Learning to Repair Software Vulnerabilities with Generative Adversarial Networks
Motivated by the problem of automated repair of software vulnerabilities, we propose an adversarial learning approach that maps from one discrete source domain to another target domain without requiring paired labeled examples or source and target domains to be bijections. We demonstrate that the pr...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Harer, Jacob Ozdemir, Onur Lazovich, Tomo Reale, Christopher P Russell, Rebecca L Kim, Louis Y Chin, Peter |
description | Motivated by the problem of automated repair of software vulnerabilities, we
propose an adversarial learning approach that maps from one discrete source
domain to another target domain without requiring paired labeled examples or
source and target domains to be bijections. We demonstrate that the proposed
adversarial learning approach is an effective technique for repairing software
vulnerabilities, performing close to seq2seq approaches that require labeled
pairs. The proposed Generative Adversarial Network approach is
application-agnostic in that it can be applied to other problems similar to
code repair, such as grammar correction or sentiment translation. |
doi_str_mv | 10.48550/arxiv.1805.07475 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1805_07475</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1805_07475</sourcerecordid><originalsourceid>FETCH-LOGICAL-a675-60543daf4a7fdf639942ec7afd371a6add024febb78985137c0d078cbc1f14873</originalsourceid><addsrcrecordid>eNotz7FOwzAUhWEvDKjwAEz1CyTYtR07Y1VBQYoogqprdBNfwxUhqRyTwNujFqYj_cORPsZupMi1M0bcQvymKZdOmFxYbc0le64QYk_9G08Df8EjUOSvQ0gzROSHr67HCA11lAhHPlN651s8tUQT8rWfMI4QCTr-hGke4sd4xS4CdCNe_--C7e_v9puHrNptHzfrKoPCmqwQRisPQYMNPhSqLPUKWwvBKyuhAO_FSgdsGutKZ6SyrfDCurZpZZDaWbVgy7_bM6k-RvqE-FOfaPWZpn4B7rVK0Q</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Learning to Repair Software Vulnerabilities with Generative Adversarial Networks</title><source>arXiv.org</source><creator>Harer, Jacob ; Ozdemir, Onur ; Lazovich, Tomo ; Reale, Christopher P ; Russell, Rebecca L ; Kim, Louis Y ; Chin, Peter</creator><creatorcontrib>Harer, Jacob ; Ozdemir, Onur ; Lazovich, Tomo ; Reale, Christopher P ; Russell, Rebecca L ; Kim, Louis Y ; Chin, Peter</creatorcontrib><description>Motivated by the problem of automated repair of software vulnerabilities, we
propose an adversarial learning approach that maps from one discrete source
domain to another target domain without requiring paired labeled examples or
source and target domains to be bijections. We demonstrate that the proposed
adversarial learning approach is an effective technique for repairing software
vulnerabilities, performing close to seq2seq approaches that require labeled
pairs. The proposed Generative Adversarial Network approach is
application-agnostic in that it can be applied to other problems similar to
code repair, such as grammar correction or sentiment translation.</description><identifier>DOI: 10.48550/arxiv.1805.07475</identifier><language>eng</language><subject>Computer Science - Computation and Language ; Computer Science - Learning ; Computer Science - Neural and Evolutionary Computing ; Statistics - Machine Learning</subject><creationdate>2018-05</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1805.07475$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1805.07475$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Harer, Jacob</creatorcontrib><creatorcontrib>Ozdemir, Onur</creatorcontrib><creatorcontrib>Lazovich, Tomo</creatorcontrib><creatorcontrib>Reale, Christopher P</creatorcontrib><creatorcontrib>Russell, Rebecca L</creatorcontrib><creatorcontrib>Kim, Louis Y</creatorcontrib><creatorcontrib>Chin, Peter</creatorcontrib><title>Learning to Repair Software Vulnerabilities with Generative Adversarial Networks</title><description>Motivated by the problem of automated repair of software vulnerabilities, we
propose an adversarial learning approach that maps from one discrete source
domain to another target domain without requiring paired labeled examples or
source and target domains to be bijections. We demonstrate that the proposed
