期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于指针神经网络的细粒度缺陷定位
1
作者 王尚文 刘逵 +4 位作者 林博 黎立 jacques klein TegawendéFrançois BISSYANDÉ 毛晓光 《软件学报》 EI CSCD 北大核心 2024年第4期1841-1860,共20页
软件缺陷定位是指找出与软件失效相关的程序元素.当前的缺陷定位技术仅能产生函数级或语句级的定位结果.这种粗粒度的定位结果会影响人工调试程序和软件缺陷自动修复的效率和效果.专注于细粒度地识别导致软件缺陷的具体代码令牌,为代码... 软件缺陷定位是指找出与软件失效相关的程序元素.当前的缺陷定位技术仅能产生函数级或语句级的定位结果.这种粗粒度的定位结果会影响人工调试程序和软件缺陷自动修复的效率和效果.专注于细粒度地识别导致软件缺陷的具体代码令牌,为代码令牌建立抽象语法树路径,提出基于指针神经网络的细粒度缺陷定位模型来预测出具体的缺陷代码令牌和修复该令牌的具体操作行为.开源项目中的大量缺陷补丁数据集包含大量可供训练的数据,且基于抽象语法树构建的路径可以有效捕获程序结构信息.实验结果表明所训练出的模型能够准确预测缺陷代码令牌并显著优于基于统计的与基于机器学习的基线方法.另外,为了验证细粒度的缺陷定位结果可以贡献于缺陷自动修复,基于细粒度的缺陷定位结果设计两种程序修复流程,即代码补全工具去预测正确令牌的方法和启发式规则寻找合适代码修复元素的方法,结果表明两种方法都能有效解决软件缺陷自动修复中的过拟合问题. 展开更多
关键词 缺陷定位 缺陷自动修复 神经网络
下载PDF
On Locating Malicious Code in Piggybacked Android Apps 被引量:2
2
作者 Li Li Daoyuan Li +4 位作者 Tegawende F. Bissyande jacques klein Haipeng Cai David Lo Yves Le Traon 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第6期1108-1124,共17页
To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a fram... To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy@5 of 83.6% for such packages that are triggered through method invocations and an accuracy@5 of 82.2% for such packages that are triggered independently. 展开更多
关键词 ANDROID piggybacked app malicious code HookRanker
原文传递
On Identifying and Explaining Similarities in Android Apps
3
作者 Li Li Tegawende F.Bissyande +1 位作者 Hao-Yu Wang jacques klein 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第2期437-455,共19页
App updates and repackaging are recurrent in the Android ecosystem,filling markets with similar apps that must be identified.Despite the existence of several approaches to improving the scalability of detecting repack... App updates and repackaging are recurrent in the Android ecosystem,filling markets with similar apps that must be identified.Despite the existence of several approaches to improving the scalability of detecting repackaged/cloned apps,researchers and practitioners are eventually faced with the need for a comprehensive pairwise comparison(or simultaneously multiple app comparisons)to understand and validate the similarities among apps.In this work,we present the design and implementation of our research-based prototype tool called SimiDroid for multi-level similarity comparison of Android apps.SimiDroid is built with the aim to support the comprehension of similarities/changes among app versions and among repackaged apps.In particular,we demonstrate the need and usefulness of such a framework based on different case studies implementing different dissection scenarios for revealing various insights on how repackaged apps are built.We further show that the similarity comparison plugins implemented in SimiDroid yield more accurate results than the state of the art. 展开更多
关键词 ANDROID SIMILARITY analysis APP CLONE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部