Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism

被引:5
|
作者
Chen, Jinfu [1 ,2 ]
Wang, Weijia [1 ,2 ]
Liu, Bo [1 ,2 ]
Cai, Saihua [1 ,2 ]
Towey, Dave [3 ]
Wang, Shengran [1 ,2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Peoples R China
[2] Jiangsu Univ, Jiangsu Key Lab Secur Technol Ind Cyberspace, Zhenjiang 212013, Peoples R China
[3] Univ Nottingham Ningbo China, Sch Comp Sci, Ningbo 315100, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Deep learning; Software vulnerability detection; Temporal Convolutional Network; Self-attention Mechanism; Source-code picturization; Feature fusion;
D O I
10.1016/j.infsof.2024.107453
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Desirable characteristics in vulnerability -detection (VD) systems (VDSs) include both good detection capability (high accuracy, low false positive rate, low false negative rate, etc.) and low time overheads. The widely used VDSs based on models such as Recurrent Neural Networks (RNNs) have some problems, such as low time efficiency, failing to learn the vulnerability features better, and insufficient amounts of vulnerability features. Therefore, it is very important to construct an automatic detection model with high detection accuracy. Objective: This paper reports on training based on the source code to analyze and learn from the code's patterns and structures by deep -learning techniques to generate an efficient VD model that does not require manual feature design. Method: We propose a software VD model based on multi -feature fusion and deep neural networks called AIdetectorX-SP. It first uses a Temporal Convolutional Network (TCN) and adds a Self -attention Mechanism (SaM) to the TCN to build a model for extracting vulnerability logic features, then transforms the source code into an image input to a Convolutional Neural Network (CNN) to extract structural and semantic information. Finally, we use feature -fusion technology to design and implement an improved deep -learning -based VDS, called AIdetectorX Sequence with Picturization (AIdetectorX-SP). Results: We report on experiments conducted using publicly -available and widely -used datasets to evaluate the effectiveness of AIdetectorX-SP, with results indicating that AIdetectorX-SP is an effective VDS; that the combination of TCN and SaM can effectively extract vulnerability logic features; and that the pictorial code can extract code structure features, which can further improve the VD capability. Conclusion: In this paper, we propose a novel detection model for software vulnerability based on TCNs, SaM, and software picturization. The proposed model solves some shortcomings and limitations of existing VDSs, and obtains a high software -VD accuracy with a high degree of stability.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Binary Function Similarity Detection Based on Graph Neural Network with Self-Attention Mechanism
    Wu, Dingjie
    He, Xuanzhang
    Zhang, Yao
    Zhu, Junjie
    Zhang, Xinyuan
    Ye, Minchao
    Gao, Zhigang
    2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 971 - 975
  • [32] On the Global Self-attention Mechanism for Graph Convolutional Networks
    Wang, Chen
    Deng, Chengyuan
    2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2021, : 8531 - 8538
  • [33] A self-attention network for smoke detection
    Jiang, Minghua
    Zhao, Yaxin
    Yu, Feng
    Zhou, Changlong
    Peng, Tao
    FIRE SAFETY JOURNAL, 2022, 129
  • [34] SASEGAN-TCN: Speech enhancement algorithm based on self-attention generative adversarial network and temporal convolutional network
    Lv R.
    Chen N.
    Cheng S.
    Fan G.
    Rao L.
    Song X.
    Lv W.
    Yang D.
    Mathematical Biosciences and Engineering, 2024, 21 (03) : 3860 - 3875
  • [35] Point cloud classification network based on self-attention mechanism
    Li, Yujie
    Cai, Jintong
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [36] Temporal convolutional network with soft threshold and contractile self-attention mechanism for remaining useful life prediction of rolling bearings
    Ma, Hao
    Wang, Jinrui
    Han, Baokun
    Zhang, Zongzhen
    Bao, Huaiqian
    MEASUREMENT SCIENCE AND TECHNOLOGY, 2024, 35 (12)
  • [37] Multiple instance learning method based on convolutional neural network and self-attention for early cancer detection
    Liu, Junjiang
    Zhou, Shusen
    Zang, Mujun
    Liu, Chanjuan
    Liu, Tong
    Wang, Qingjun
    COMPUTER METHODS IN BIOMECHANICS AND BIOMEDICAL ENGINEERING, 2024,
  • [38] Reflective microring-resonator-based microwave photonic sensor incorporating a self-attention assisted convolutional neural network
    Chen, Yeming
    Tian, Xiaoyi
    Sved, Joel
    Li, Liwei
    Zhou, Luping
    Nguyen, Linh
    Yi, Xiaoke
    APPLIED OPTICS, 2024, 63 (14) : D59 - D66
  • [39] Temporal link prediction in directed networks based on self-attention mechanism
    Li, Jinsong
    Peng, Jianhua
    Liu, Shuxin
    Weng, Lintianran
    Li, Cong
    INTELLIGENT DATA ANALYSIS, 2022, 26 (01) : 173 - 188
  • [40] Masked face recognition based on knowledge distillation and convolutional self-attention network
    Wan, Weiguo
    Wen, Runlin
    Yao, Li
    Yang, Yong
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2024, : 2269 - 2284