Vulnerability Detection Methods Based on Natural Language Processing

被引:0
|
作者
Yang Y. [1 ,2 ]
Li Y. [1 ,2 ]
Chen K. [1 ,2 ,3 ]
机构
[1] State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing
[3] Beijing Academy of Artificial Intelligence, Beijing
基金
中国国家自然科学基金;
关键词
Natural language processing; Security; Static detection; Survey; Vulnerability detection;
D O I
10.7544/issn1000-1239.20210627
中图分类号
学科分类号
摘要
With the number of the official reported vulnerabilities is exponentially increasing, the researches aiming at the techniques of vulnerability detection is arising. The diversity of vulnerability types and the unicity of detection methods result in the limitation of the vulnerability detection achievement. The main streams of the research on vulnerability detection methods are static detection and dynamic detection. Static detection includes document analysis, cross validation, and program analysis, etc. With the natural language processing is rising and the knowledge is booming, the researchers explore the possibility of vulnerability detection on multiple data resources with the help of natural language processing technique. In this paper, the literatures are classified into four parts which are official document, code, code comment and the vulnerability-related information based on the sources of information. Firstly, we extract the technical details and classify the research achievement by conducting an investigation on the related researches of the vulnerability detection methods based on natural language processing in recent 10 years, and then we summarize the relative merits of the research achievement by comparing and analyzing the researches originated from various data sources. Finally, through conducting cross comparison and in-depth exploration researches, we conclude eight types of limitations of vulnerability detection methods based on natural language processing and then discuss the solutions on the level of data, technique and effect, and meanwhile propose the future research trends. © 2022, Science Press. All right reserved.
引用
收藏
页码:2649 / 2666
页数:17
相关论文
共 117 条
  • [31] Livshits V B, Lam M S., Finding security vulnerabilities in java applications with static analysis, Proc of the 14th USENIX Security Symp, (2005)
  • [32] Ayewah N, Pugh W, Hovemeyer D, Et al., Using static analysis to find bugs, IEEE Software, 25, 5, pp. 22-29, (2008)
  • [33] Wogerer W., A survey of static program analysis techniques, (2005)
  • [34] Gosain A, Sharma G., Static analysis: A survey of techniques and tools, Intelligent Computing and Applications, pp. 581-591, (2015)
  • [35] Darwin I F., Checking C Programs with Lint, (1988)
  • [36] Sourceforge J., Lint-Find bugs in Java programs
  • [37] Floyd R W., Assigning meanings to programs, Program Verification, pp. 65-81, (1993)
  • [38] PMD Source Code Analyzer.PMD source code
  • [39] Almossawi A, Lim K, Sinha T., Analysis tool evaluation: Coverity prevent, (2006)
  • [40] Klocwork K7