Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits.
Achyudh RamJi XinMeiyappan NagappanYaoliang YuRocío Cabrera LozoyaAntonino SabettaJimmy LinPublished in: CoRR (2019)
Keyphrases
- higher level
- access control
- network security
- security issues
- security requirements
- intrusion detection
- security policies
- previously identified
- security vulnerabilities
- security level
- multiple representations
- security systems
- computer security
- information security
- source code
- encryption scheme
- security mechanisms
- network management
- data integrity
- closely related
- security problems
- search engine
- information retrieval