Exploring foci of:
arXiv (Cornell University)
Learning to map source code to software vulnerability using code-as-a-graph
June 2020 • Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari
We explore the applicability of Graph Neural Networks in learning the nuances of source code from a security perspective. Specifically, whether signatures of vulnerabilities in source code can be learned from its graph representation, in terms of relationships between nodes and edges. We create a pipeline we call AI4VA, which first encodes a sample source code into a Code Property Graph. The extracted graph is then vectorized in a manner which preserves its semantic information. A Gated Graph Neural Network is the…
Computer Science
Call Graph
Theoretical Computer Science
Computer Security
Programming Language
The Dancers At The End Of Time
Hope Ii
The Ninth Wave
The Bureaucrats (1936 Film)
Main Page
The False Mirror
The Massacre At Chios
Weapons (2025 Film)
Zohran Mamdani
Squid Game Season 3
Technological Fix
Harvester Vase
Electronic Colonialism
Victoria Mboko
Lauren Sánchez
Jeff Bezos
Collective Action Problem
Shefali Jariwala
Hackers: Heroes Of The Computer Revolution
Community Fridge
Compassion Fade
F1 (Film)