Learning to Repair Software Vulnerabilities with Generative Adversarial Networks

Motivated by the problem of automated repair of software vulnerabilities, we propose an adversarial learning approach that maps from one discrete source domain to another target domain without requiring paired labeled examples or source and target domains to be bijections. We demonstrate that the pr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Harer, Jacob, Ozdemir, Onur, Lazovich, Tomo, Reale, Christopher P, Russell, Rebecca L, Kim, Louis Y, Chin, Peter
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Harer, Jacob
Ozdemir, Onur
Lazovich, Tomo
Reale, Christopher P
Russell, Rebecca L
Kim, Louis Y
Chin, Peter
description Motivated by the problem of automated repair of software vulnerabilities, we propose an adversarial learning approach that maps from one discrete source domain to another target domain without requiring paired labeled examples or source and target domains to be bijections. We demonstrate that the proposed adversarial learning approach is an effective technique for repairing software vulnerabilities, performing close to seq2seq approaches that require labeled pairs. The proposed Generative Adversarial Network approach is application-agnostic in that it can be applied to other problems similar to code repair, such as grammar correction or sentiment translation.
doi_str_mv 10.48550/arxiv.1805.07475
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1805_07475</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1805_07475</sourcerecordid><originalsourceid>FETCH-LOGICAL-a675-60543daf4a7fdf639942ec7afd371a6add024febb78985137c0d078cbc1f14873</originalsourceid><addsrcrecordid>eNotz7FOwzAUhWEvDKjwAEz1CyTYtR07Y1VBQYoogqprdBNfwxUhqRyTwNujFqYj_cORPsZupMi1M0bcQvymKZdOmFxYbc0le64QYk_9G08Df8EjUOSvQ0gzROSHr67HCA11lAhHPlN651s8tUQT8rWfMI4QCTr-hGke4sd4xS4CdCNe_--C7e_v9puHrNptHzfrKoPCmqwQRisPQYMNPhSqLPUKWwvBKyuhAO_FSgdsGutKZ6SyrfDCurZpZZDaWbVgy7_bM6k-RvqE-FOfaPWZpn4B7rVK0Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Learning to Repair Software Vulnerabilities with Generative Adversarial Networks</title><source>arXiv.org</source><creator>Harer, Jacob ; Ozdemir, Onur ; Lazovich, Tomo ; Reale, Christopher P ; Russell, Rebecca L ; Kim, Louis Y ; Chin, Peter</creator><creatorcontrib>Harer, Jacob ; Ozdemir, Onur ; Lazovich, Tomo ; Reale, Christopher P ; Russell, Rebecca L ; Kim, Louis Y ; Chin, Peter</creatorcontrib><description>Motivated by the problem of automated repair of software vulnerabilities, we propose an adversarial learning approach that maps from one discrete source domain to another target domain without requiring paired labeled examples or source and target domains to be bijections. We demonstrate that the proposed adversarial learning approach is an effective technique for repairing software vulnerabilities, performing close to seq2seq approaches that require labeled pairs. The proposed Generative Adversarial Network approach is application-agnostic in that it can be applied to other problems similar to code repair, such as grammar correction or sentiment translation.</description><identifier>DOI: 10.48550/arxiv.1805.07475</identifier><language>eng</language><subject>Computer Science - Computation and Language ; Computer Science - Learning ; Computer Science - Neural and Evolutionary Computing ; Statistics - Machine Learning</subject><creationdate>2018-05</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1805.07475$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1805.07475$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Harer, Jacob</creatorcontrib><creatorcontrib>Ozdemir, Onur</creatorcontrib><creatorcontrib>Lazovich, Tomo</creatorcontrib><creatorcontrib>Reale, Christopher P</creatorcontrib><creatorcontrib>Russell, Rebecca L</creatorcontrib><creatorcontrib>Kim, Louis Y</creatorcontrib><creatorcontrib>Chin, Peter</creatorcontrib><title>Learning to Repair Software Vulnerabilities with Generative Adversarial Networks</title><description>Motivated by the problem of automated repair of software vulnerabilities, we propose an adversarial learning approach that maps from one discrete source domain to another target domain without requiring paired labeled examples or source and target domains to be bijections. We demonstrate that the proposed adversarial learning approach is an effective technique for repairing software vulnerabilities, performing close to seq2seq approaches that require labeled pairs. The proposed Generative Adversarial Network approach is application-agnostic in that it can be applied to other problems similar to code repair, such as grammar correction or sentiment translation.