An advanced computing approach for software vulnerability detection

被引:1
|
作者
Do Xuan C. [1 ]
Cong B.V. [2 ]
机构
[1] Department of Information Security, Posts and Telecommunications Institute of Technology, Hanoi
[2] Department of Information Technology, University of Economics and Technical Industries, Hanoi
基金
英国科研创新办公室;
关键词
Code property graph; Deep graph networks; Natural language processing; Rebalancing data; Software vulnerability detection;
D O I
10.1007/s11042-024-19682-y
中图分类号
学科分类号
摘要
Detecting software vulnerabilities is a very urgent problem today. One of the common approaches for detecting software vulnerabilities is source code analysis. In this paper, to improve the effectiveness of the software vulnerability detection model based on source code analysis, we propose a novel model called GRD. The GRD model performs source code analysis to find and conclude about source code vulnerabilities based on a combination of two main methods: Feature Intelligent Extraction and Rebalancing Data. In particular, Feature Intelligent Extraction, which includes two models: deep graph networks and natural language processing (NLP) techniques, is responsible for synthesizing and extracting features of source code in the code property graph (CPG) form. Rebalancing Data has the function of balancing data to improve the efficiency of the source code classification task. The main characteristics of our proposal in this paper include two main phases as follows. The first phase extracts and synthesizes source code features into the CPG form. At this phase, the article proposes using Graph Convolution Network (GCN) to extract CPG features, and RoBERTa to extract source code snippets on the node of CPG. In the second phase, based on the feature vectors of the source code obtained in phase 1, the article proposes using the Dropout technique to generate data to balance among labels. Finally, the feature vectors generated after the Dropout technique are used to predict source code vulnerabilities. The study evaluates the proposed model on two common datasets: Verum and FFMQ. The experimental results in the article have shown the superiority of the proposed model compared to other approaches on all measures. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:86707 / 86740
页数:33
相关论文
共 50 条
  • [21] A Mining Approach to Obtain the Software Vulnerability Characteristics
    Li, Xiang
    Chen, Jinfu
    Lin, Zhechao
    Zhang, Lin
    Wang, Zibin
    Zhou, Minmin
    Xie, Wanggen
    2017 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2017, : 296 - 301
  • [22] A novel approach to evaluate software vulnerability prioritization
    Huang, Chien-Cheng
    Lin, Feng-Yu
    Lin, Frank Yeong-Sung
    Sun, Yeali S.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (11) : 2822 - 2840
  • [23] An Advanced Computing Approach for IoT-Botnet Detection in Industrial Internet of Things
    Nguyen, Tu N.
    Quoc-Dung Ngo
    Huy-Trung Nguyen
    Giang Long Nguyen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (11) : 8298 - 8306
  • [24] FORTIFYING ANDROID SECURITY: HYPERPARAMETER TUNED DEEP LEARNING APPROACH FOR ROBUST SOFTWARE VULNERABILITY DETECTION
    Alzaben, Nada
    Alashjaee, Abdullah m.
    Maray, Mohammed
    Alotaibi, Shoayee dlaim
    Alharbi, Abeer a. k.
    Sayed, Ahmed
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2025,
  • [25] Predicting software vulnerability based on software metrics: a deep learning approach
    Francis Kwadzo Agbenyegah
    Micheal Asante
    Jinfu Chen
    Ernest Akpaku
    Iran Journal of Computer Science, 2024, 7 (4) : 801 - 812
  • [26] Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing
    Wu, Jingzheng
    Wu, Yanjun
    Wu, Zhifei
    Yang, Mutian
    Wang, Yongji
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 226 - +
  • [27] Advanced algorithms and software components for scientific computing: An introduction
    Raghavan, P
    APPLIED PARALLEL COMPUTING: STATE OF THE ART IN SCIENTIFIC COMPUTING, 2006, 3732 : 590 - 592
  • [28] An Integration Testing Platform for Software Vulnerability Detection Method
    Li, Jin
    Chen, Jinfu
    Huang, Minhuan
    Zhou, Minmin
    Zhang, Lin
    Xie, Wanggen
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 984 - 989
  • [29] The application of neural network for software vulnerability detection: a review
    Zhu, Yuhui
    Lin, Guanjun
    Song, Lipeng
    Zhang, Jun
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (02): : 1279 - 1301
  • [30] Combined software and hardware fault injection vulnerability detection
    Thomas Given-Wilson
    Nisrine Jafri
    Axel Legay
    Innovations in Systems and Software Engineering, 2020, 16 : 101 - 120