LCVD: Loop-oriented code vulnerability detection via graph neural network

被引:4
|
作者
Wang, Mingke [1 ]
Tao, Chuanqi [1 ,2 ,3 ,4 ]
Guo, Hongjing [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Minist Key Lab Safety Crit Software Dev & Verifica, Nanjing, Peoples R China
[3] Collaborat Innovat Ctr Novel Software Technol & In, Nanjing, Peoples R China
[4] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Peoples R China
基金
国家重点研发计划; 中国博士后科学基金;
关键词
Loop-oriented vulnerability; Vulnerability detection; Deep learning; Code representation; Graph neural network;
D O I
10.1016/j.jss.2023.111706
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Due to the unique mechanism and complex structure, loops in programs can easily lead to various vulnerabilities such as dead loops, memory leaks, resource depletion, etc. Traditional approaches to loop-oriented program analysis (e.g. loop summarization) are costly with a high rate of false positives in complex software systems. To address the issues above, recent works have applied deep learning (DL) techniques to vulnerability detection. However, existing DL-based approaches mainly focused on the general characteristics of most vulnerabilities without considering the semantic information of specific vulnerabilities. As a typical structure in programs, loops are highly iterative with multi-paths. Currently, there is a lack of available approaches to represent loops, as well as useful methods to extract the implicit vulnerability patterns. Therefore, this paper introduces LCVD, an automated loop -oriented code vulnerability detection approach. LCVD represents the source code as the Loop-flow Abstract Syntax Tree (LFAST), which focuses on interleaving multi-paths around loop structures. Then a novel Loop-flow Graph Neural Network (LFGNN) is proposed to learn both the local and overall structure of loop-oriented vulnerabilities. The experimental results demonstrate that LCVD outperforms the three static analysis-based and four state-of-the-art DL-based vulnerability detection approaches across evaluation settings.(c) 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Improving Vulnerability Detection with Hybrid Code Graph Representation
    Meng, Xiangxin
    Lu, Shaoxiao
    Wang, Xu
    Liu, Xudong
    Hu, Chunming
    PROCEEDINGS OF THE 2023 30TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC 2023, 2023, : 259 - 268
  • [22] Marine Target Detection via SpatialTemporal Graph Neural Network
    Wang, Xiang
    Cui, Guolong
    Wang, Yumiao
    Zhao, Wenjing
    Xiong, Kui
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2025, 74
  • [23] Event Detection in Social Media via Graph Neural Network
    Gao, Wang
    Fang, Yuan
    Li, Lin
    Tao, Xiaohui
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2021, PT I, 2021, 13080 : 370 - 384
  • [24] BHMVD: Binary Code-based Hybrid Neural Network for Multiclass Vulnerability Detection
    Cui, Ningning
    Chen, Liwei
    Du, Gewangzi
    Wu, Tongshuai
    Zhu, Chenguang
    Shi, Gang
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 238 - 245
  • [25] Vulnerability detection tool in source code by building and leveraging semantic code graph
    Delaitre, Sabine
    Pulgar Gutierrez, Jose Maria
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [26] A Slice-level vulnerability detection and interpretation method based on graph neural network
    Hu Y.-T.
    Wang S.-Y.
    Wu Y.-M.
    Zou D.-Q.
    Li W.-K.
    Jin H.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (06): : 2204 - 2221
  • [27] Semantic-aware Graph Neural Network for Smart Contract Bytecode Vulnerability Detection
    Zhao B.
    Shangguan C.
    Peng X.
    An Y.
    Tong J.
    Yuan A.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2022, 54 (02): : 49 - 55
  • [28] Bud hunting with directed fuzz testing and source code vulnerability detection with advanced graph neural networks
    Le Traon, Yves
    Xie, Tao
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2024, 34 (02):
  • [29] Software Vulnerability Detection Using Informed Code Graph Pruning
    Gear, Joseph
    Xu, Yue
    Foo, Ernest
    Gauravaram, Praveen
    Jadidi, Zahra
    Simpson, Leonie
    IEEE ACCESS, 2023, 11 : 135626 - 135644
  • [30] Automatic Detection of Android Malware via Hybrid Graph Neural Network
    Zhang, Chunyan
    Zhou, Qinglei
    Huang, Yizhao
    Tang, Ke
    Gui, Hairen
    Liu, Fudong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022