Review Article

Code Vulnerability Detection Based on Deep Sequence and Graph Models: A Survey

Figure 3

Three common graph representations of the source code is given in Figure 2. In the program dependency graph (c), data and control dependencies are represented by and . (a) Abstract syntax tree (AST). (b) Control flow graph (CFG). (c) Program dependency graph (PDG).
(a)
(b)
(c)