Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
102 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits (1911.07620v1)

Published 15 Nov 2019 in cs.SE and cs.CL

Abstract: Public vulnerability databases such as CVE and NVD account for only 60% of security vulnerabilities present in open-source projects, and are known to suffer from inconsistent quality. Over the last two years, there has been considerable growth in the number of known vulnerabilities across projects available in various repositories such as NPM and Maven Central. Such an increasing risk calls for a mechanism to infer the presence of security threats in a timely manner. We propose novel hierarchical deep learning models for the identification of security-relevant commits from either the commit diff or the source code for the Java classes. By comparing the performance of our model against code2vec, a state-of-the-art model that learns from path-based representations of code, and a logistic regression baseline, we show that deep learning models show promising results in identifying security-related commits. We also conduct a comparative analysis of how various deep learning models learn across different input representations and the effect of regularization on the generalization of our models.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Achyudh Ram (3 papers)
  2. Ji Xin (10 papers)
  3. Meiyappan Nagappan (25 papers)
  4. Yaoliang Yu (59 papers)
  5. RocĂ­o Cabrera Lozoya (8 papers)
  6. Antonino Sabetta (16 papers)
  7. Jimmy Lin (208 papers)
Citations (3)