adversarial learning approach is an effective technique for repairing software
vulnerabilities, performing close to seq2seq approaches that require labeled
pairs. The proposed Generative Adversarial Network approach is
application-agnostic in that it can be applied to other problems similar to
code repair, such as grammar correction or sentiment translation.</description><subject>Computer Science - Computation and Language</subject><subject>Computer Science - Learning</subject><subject>Computer Science - Neural and Evolutionary Computing</subject><subject>Statistics - Machine Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz7FOwzAUhWEvDKjwAEz1CyTYtR07Y1VBQYoogqprdBNfwxUhqRyTwNujFqYj_cORPsZupMi1M0bcQvymKZdOmFxYbc0le64QYk_9G08Df8EjUOSvQ0gzROSHr67HCA11lAhHPlN651s8tUQT8rWfMI4QCTr-hGke4sd4xS4CdCNe_--C7e_v9puHrNptHzfrKoPCmqwQRisPQYMNPhSqLPUKWwvBKyuhAO_FSgdsGutKZ6SyrfDCurZpZZDaWbVgy7_bM6k-RvqE-FOfaPWZpn4B7rVK0Q</recordid><startdate>20180518</startdate><enddate>20180518</enddate><creator>Harer, Jacob</creator><creator>Ozdemir, Onur</creator><creator>Lazovich, Tomo</creator><creator>Reale, Christopher P</creator><creator>Russell, Rebecca L</creator><creator>Kim, Louis Y</creator><creator>Chin, Peter</creator><scope>AKY</scope><scope>EPD</scope><scope>GOX</scope></search><sort><creationdate>20180518</creationdate><title>Learning to Repair Software Vulnerabilities with Generative Adversarial Networks</title><author>Harer, Jacob ; Ozdemir, Onur ; Lazovich, Tomo ; Reale, Christopher P ; Russell, Rebecca L ; Kim, Louis Y ; Chin, Peter</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a675-60543daf4a7fdf639942ec7afd371a6add024febb78985137c0d078cbc1f14873</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Science - Computation and Language</topic><topic>Computer Science - Learning</topic><topic>Computer Science - Neural and Evolutionary Computing</topic><topic>Statistics - Machine Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Harer, Jacob</creatorcontrib><creatorcontrib>Ozdemir, Onur</creatorcontrib><creatorcontrib>Lazovich, Tomo</creatorcontrib><creatorcontrib>Reale, Christopher P</creatorcontrib><creatorcontrib>Russell, Rebecca L</creatorcontrib><creatorcontrib>Kim, Louis Y</creatorcontrib><creatorcontrib>Chin, Peter</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv Statistics</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Harer, Jacob</au><au>Ozdemir, Onur</au><au>Lazovich, Tomo</au><au>Reale, Christopher P</au><au>Russell, Rebecca L</au><au>Kim, Louis Y</au><au>Chin, Peter</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Learning to Repair Software Vulnerabilities with Generative Adversarial Networks</atitle><date>2018-05-18</date><risdate>2018</risdate><abstract>Motivated by the problem of automated repair of software vulnerabilities, we
propose an adversarial learning approach that maps from one discrete source
domain to another target domain without requiring paired labeled examples or
source and target domains to be bijections. We demonstrate that the proposed
adversarial learning approach is an effective technique for repairing software
vulnerabilities, performing close to seq2seq approaches that require labeled
pairs. The proposed Generative Adversarial Network approach is
application-agnostic in that it can be applied to other problems similar to
code repair, such as grammar correction or sentiment translation.</abstract><doi>10.48550/arxiv.1805.07475</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.1805.07475 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_1805_07475 |
source | arXiv.org |
subjects | Computer Science - Computation and Language Computer Science - Learning Computer Science - Neural and Evolutionary Computing Statistics - Machine Learning |
title | Learning to Repair Software Vulnerabilities with Generative Adversarial Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T12%3A58%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Learning%20to%20Repair%20Software%20Vulnerabilities%20with%20Generative%20Adversarial%20Networks&rft.au=Harer,%20Jacob&rft.date=2018-05-18&rft_id=info:doi/10.48550/arxiv.1805.07475&rft_dat=%3Carxiv_GOX%3E1805_07475%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |