An advanced computing approach for software vulnerability detection

被引:1
|
作者
Do Xuan C. [1 ]
Cong B.V. [2 ]
机构
[1] Department of Information Security, Posts and Telecommunications Institute of Technology, Hanoi
[2] Department of Information Technology, University of Economics and Technical Industries, Hanoi
基金
英国科研创新办公室;
关键词
Code property graph; Deep graph networks; Natural language processing; Rebalancing data; Software vulnerability detection;
D O I
10.1007/s11042-024-19682-y
中图分类号
学科分类号
摘要
Detecting software vulnerabilities is a very urgent problem today. One of the common approaches for detecting software vulnerabilities is source code analysis. In this paper, to improve the effectiveness of the software vulnerability detection model based on source code analysis, we propose a novel model called GRD. The GRD model performs source code analysis to find and conclude about source code vulnerabilities based on a combination of two main methods: Feature Intelligent Extraction and Rebalancing Data. In particular, Feature Intelligent Extraction, which includes two models: deep graph networks and natural language processing (NLP) techniques, is responsible for synthesizing and extracting features of source code in the code property graph (CPG) form. Rebalancing Data has the function of balancing data to improve the efficiency of the source code classification task. The main characteristics of our proposal in this paper include two main phases as follows. The first phase extracts and synthesizes source code features into the CPG form. At this phase, the article proposes using Graph Convolution Network (GCN) to extract CPG features, and RoBERTa to extract source code snippets on the node of CPG. In the second phase, based on the feature vectors of the source code obtained in phase 1, the article proposes using the Dropout technique to generate data to balance among labels. Finally, the feature vectors generated after the Dropout technique are used to predict source code vulnerabilities. The study evaluates the proposed model on two common datasets: Verum and FFMQ. The experimental results in the article have shown the superiority of the proposed model compared to other approaches on all measures. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:86707 / 86740
页数:33
相关论文
共 50 条
  • [1] A novel approach for software vulnerability detection based on advanced computing
    Cho Do Xuan
    Huynh Nhat Anh
    Neural Computing and Applications, 2025, 37 (6) : 5121 - 5139
  • [2] A New Framework for Software Vulnerability Detection Based on an Advanced Computing
    Cong, Bui Van
    Xuan, Cho Do
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (03): : 3699 - 3723
  • [3] A novel approach for software vulnerability detection based on intelligent cognitive computing
    Xuan, Cho Do
    Mai, Dao Hoang
    Thanh, Ma Cong
    Van Cong, Bui
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (15): : 17042 - 17078
  • [4] A novel approach for software vulnerability detection based on intelligent cognitive computing
    Cho Do Xuan
    Dao Hoang Mai
    Ma Cong Thanh
    Bui Van Cong
    The Journal of Supercomputing, 2023, 79 : 17042 - 17078
  • [5] A new approach to software vulnerability detection based on CPG analysis
    Do Xuan, Cho
    COGENT ENGINEERING, 2023, 10 (01):
  • [6] Advanced computing and software engineering
    Tiwari A.K.
    Recent Advances in Computer Science and Communications, 2021, 14 (04) : 1225
  • [7] A Mutation-Based Data Enhancement Approach for Software Vulnerability Detection
    Su, Lianyi
    Hu, Jie
    Zheng, Wei
    JOURNAL OF INTERNET TECHNOLOGY, 2024, 25 (06): : 931 - 943
  • [8] A novel approach for APT attack detection based on an advanced computing
    Xuan, Cho Do
    Nguyen, Tung Thanh
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [9] A Software Vulnerability Rating Approach Based on the Vulnerability Database
    Luo, Jian
    Lo, Kueiming
    Qu, Haoran
    JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [10] Configuration Fuzzing for Software Vulnerability Detection
    Dai, Huning
    Murphy, Christian
    Kaiser, Gail
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 525 - 530