VulMiningBGS: Detection of overflow vulnerabilities based on graph similarity.
Zihan YuJintao XueXin SunWen WangYubo SongLiquan ChenZhongyuan QinPublished in: CIS (2022)
Keyphrases
- similarity measure
- automatic detection
- attack graph
- detection method
- graph theory
- structural similarity
- detection algorithm
- object detection
- false alarms
- structured data
- graph structure
- distance function
- distance measure
- buffer overflow
- ranking algorithm
- graph matching
- graph mining
- graph representation
- random walk
- similarity matrix
- inexact graph matching
- selecting a small number