LCVD: Loop-oriented code vulnerability detection via graph neural network

被引:4
|
作者
Wang, Mingke [1 ]
Tao, Chuanqi [1 ,2 ,3 ,4 ]
Guo, Hongjing [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Minist Key Lab Safety Crit Software Dev & Verifica, Nanjing, Peoples R China
[3] Collaborat Innovat Ctr Novel Software Technol & In, Nanjing, Peoples R China
[4] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Peoples R China
基金
国家重点研发计划; 中国博士后科学基金;
关键词
Loop-oriented vulnerability; Vulnerability detection; Deep learning; Code representation; Graph neural network;
D O I
10.1016/j.jss.2023.111706
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Due to the unique mechanism and complex structure, loops in programs can easily lead to various vulnerabilities such as dead loops, memory leaks, resource depletion, etc. Traditional approaches to loop-oriented program analysis (e.g. loop summarization) are costly with a high rate of false positives in complex software systems. To address the issues above, recent works have applied deep learning (DL) techniques to vulnerability detection. However, existing DL-based approaches mainly focused on the general characteristics of most vulnerabilities without considering the semantic information of specific vulnerabilities. As a typical structure in programs, loops are highly iterative with multi-paths. Currently, there is a lack of available approaches to represent loops, as well as useful methods to extract the implicit vulnerability patterns. Therefore, this paper introduces LCVD, an automated loop -oriented code vulnerability detection approach. LCVD represents the source code as the Loop-flow Abstract Syntax Tree (LFAST), which focuses on interleaving multi-paths around loop structures. Then a novel Loop-flow Graph Neural Network (LFGNN) is proposed to learn both the local and overall structure of loop-oriented vulnerabilities. The experimental results demonstrate that LCVD outperforms the three static analysis-based and four state-of-the-art DL-based vulnerability detection approaches across evaluation settings.(c) 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Graph Neural Network for Source Code Defect Prediction
    Sikic, Lucija
    Kurdija, Adrian Satja
    Vladimir, Klemo
    Silic, Marin
    IEEE ACCESS, 2022, 10 : 10402 - 10415
  • [42] Vulnerability detection with feature fusion and learnable edge-type embedding graph neural network
    Cheng, Ge
    Luo, Qifan
    Zhang, Yun
    INFORMATION AND SOFTWARE TECHNOLOGY, 2025, 181
  • [43] A Graph Neural Network-Based Smart Contract Vulnerability Detection Method with Artificial Rule
    Wei, Ziyue
    Zheng, Weining
    Su, Xiaohong
    Tao, Wenxin
    Wang, Tiantian
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PT IV, 2023, 14257 : 241 - 252
  • [44] BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection
    Cao, Sicong
    Sun, Xiaobing
    Bo, Lili
    Wei, Ying
    Li, Bin
    INFORMATION AND SOFTWARE TECHNOLOGY, 2021, 136
  • [45] E-GVD: Efficient Software Vulnerability Detection Techniques Based on Graph Neural Network
    Wang, Haiye
    Qu, Zhiguo
    Sun, Le
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2024, 11 (06): : 1 - 9
  • [46] Enhanced Graph Neural Networks for Vulnerability Detection in Java']Java via Advanced Subgraph Construction
    Foulef, Rosmael Zidane Lekeufack
    Marchetto, Alessandro
    TESTING SOFTWARE AND SYSTEMS, ICTSS 2024, 2025, 15383 : 131 - 148
  • [47] Online Social Event Detection via Filtering Strategy Graph Neural Network
    Chen, Lifu
    Fang, Junhua
    Chao, Pingfu
    Liu, An
    Zhao, Pengpeng
    WEB ENGINEERING (ICWE 2022), 2022, 13362 : 66 - 81
  • [48] Graph neural network for fraud detection via context encoding and adaptive aggregation
    Lou, Chaoli
    Wang, Yueyang
    Li, Jianing
    Qian, Yueru
    Li, Xiuhua
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 261
  • [49] Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach
    Zhai, Yiwen
    Yang, Jia
    Zhang, Mingwu
    FRONTIERS IN CYBER SECURITY, FCS 2024, PT I, 2024, 2315 : 317 - 332
  • [50] Code Vulnerability Detection Based on Deep Sequence and Graph Models: A Survey
    Wu, Bolun
    Zou, Futai
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022