Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction

05/07/2021
by   Zeki Bilgin, et al.
0

Intelligent code analysis has received increasing attention in parallel with the remarkable advances in the field of machine learning (ML) in recent years. A major challenge in leveraging ML for this purpose is to represent source code in a useful form that ML algorithms can accept as input. In this study, we present a novel method to represent source code as image while preserving semantic and syntactic properties, which paves the way for leveraging computer vision techniques to use for code analysis. Indeed the method makes it possible to directly enter the resulting image representation of source codes into deep learning (DL) algorithms as input without requiring any further data pre-processing or feature extraction step. We demonstrate feasibility and effectiveness of our method by realizing a vulnerability prediction use case over a public dataset containing a large number of real-world source code samples with performance evaluation in comparison to the state-of-art solutions. Our implementation is publicly available.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/13/2023

Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing

One of the most important challenges in the field of software code audit...
research
07/11/2018

Automated Vulnerability Detection in Source Code Using Deep Representation Learning

Increasing numbers of software vulnerabilities are discovered every year...
research
02/05/2023

VuLASTE: Long Sequence Model with Abstract Syntax Tree Embedding for vulnerability Detection

In this paper, we build a model named VuLASTE, which regards vulnerabili...
research
06/01/2023

Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks

One of the most significant challenges in the field of software code aud...
research
12/13/2021

ROMEO: Exploring Juliet through the Lens of Assembly Language

Automatic vulnerability detection on C/C++ source code has benefitted fr...
research
11/21/2020

Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned

Binary code similarity analysis (BCSA) is widely used for diverse securi...
research
04/19/2021

A SAR speckle filter based on Residual Convolutional Neural Networks

In recent years, Machine Learning (ML) algorithms have become widespread...

Please sign up or login with your details

Forgot password? Click here to reset