Research Article
A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code
Table 1
Reviewed studies for vulnerability detection.
| ā | Data type | Network | Feature representation |
| SySeVR [10] | Source code | BGRU | SeVCs depicting semantic information induced by data dependency and control dependency | VulDeePecker [11] | Source code | BLSTM | Code gadget depicting data flow and control flow | BGNN4VD [20] | Source code | BGNN | CCG based on AST, CFG, and DFG | VDiscover [12] | Assembly code | Logistic regression, MLP of \single hidden layer, and random forest | Dynamic and static call sequences of library functions | Gemini [21] | Assembly code | Structure2vec | Attributed control flow graph (ACFG) | System [22] | Assembly code | Att-BiLSTM | Static call sequences of binary functions | BVDetector [15] | Assembly code | BGRU | Code slices depicting library/API function calls from binary programs |
|
|