pith. machine review for the scientific record. sign in

arxiv: 1801.01681 · v1 · submitted 2018-01-05 · 💻 cs.CR · cs.AI· cs.LG

Recognition: unknown

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection

Authors on Pith no claims yet
classification 💻 cs.CR cs.AIcs.LG
keywords vulnerabilitydeepdetectionvuldeepeckerlearningvulnerabilitiescodefalse
0
0 comments X
read the original abstract

The automatic detection of software vulnerabilities is an important research problem. However, existing solutions to this problem rely on human experts to define features and often miss many vulnerabilities (i.e., incurring high false negative rate). In this paper, we initiate the study of using deep learning-based vulnerability detection to relieve human experts from the tedious and subjective task of manually defining features. Since deep learning is motivated to deal with problems that are very different from the problem of vulnerability detection, we need some guiding principles for applying deep learning to vulnerability detection. In particular, we need to find representations of software programs that are suitable for deep learning. For this purpose, we propose using code gadgets to represent programs and then transform them into vectors, where a code gadget is a number of (not necessarily consecutive) lines of code that are semantically related to each other. This leads to the design and implementation of a deep learning-based vulnerability detection system, called Vulnerability Deep Pecker (VulDeePecker). In order to evaluate VulDeePecker, we present the first vulnerability dataset for deep learning approaches. Experimental results show that VulDeePecker can achieve much fewer false negatives (with reasonable false positives) than other approaches. We further apply VulDeePecker to 3 software products (namely Xen, Seamonkey, and Libav) and detect 4 vulnerabilities, which are not reported in the National Vulnerability Database but were "silently" patched by the vendors when releasing later versions of these products; in contrast, these vulnerabilities are almost entirely missed by the other vulnerability detection systems we experimented with.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 7 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Static Program Slicing Using Language Models With Dataflow-Aware Pretraining and Constrained Decoding

    cs.SE 2026-04 unverdicted novelty 7.0

    Sliceformer improves static program slicing accuracy by up to 22% ExactMatch on Java/Python benchmarks through dataflow-preserving pretraining and lexical/syntactic constrained decoding in language models.

  2. Securing the Dark Matter: A Semantic-Enhanced Neuro-Symbolic Framework for Supply Chain Analysis of Opaque Industrial Software

    cs.SE 2026-05 unverdicted novelty 6.0

    A neuro-symbolic framework reconstructs semantics from opaque binaries via abstract interpretation, reflexive LLM prompting, typed knowledge graphs, and Graphormer reasoning to outperform baselines in vulnerability de...

  3. VulStyle: A Multi-Modal Pre-Training for Code Stylometry-Augmented Vulnerability Detection

    cs.CR 2026-04 unverdicted novelty 6.0

    VulStyle pre-trains on 4.9M functions using code, non-terminal ASTs, and stylometry features, then fine-tunes to achieve SOTA F1 gains of 4-48% on BigVul and VulDeePecker.

  4. LLMs for Qualitative Data Analysis Fail on Security-specificComments in Human Experiments

    cs.SE 2026-04 unverdicted novelty 6.0

    LLMs improve with detailed code descriptions but remain insufficient to replace human annotators for security-specific qualitative coding.

  5. Static Program Slicing Using Language Models With Dataflow-Aware Pretraining and Constrained Decoding

    cs.SE 2026-04 unverdicted novelty 6.0

    Sliceformer reformulates static program slicing as seq2seq using CodeT5+ with dataflow-aware pretraining via DFG permutation and span corruption plus constrained decoding, yielding up to 22% ExactMatch gains on Java a...

  6. VulWeaver: Weaving Broken Semantics for Grounded Vulnerability Detection

    cs.SE 2026-04 unverdicted novelty 5.0

    VulWeaver improves Java vulnerability detection to 0.75 F1 by enhancing dependency graphs with LLM semantic fixes, extracting full context from slices plus implicit usage info, and applying type-specific meta-promptin...

  7. From Theory to Practice: Code Generation Using LLMs for CAPEC and CWE Frameworks

    cs.CR 2026-04 unverdicted novelty 5.0

    LLMs generated 615 vulnerable code snippets aligned with CAPEC and CWE frameworks across three languages, with 0.98 cosine similarity between model outputs.