Multi-view Pre-trained Model for Code Vulnerability Identification

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Vulnerability identification is crucial for cyber security in the software-related industry. Early identification methods require significant manual efforts in crafting features or annotating vulnerable code. Although the recent pre-trained models alleviate this issue, they overlook the multiple rich structural information contained in the code itself. In this paper, we propose a novel Multi-View Pre-Trained Model (MV-PTM) that encodes both sequential and multi-type structural information of the source code and uses contrastive learning to enhance code representations. The experiments conducted on two public datasets demonstrate the superiority of MV-PTM. In particular, MV-PTM improves GraphCodeBERT by 3.36% on average in terms of F1 score.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Proceedings
EditorsLei Wang, Michael Segal, Jenhui Chen, Tie Qiu
PublisherSpringer Science and Business Media Deutschland GmbH
Pages127-135
Number of pages9
ISBN (Print)9783031192104
DOIs
StatePublished - 2022
Event17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022 - Dalian, China
Duration: 24 Nov 202226 Nov 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13473 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022
Country/TerritoryChina
CityDalian
Period24/11/2226/11/22

Keywords

  • Contrastive learning
  • Pre-trained model
  • Vulnerability identification

Fingerprint

Dive into the research topics of 'Multi-view Pre-trained Model for Code Vulnerability Identification'. Together they form a unique fingerprint.

Cite this