An advanced computing approach for software vulnerability detection

被引:1
|
作者
Do Xuan C. [1 ]
Cong B.V. [2 ]
机构
[1] Department of Information Security, Posts and Telecommunications Institute of Technology, Hanoi
[2] Department of Information Technology, University of Economics and Technical Industries, Hanoi
基金
英国科研创新办公室;
关键词
Code property graph; Deep graph networks; Natural language processing; Rebalancing data; Software vulnerability detection;
D O I
10.1007/s11042-024-19682-y
中图分类号
学科分类号
摘要
Detecting software vulnerabilities is a very urgent problem today. One of the common approaches for detecting software vulnerabilities is source code analysis. In this paper, to improve the effectiveness of the software vulnerability detection model based on source code analysis, we propose a novel model called GRD. The GRD model performs source code analysis to find and conclude about source code vulnerabilities based on a combination of two main methods: Feature Intelligent Extraction and Rebalancing Data. In particular, Feature Intelligent Extraction, which includes two models: deep graph networks and natural language processing (NLP) techniques, is responsible for synthesizing and extracting features of source code in the code property graph (CPG) form. Rebalancing Data has the function of balancing data to improve the efficiency of the source code classification task. The main characteristics of our proposal in this paper include two main phases as follows. The first phase extracts and synthesizes source code features into the CPG form. At this phase, the article proposes using Graph Convolution Network (GCN) to extract CPG features, and RoBERTa to extract source code snippets on the node of CPG. In the second phase, based on the feature vectors of the source code obtained in phase 1, the article proposes using the Dropout technique to generate data to balance among labels. Finally, the feature vectors generated after the Dropout technique are used to predict source code vulnerabilities. The study evaluates the proposed model on two common datasets: Verum and FFMQ. The experimental results in the article have shown the superiority of the proposed model compared to other approaches on all measures. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:86707 / 86740
页数:33
相关论文
共 50 条
  • [41] Enhanced Detection of Advanced Malicious Software
    Fraley, James B.
    Cannady, James
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [42] An Approach to Analyze Vulnerability of Information Flow in Software Architecture
    Gu, Tingyang
    Lu, Minyan
    Li, Luyi
    Li, Qiuying
    APPLIED SCIENCES-BASEL, 2020, 10 (01):
  • [43] An Efficient Approach for Software Protection in Cloud Computing
    Singh, Navneet
    Singh, Shailendra
    Agarwal, Swapnamukta
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 550 - 554
  • [44] GREEN COMPUTING FOR IOT-SOFTWARE APPROACH
    Turkmanovic, Haris
    Popovic, Ivan
    Drajic, Dejan
    Cica, Zoran
    FACTA UNIVERSITATIS-SERIES ELECTRONICS AND ENERGETICS, 2022, 35 (04) : 541 - 555
  • [45] ASSL: A Software Engineering Approach to Autonomic Computing
    Vassev, Emil
    Hinchey, Mike
    COMPUTER, 2009, 42 (06) : 90 - 93
  • [46] An approach for SQL injection vulnerability detection
    Mei Junjin
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1411 - 1414
  • [47] Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection
    Van Nguyen
    Trung Le
    de Vel, Olivier
    Montague, Paul
    Grundy, John
    Dinh Phung
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2020, PT I, 2020, 12084 : 699 - 711
  • [48] Advanced Vulnerability Scanning for Open Source Software to Minimize False Positives
    Wen, Victor
    Peng, Zedong
    2024 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE, IRI 2024, 2024, : 156 - 157
  • [49] An advanced intrusion detection framework for cloud computing
    Ficco, Massimo
    Venticinque, Salvatore
    Di Martino, Beniamino
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2013, 28 (06): : 401 - 411
  • [50] Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis
    Kim, Seokmo
    Kim, R. Young Chul
    Park, Young B.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (03) : 777 - 793