Authors
David Binkley, Leon Moonen, Sibren Isaacman
Publication date
2022/6/1
Journal
Information and Software Technology
Volume
146
Pages
106844
Publisher
Elsevier
Description
Predicting vulnerable source code helps to focus the attention of a developer, or a program analysis technique, on those parts of the code that need to be examined with more scrutiny. Recent work proposed the use of function names as semantic cues that can be learned by a deep neural network (DNN) to aid in the hunt for vulnerability of functions.
Combining identifier splitting, which we use to split each function name into its constituent words, with a novel frequency-based algorithm, we explore the extent to which the words that make up a function’s name can be used to predict potentially vulnerable functions. In contrast to the lightweight prediction provided by a DNN considering only function names, avoiding the need for a DNN provides featherweight prediction. The underlying idea is that function names that contain certain “dangerous” words are more likely to accompany vulnerable functions. Of course, this …
Scholar articles
D Binkley, L Moonen, S Isaacman - Information and Software Technology, 2022