Vulnerability Detection Based on Enhanced Graph Representation Learning

被引:0
|
作者
Xiao, Peng [1 ]
Xiao, Qibin [1 ]
Zhang, Xusheng [2 ]
Wu, Yumei [3 ]
Yang, Fengyu [1 ]
机构
[1] Nanchang Hangkong Univ, Sch Software, Nanchang 330063, Peoples R China
[2] Jiangxi Prov Inst Network Secur, Nanchang 330000, Peoples R China
[3] Beihang Univ, Sch Reliabil & Syst Engn, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability detection; graph representation learning; enhanced graph structure; AST embedding; feature space complementarity; CONVOLUTIONAL NEURAL-NETWORKS; PREDICTION; MODEL;
D O I
10.1109/TIFS.2024.3392536
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The detection of program vulnerabilities remains a challenging task in software security. The existing vulnerability detection methods rarely consider the multidimensional feature space complementarity of program graph structures, which easily overlooks contextual environment features and syntax structure features. This disadvantage leads to insufficient performance in capturing complex structural features, which hinders the improvement in detection accuracy. To address this issue, this paper introduces a novel vulnerability detection method, EnGS2F, which adopts the representation learning of an enhanced graph structure to improve the efficiency of capturing vulnerability information. On the dimension of the graph structure, a context relationship graph (CRG) is integrated on the basis of a program dependency graph (PDG) to enrich the global structural context representation. On the dimension of graph nodes, abstract syntax tree (AST) embedding and paragraph embedding are integrated to solve the problem of insufficient feature space complementarity. Moreover, the combination of a gated graph neural network (GGNN) with a graph attention mechanism further improves the learning performance of the enhanced graph structure. EnGS2F has been rigorously evaluated on program slices from open-source vulnerability datasets, demonstrating significant improvements over current competitive methods in detecting program vulnerabilities. Specifically, EnGS2F achieved a significant increase in the F1 score, outperforming existing technologies by 6%.
引用
收藏
页码:5120 / 5135
页数:16
相关论文
共 50 条
  • [1] Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
    Wen, Xin-Cheng
    Chen, Yupan
    Gao, Cuiyun
    Zhang, Hongyu
    Zhang, Jie M.
    Liao, Qing
    [J]. 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 2275 - 2286
  • [2] VulSPG: Vulnerability detection based on slice property graph representation learning
    Zheng, Weining
    Jiang, Yuan
    Su, Xiaohong
    [J]. 2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), 2021, : 457 - 467
  • [3] A vulnerability detection framework with enhanced graph feature learning
    Cheng, Jianxin
    Chen, Yizhou
    Cao, Yongzhi
    Wang, Hanpin
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2024, 216
  • [4] Vulnerability Detection via Multiple-Graph-Based Code Representation
    Qiu, Fangcheng
    Liu, Zhongxin
    Hu, Xing
    Xia, Xin
    Chen, Gang
    Wang, Xinyu
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 50 (08) : 2178 - 2199
  • [5] VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning
    Zhang, Xin
    Sun, Hongyu
    He, Zhipeng
    Gu, MianXue
    Feng, Jingyu
    Zhang, Yuqing
    [J]. 52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOP VOLUME (DSN-W 2022), 2022, : 186 - 190
  • [6] Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph
    Yang, Hongyu
    Yang, Haiyun
    Zhang, Liang
    Cheng, Xiang
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 457 - 464
  • [7] Graph representation learning and software homology matching based A study of JAVA']JAVA code vulnerability detection techniques
    Yang, Yibin
    Bo, Xin
    Wang, Zitong
    Shao, Xinrui
    Xie, Xinjie
    [J]. 2023 2ND ASIA CONFERENCE ON ALGORITHMS, COMPUTING AND MACHINE LEARNING, CACML 2023, 2023, : 131 - 142
  • [8] Vulnerability Detection in C/C plus plus Source Code With Graph Representation Learning
    Wu, Yuelong
    Lu, Jintian
    Zhang, Yunyi
    Jin, Shuyuan
    [J]. 2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 1519 - 1524
  • [9] Improving Vulnerability Detection with Hybrid Code Graph Representation
    Meng, Xiangxin
    Lu, Shaoxiao
    Wang, Xu
    Liu, Xudong
    Hu, Chunming
    [J]. PROCEEDINGS OF THE 2023 30TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC 2023, 2023, : 259 - 268
  • [10] Learning Class-Based Graph Representation for Object Detection
    Miao, Shuyu
    Feng, Rui
    Zhang, Yuejie
    Fan, Weiguo
    [J]. ECAI 2020: 24TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, 325 : 2752 - 2759