Automatic software vulnerability assessment by extracting vulnerability elements

被引:6
|
作者
Sun, Xiaobing [1 ,2 ]
Ye, Zhenlei [1 ]
Bo, Lili [1 ,2 ,3 ]
Wu, Xiaoxue [1 ,2 ]
Wei, Ying [1 ]
Zhang, Tao [4 ]
Li, Bin [1 ,2 ]
机构
[1] Yangzhou Univ, Sch Informat Engn, Yangzhou, Peoples R China
[2] Yangzhou Univ, Jiangsu Prov Engn Res Ctr Knowledge Management & I, Yangzhou, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Key Lab Safety Crit Software, Minist Ind & Informat Technol, Nanjing, Peoples R China
[4] Macau Univ Sci & Technol MUST, Sch Comp Sci & Engn, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability assessment; Deep learning; Multi-class classification; Mining software repositories; CLASSIFICATION;
D O I
10.1016/j.jss.2023.111790
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software vulnerabilities take threats to software security. When faced with multiple software vulnerabilities, the most urgent ones need to be fixed first. Therefore, it is critical to assess the severity of vulnerabilities in advance. However, increasing number of vulnerability descriptions do not use templates, which reduces the performance of the existing software vulnerability assessment approaches. In this paper, we propose an automated vulnerability assessment approach that using vulnerability elements for predicting the severity of six vulnerability metrics (i.e., Access Vector, Access Complexity, Authentication, Confidentiality Impact, Integrity Impact and Availability Impact). First, we use BERT-MRC to extract vulnerability elements from vulnerability descriptions. Second, we assess six metrics using vulnerability elements instead of full descriptions. We conducted experiments on our manually labeled dataset. The experimental results show that our approach has an improvement of 12.03%, 14.37%, and 38.65% on Accuracy over three baselines.& COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Automatic analysis to vulnerability of ASLR
    Huang N.
    Huang S.
    Pan Z.
    Chang C.
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2020, 42 (02): : 162 - 170and185
  • [42] Economics of software vulnerability disclosure
    Arora, A
    Telang, R
    IEEE SECURITY & PRIVACY, 2005, 3 (01) : 20 - 25
  • [43] A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques
    Shen, Zhidong
    Chen, Si
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [44] Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description
    Han, Zhuobing
    Li, Xiaohong
    Xing, Zhenchang
    Liu, Hongtao
    Feng, Zhiyong
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, : 125 - 136
  • [45] Automated Software Vulnerability Detection in Statement Level using Vulnerability Reports
    Mim, Rabaya Sultana
    Ahammed, Toukir
    Sakib, Kazi
    PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 454 - 455
  • [46] Vulnerability Modelling to Improve Assessment Process on Community Vulnerability
    Pamungkas, Adjie
    Bekessy, Sarah A.
    Lane, Ruth
    RESILIENT CITIES: BEYOND MITIGATION, PREPAREDNESS, RESPONSE, AND RECOVERY (CITIES 2013 INTERNATIONAL SEMINAR), 2014, 135 : 159 - 166
  • [47] AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process
    Zou, Deqing
    Yang, Ju
    Li, Zhen
    Jin, Hai
    Ma, Xiaojing
    GREEN, PERVASIVE, AND CLOUD COMPUTING, GPC 2019, 2019, 11484 : 238 - 253
  • [48] Ontological vulnerability assessment
    Steele, Aaron
    WEB INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2008, 5176 : 24 - 35
  • [49] Vulnerability assessment activities
    Dagle, J
    2001 IEEE POWER ENGINEERING SOCIETY WINTER MEETING, CONFERENCE PROCEEDINGS, VOLS 1-3, 2001, : 108 - 113
  • [50] FIRE VULNERABILITY ASSESSMENT
    POTTER, RC
    PFREMMER, RD
    STAMATELATOS, MG
    PARKER, DJ
    TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1982, 43 : 468 - 468