Research Article

A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code

Table 1

Reviewed studies for vulnerability detection.

ā€‰Data typeNetworkFeature representation

SySeVR [10]Source codeBGRUSeVCs depicting semantic information induced by data dependency and control dependency
VulDeePecker [11]Source codeBLSTMCode gadget depicting data flow and control flow
BGNN4VD [20]Source codeBGNNCCG based on AST, CFG, and DFG
VDiscover [12]Assembly codeLogistic regression, MLP of \single hidden layer, and random forestDynamic and static call sequences of library functions
Gemini [21]Assembly codeStructure2vecAttributed control flow graph (ACFG)
System [22]Assembly codeAtt-BiLSTMStatic call sequences of binary functions
BVDetector [15]Assembly codeBGRUCode slices depicting library/API function calls from binary programs