{"title":"基于深度学习的软件漏洞检测技术综述","authors":"Züleyha İpek Alagöz, S. Akleylek","doi":"10.1109/ISCTURKEY53027.2021.9654351","DOIUrl":null,"url":null,"abstract":"Software vulnerabilities (SV) cause disastrous impact on information security in recent years. Higher cost and time consumption on manual detection methods lead to enormous number of increase in automatic SV detection techniques. Machine learning, deep learning (DL) and data mining methods are the most popular and efficient ones which also have advantage on analyzing performance results with use of available open-source softwares. This survey mainly focuses on the recent SV detection systems that use deep learning techniques. In this context, papers with significant impact on the literature are investigated, and deep learning methods, data sets and performance results are analyzed. Moreover, open problems and solution proposals are discussed.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Brief Review on Deep Learning Based Software Vulnerability Detection\",\"authors\":\"Züleyha İpek Alagöz, S. Akleylek\",\"doi\":\"10.1109/ISCTURKEY53027.2021.9654351\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software vulnerabilities (SV) cause disastrous impact on information security in recent years. Higher cost and time consumption on manual detection methods lead to enormous number of increase in automatic SV detection techniques. Machine learning, deep learning (DL) and data mining methods are the most popular and efficient ones which also have advantage on analyzing performance results with use of available open-source softwares. This survey mainly focuses on the recent SV detection systems that use deep learning techniques. In this context, papers with significant impact on the literature are investigated, and deep learning methods, data sets and performance results are analyzed. Moreover, open problems and solution proposals are discussed.\",\"PeriodicalId\":383915,\"journal\":{\"name\":\"2021 International Conference on Information Security and Cryptology (ISCTURKEY)\",\"volume\":\"146 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Information Security and Cryptology (ISCTURKEY)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCTURKEY53027.2021.9654351\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Brief Review on Deep Learning Based Software Vulnerability Detection
Software vulnerabilities (SV) cause disastrous impact on information security in recent years. Higher cost and time consumption on manual detection methods lead to enormous number of increase in automatic SV detection techniques. Machine learning, deep learning (DL) and data mining methods are the most popular and efficient ones which also have advantage on analyzing performance results with use of available open-source softwares. This survey mainly focuses on the recent SV detection systems that use deep learning techniques. In this context, papers with significant impact on the literature are investigated, and deep learning methods, data sets and performance results are analyzed. Moreover, open problems and solution proposals are discussed.