码存储库中提取训练集的函数,并且函数特征由其AST结构导出。然后,通过函数的图形建模探索外部和内部相关性。最后,使用功能特征和相关性训练用于代码克隆检测(GCN-CC)的图形卷积网络。在检测阶段,提取待检测到的OS代码存储库中的函数,并且由训练的GCN-CC检测易受侦听的OS代码克隆。我们对五个真正的操作系统代码库进行实验,实验结果表明,我们的框架优于最先进的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号