An advanced computing approach for software vulnerability detection

被引:1
|
作者
Do Xuan C. [1 ]
Cong B.V. [2 ]
机构
[1] Department of Information Security, Posts and Telecommunications Institute of Technology, Hanoi
[2] Department of Information Technology, University of Economics and Technical Industries, Hanoi
基金
英国科研创新办公室;
关键词
Code property graph; Deep graph networks; Natural language processing; Rebalancing data; Software vulnerability detection;
D O I
10.1007/s11042-024-19682-y
中图分类号
学科分类号
摘要
Detecting software vulnerabilities is a very urgent problem today. One of the common approaches for detecting software vulnerabilities is source code analysis. In this paper, to improve the effectiveness of the software vulnerability detection model based on source code analysis, we propose a novel model called GRD. The GRD model performs source code analysis to find and conclude about source code vulnerabilities based on a combination of two main methods: Feature Intelligent Extraction and Rebalancing Data. In particular, Feature Intelligent Extraction, which includes two models: deep graph networks and natural language processing (NLP) techniques, is responsible for synthesizing and extracting features of source code in the code property graph (CPG) form. Rebalancing Data has the function of balancing data to improve the efficiency of the source code classification task. The main characteristics of our proposal in this paper include two main phases as follows. The first phase extracts and synthesizes source code features into the CPG form. At this phase, the article proposes using Graph Convolution Network (GCN) to extract CPG features, and RoBERTa to extract source code snippets on the node of CPG. In the second phase, based on the feature vectors of the source code obtained in phase 1, the article proposes using the Dropout technique to generate data to balance among labels. Finally, the feature vectors generated after the Dropout technique are used to predict source code vulnerabilities. The study evaluates the proposed model on two common datasets: Verum and FFMQ. The experimental results in the article have shown the superiority of the proposed model compared to other approaches on all measures. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:86707 / 86740
页数:33
相关论文
共 50 条
  • [31] Automated Software Vulnerability Detection via Curriculum Learning
    Du, Qianjin
    Kun, Wei
    Kuang, Xiaohui
    Li, Xiang
    Zhao, Gang
    2023 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME, 2023, : 2855 - 2860
  • [32] A Personalized Learning Framework for Software Vulnerability Detection and Education
    Taeb, Maryam
    Chi, Hongmei
    2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 119 - 126
  • [33] An Automated Vulnerability Detection and Remediation Method for Software Security
    Jurn, Jeesoo
    Kim, Taeeun
    Kim, Hwankuk
    SUSTAINABILITY, 2018, 10 (05)
  • [34] Software Vulnerability Detection using Large Language Models
    Das Purba, Moumita
    Ghosh, Arpita
    Radford, Benjamin J.
    Chu, Bill
    2023 IEEE 34TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS, ISSREW, 2023, : 112 - 119
  • [35] An Empirical Study of the Imbalance Issue in Software Vulnerability Detection
    Guo, Yuejun
    Hu, Qiang
    Tang, Qiang
    Le Traon, Yves
    COMPUTER SECURITY - ESORICS 2023, PT IV, 2024, 14347 : 371 - 390
  • [36] Reverse Analysis and Vulnerability Detection for Network System Software
    Pan, Wei
    Li, Weihua
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 451 - 456
  • [37] Rule-based system for vulnerability detection of software
    Cho, Sung-Hoon
    Jang, Chang-Bok
    Lee, Moo-Hun
    Choi, Eui-In
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1630 - 1633
  • [38] Combined software and hardware fault injection vulnerability detection
    Given-Wilson, Thomas
    Jafri, Nisrine
    Legay, Axel
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2020, 16 (02) : 101 - 120
  • [39] The application of neural network for software vulnerability detection: a review
    Yuhui Zhu
    Guanjun Lin
    Lipeng Song
    Jun Zhang
    Neural Computing and Applications, 2023, 35 : 1279 - 1301
  • [40] The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
    Hanif, Hazim
    Nasir, Mohd Hairul Nizam Md
    Ab Razak, Mohd Faizal
    Firdaus, Ahmad
    Anuar, Nor Badrul
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 179