Search Results

ReGVD: Revisiting Graph Neural Networks for Vulnerability Detection

1 code implementation14 Oct 2021

Identifying vulnerabilities in the source code is essential to protect the software systems from cyber security attacks.

Graph Embedding text-classification +2

Example-Based Vulnerability Detection and Repair in Java Code

1 code implementation17 Mar 2022

To eliminate such vulnerabilities, people built tools to detect security-API misuses via pattern matching.

Cryptography and Security Software Engineering

Cannot find the paper you are looking for? You can Submit a new open access paper.