Discovering API usage specifications for security detection using two-stage code mining

被引:0
|
作者
Yin, Zhongxu [1 ]
Song, Yiran [2 ]
Zong, Guoxiao [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450001, Peoples R China
[2] Henan Univ Anim Husb Econ, Zhengzhou 450046, Peoples R China
来源
CYBERSECURITY | 2024年 / 7卷 / 01期
关键词
Specification mining; Frequent API sequence; Semantic relationship; Under-constrained symbolic execution; Vulnerability mining;
D O I
10.1186/s42400-024-00224-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An application programming interface (API) usage specification, which includes the conditions, calling sequences, and semantic relationships of the API, is important for verifying its correct usage, which is in turn critical for ensuring the security and availability of the target program. However, existing techniques either mine the co-occurring relationships of multiple APIs without considering their semantic relationships, or they use data flow and control flow information to extract semantic beliefs on API pairs but difficult to incorporate when mining specifications for multiple APIs. Hence, we propose an API specification mining approach that efficiently extracts a relatively complete list of the API combinations and semantic relationships between APIs. This approach analyzes a target program in two stages. The first stage uses frequent API set mining based on frequent common API identification and filtration to extract the maximal set of frequent context-sensitive API sequences. In the second stage, the API relationship graph is constructed using three semantic relationships extracted from the symbolic path information, and the specifications containing semantic relationships for multiple APIs are mined. The experimental results on six popular open-source code bases of different scales show that the proposed two-stage approach not only yields better results than existing typical approaches, but also can effectively discover the specifications along with the semantic relationships for multiple APIs. Instance analysis shows that the analysis of security-related API call violations can assist in the cause analysis and patch of software vulnerabilities.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] Two-Stage Hybrid Malware Detection Using Deep Learning
    Baek, Seungyeon
    Jeon, Jueun
    Jeong, Byeonghui
    Jeong, Young-Sik
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2021, 11
  • [22] A two-stage technique to improve intrusion detection systems based on data mining algorithms
    Fatma, Hachmi
    Mohamed, Limam
    2013 5TH INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND APPLIED OPTIMIZATION (ICMSAO), 2013,
  • [23] Two-stage code reference beamformer in mobile communications
    Mestre, X
    Najar, M
    Lagunas, MA
    PROCEEDINGS OF THE 1998 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-6, 1998, : 3309 - 3312
  • [24] Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies
    Buriachok, Volodymyr
    Ageyev, Dmytro
    Zhyltsov, Oleksii
    Skladannyi, Pavlo
    Sokolov, Volodymyr
    CYBERSECURITY PROVIDING IN INFORMATION AND TELECOMMUNICATION SYSTEMS (CPITS 2020), 2020, 2746 : 23 - 32
  • [25] Multichannel two-stage detection of signals
    Sosulin, YG
    Gavrilov, KY
    Wojtkiewicz, A
    Nalecz, M
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2000, 36 (03) : 793 - 809
  • [26] Enhancing Power System Cyber-Security With Systematic Two-Stage Detection Strategy
    Li, Xingpeng
    Hedman, Kory W.
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2020, 35 (02) : 1549 - 1561
  • [27] Two-stage exact detection of symmetries
    Tomaszewska, AM
    Dziurzanski, P
    Yanushkevich, SN
    Shmerko, VP
    31ST INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC, PROCEEDINGS, 2001, : 213 - 218
  • [28] Text to Image Synthesis Using Two-Stage Generation and Two-Stage Discrimination
    Zhang, Zhiqiang
    Zhang, Yunye
    Yu, Wenxin
    He, Gang
    Jiang, Ning
    He, Gang
    Fan, Yibo
    Yang, Zhuo
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2019, PT II, 2019, 11776 : 110 - 114
  • [29] Pattern Mining for a Two-Stage Information Filtering System
    Zhou, Xujuan
    Li, Yuefeng
    Bruza, Peter
    Xu, Yue
    Lau, Raymond Y. K.
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PT I: 15TH PACIFIC-ASIA CONFERENCE, PAKDD 2011, 2011, 6634 : 363 - 374
  • [30] Exploring Information Asymmetry in Two-Stage Security Games
    Xu, Haifeng
    Rabinovich, Zinovi
    Dughmi, Shaddin
    Tambe, Milind
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 1057 - 1063