Research Article
Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
Table 10
The comparison between Joern and our proposed method.
| ā | TP | FN | FP | TN | Recall (%) | TNR (%) | Precision (%) | |
| Joern | 6 | 12 | 2 | 177 | 33.3 | 98.9 | 75 | 46.2 | KNN | 12 | 6 | 11 | 168 | 66.7 | 93.9 | 52.2 | 58.6 | DT | 14 | 4 | 14 | 165 | 77.8 | 92.2 | 50 | 60.9 | NB | 15 | 3 | 15 | 164 | 83.3 | 91.6 | 50 | 62.5 | AdaBoost | 14 | 4 | 12 | 167 | 77.8 | 93.3 | 53.8 | 63.6 | SVM | 16 | 2 | 17 | 162 | 88.9 | 90.5 | 48.5 | 62.8 |
|
|