</description><subject>Computer Science - Computation and Language</subject><subject>Computer Science - Learning</subject><subject>Computer Science - Neural and Evolutionary Computing</subject><subject>Statistics - Machine Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz7FOwzAUhWEvDKjwAEz1CyTYtR07Y1VBQYoogqprdBNfwxUhqRyTwNujFqYj_cORPsZupMi1M0bcQvymKZdOmFxYbc0le64QYk_9G08Df8EjUOSvQ0gzROSHr67HCA11lAhHPlN651s8tUQT8rWfMI4QCTr-hGke4sd4xS4CdCNe_--C7e_v9puHrNptHzfrKoPCmqwQRisPQYMNPhSqLPUKWwvBKyuhAO_FSgdsGutKZ6SyrfDCurZpZZDaWbVgy7_bM6k-RvqE-FOfaPWZpn4B7rVK0Q</recordid><startdate>20180518</startdate><enddate>20180518</enddate><creator>Harer, Jacob</creator><creator>Ozdemir, Onur</creator><creator>Lazovich, Tomo</creator><creator>Reale, Christopher P</creator><creator>Russell, Rebecca L</creator><creator>Kim, Louis Y</creator><creator>Chin, Peter</creator><scope>AKY</scope><scope>EPD</scope><scope>GOX</scope></search><sort><creationdate>20180518</creationdate><title>Learning to Repair Software Vulnerabilities with Generative Adversarial Networks</title><author>Harer, Jacob ; Ozdemir, Onur ; Lazovich, Tomo ; Reale, Christopher P ; Russell, Rebecca L ; Kim, Louis Y ; Chin, Peter</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a675-60543daf4a7fdf639942ec7afd371a6add024febb78985137c0d078cbc1f14873</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Science - Computation and Language</topic><topic>Computer Science - Learning</topic><topic>Computer Science - Neural and Evolutionary Computing</topic><topic>Statistics - Machine Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Harer, Jacob</creatorcontrib><creatorcontrib>Ozdemir, Onur</creatorcontrib><creatorcontrib>Lazovich, Tomo</creatorcontrib><creatorcontrib>Reale, Christopher P</creatorcontrib><creatorcontrib>Russell, Rebecca L</creatorcontrib><creatorcontrib>Kim, Louis Y</creatorcontrib><creatorcontrib>Chin, Peter</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv Statistics</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Harer, Jacob</au><au>Ozdemir, Onur</au><au>Lazovich, Tomo</au><au>Reale, Christopher P</au><au>Russell, Rebecca L</au><au>Kim, Louis Y</au><au>Chin, Peter</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Learning to Repair Software Vulnerabilities with Generative Adversarial Networks</atitle><date>2018-05-18</date><risdate>2018</risdate><abstract>Motivated by the problem of automated repair of software vulnerabilities, we propose an adversarial learning approach that maps from one discrete source domain to another target domain without requiring paired labeled examples or source and target domains to be bijections. We demonstrate that the proposed adversarial learning approach is an effective technique for repairing software vulnerabilities, performing close to seq2seq approaches that require labeled pairs. The proposed Generative Adversarial Network approach is application-agnostic in that it can be applied to other problems similar to code repair, such as grammar correction or sentiment translation.</abstract><doi>10.48550/arxiv.1805.07475</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1805.07475
ispartof
issn
language eng
recordid cdi_arxiv_primary_1805_07475
source arXiv.org
subjects Computer Science - Computation and Language
Computer Science - Learning
Computer Science - Neural and Evolutionary Computing
Statistics - Machine Learning
title Learning to Repair Software Vulnerabilities with Generative Adversarial Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T12%3A58%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Learning%20to%20Repair%20Software%20Vulnerabilities%20with%20Generative%20Adversarial%20Networks&rft.au=Harer,%20Jacob&rft.date=2018-05-18&rft_id=info:doi/10.48550/arxiv.1805.07475&rft_dat=%3Carxiv_GOX%3E1805_07475%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true