Otwarty dostęp

Codesentry: Revolutionizing Real-Time Software Vulnerability Detection With Optimized GPT Framework


Zacytuj

Abbasi, R., Bashir, A.K., Mateen, A., Amin, F., Ge, Y., & Omar, M. (2023). Efficient Security and Privacy of Lossless Secure Communication for Sensor-based Urban Cities. IEEE Sensors Journal PP (99). DOI:10.1109/JSEN.2023.3305716. Search in Google Scholar

Ayub, M.F., Li, X., Mahmood, K., Shamshad, S., Saleem, M.A., & Omar, M. (2023). Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application with Blockchain-Based Authentication. IEEE Transactions on Consumer Electronics. DOI: 10.1109/TCE.2023.3320974. Search in Google Scholar

Cheng, X., Wang, H., Hua, J., Xu, G., & Sui, Y. (2021). DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network. ACM Transactions on Software Engineering and Methodology, Vol. 30, Issue 3, 1–33. Available at: https://doi.org/10.1145/3436877. Search in Google Scholar

Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M., Shou, L., Qin, B., Liu, T., Jiang, D., & Zhou, M. (2020). CodeBERT: A Pre-Trained Model for Programming and Natural Languages. Findings of the Association for Computational Linguistics: EMNLP 2020, 1536–1547. Available at: https://aclanthology.org/2020.findings-emnlp.139. Search in Google Scholar

Gholami, S., & Omar M. (2023). Can a student Large Language Model perform as well as it’s teacher?. arXiv preprint arXiv:2310.02421. Available at: https://doi.org/10.48550/arXiv.2310.02421. Search in Google Scholar

Gholami, S., & Omar, M. (2023). Do Generative Large Language Models Need Billions of Parameters?. arXiv preprint arXiv:2309.06589. Available at: https://doi.org/10.48550/arXiv.2309.06589. Search in Google Scholar

Gholami, S., & Omar, M. (2023). Does Synthetic Data Make Large Language Models More Efficient?. arXiv preprint arXiv:2310.07830. Available at: https://doi.org/10.48550/arXiv.2310.07830. Search in Google Scholar

Guo, D., et al. (2020). GraphcodeBERT: Pre-training Code Representations with data Flow. International Conference on Learning Representations. Available at: https://doi.org/10.48550/arXiv.2009.08366. Search in Google Scholar

Lewis, M., et al. (2020). BART: Denoising Sequence-to-Sequence Pre-training for Natural Language Generation, Translation, and Comprehension. Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 7871–7880. Available at: https://aclanthology.org/2020.acl-main.703.pdf. Search in Google Scholar

Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., & Chen, Z. (2022). SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE Transactions on Dependable and Secure Computing, Vol. 19. DOI: 10.1109/TDSC.2021.3051525. Search in Google Scholar

Li, Z., Zou, D., Xu, S., Ou, X., Jin, H., Wang, S., Deng, Z., & Zhong, Y. (2018). VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. Network and Distributed System Security Symposium, DOI:10.14722/ndss.2018.23158. Search in Google Scholar

Omar, M. (2022). Machine learning for cybersecurity: Innovative deep learning solutions. SpringerBriefs in Computer Science. ISSN: 2191-5768. Search in Google Scholar

Omar, M. (2023). VulDefend: A Novel Technique based on Pattern-exploiting Training for Detecting Software Vulnerabilities Using Language Models. 2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), 287–293. DOI: 10.1109/JEEIT58638.2023.10185860. Search in Google Scholar

Omar, M., Choi, S., Nyang, D.H., & Mohaisen, D. (2022). Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions. arXiv preprint arXiv:2201.00768. Available at: https://doi.org/10.48550/arXiv.2201.00768. Search in Google Scholar

Omar, M., Jones, R., Burrell, D.N., Dawson, M., Nobles, C., Mohammed, D.A., & Bashir, A.K. (2023). Harnessing the Power and Simplicity of Decision Trees to Detect IoT Malware. In book: Transformational Interventions for Business, Technology, and Healthcare, 215–229. IGI Global. DOI:10.4018/979-8-3693-1634-4.ch013. Search in Google Scholar

Omar, M., & Sukthankar, G. (2023). Text-Defend: Detecting Adversarial Examples using Local Outlier Factor. 2023 IEEE 17th International Conference on Semantic Computing (ICSC), 118–122. DOI: 10.1109/ICSC56153.2023.00026. Search in Google Scholar

Perl, H., Dechand, S., Smith, M., Arp, D., Yamaguchi, F., Rieck, K., Fahl, S., & Acar, Y. (2015). VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 426–437. Available at: https://doi.org/10.1145/2810103.2813604. Search in Google Scholar

Salimi, S., & Kharrazi, M. (2022). VulSlicer: Vulnerability detection through code slicing. Journal of Systems and Software, Vol. 193. Available at: https://doi.org/10.1016/j.jss.2022.111450. Search in Google Scholar

Shoeybi, M., Patwary, M., Puri, R., LeGresley, P., Casper, J., & Catanzaro, B. (2019). Megatron-LM: Training Multi-Billion Parameter Language Models Using Model Parallelism. arXiv preprint arXiv:1909.08053. Available at: https://doi.org/10.48550/arXiv.1909.08053. Search in Google Scholar

Tang, L., & Mahmoud, Q.H. (2021). A Survey of Machine Learning-Based Solutions for Phishing Website Detection. Machine Learning and Knowledge Extraction, Vol. 3, Issue 3, 672–694. Available at: https://doi.org/10.3390/make3030034. Search in Google Scholar

Yamaguchi, F., Golde, N., Arp, D., & Rieck, K. 92014). Modeling and Discovering Vulnerabilities with Code Property Graphs. 2014 IEEE Symposium on Security and Privacy, 590–604. DOI: 10.1109/SP.2014.44. Search in Google Scholar

Zhou, X., & Verma, R.M. (2022). Vulnerability Detection via Multimodal Learning: Datasets and Analysis. Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 1225–1227. Available at: https://doi.org/10.1145/3488932.3527288. Search in Google Scholar

Zhou, Y., Liu, S., Siow, J., Du, X., & Liu, Y. (2019). Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Advances in Neural Information Processing Systems, Vol. 32. Available at: https://papers.nips.cc/paper/2019/hash/49265d2447bc3bbfe9e76306ce40a31f-Abstract.html. Search in Google Scholar