Discovering API usage specifications for security detection using two-stage code mining

被引:0
|
作者
Yin, Zhongxu [1 ]
Song, Yiran [2 ]
Zong, Guoxiao [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450001, Peoples R China
[2] Henan Univ Anim Husb Econ, Zhengzhou 450046, Peoples R China
来源
CYBERSECURITY | 2024年 / 7卷 / 01期
关键词
Specification mining; Frequent API sequence; Semantic relationship; Under-constrained symbolic execution; Vulnerability mining;
D O I
10.1186/s42400-024-00224-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An application programming interface (API) usage specification, which includes the conditions, calling sequences, and semantic relationships of the API, is important for verifying its correct usage, which is in turn critical for ensuring the security and availability of the target program. However, existing techniques either mine the co-occurring relationships of multiple APIs without considering their semantic relationships, or they use data flow and control flow information to extract semantic beliefs on API pairs but difficult to incorporate when mining specifications for multiple APIs. Hence, we propose an API specification mining approach that efficiently extracts a relatively complete list of the API combinations and semantic relationships between APIs. This approach analyzes a target program in two stages. The first stage uses frequent API set mining based on frequent common API identification and filtration to extract the maximal set of frequent context-sensitive API sequences. In the second stage, the API relationship graph is constructed using three semantic relationships extracted from the symbolic path information, and the specifications containing semantic relationships for multiple APIs are mined. The experimental results on six popular open-source code bases of different scales show that the proposed two-stage approach not only yields better results than existing typical approaches, but also can effectively discover the specifications along with the semantic relationships for multiple APIs. Instance analysis shows that the analysis of security-related API call violations can assist in the cause analysis and patch of software vulnerabilities.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] Two-stage access control model for XML security
    Sun, W
    Liu, DX
    Wang, T
    DIGITAL LIBRARIES: IMPLEMENTING STRATEGIES AND SHARING EXPERIENCES, PROCEEDINGS, 2005, 3815 : 479 - 480
  • [32] Test Code Generation for Telecom Software Systems using Two-Stage Generative Model
    Nabeel, Mohamad
    Nimara, Doumitrou Daniil
    Zanouda, Tahar
    2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024, 2024, : 1231 - 1236
  • [33] Drunk Driving Detection Using Two-Stage Deep Neural Network
    Chang, Robert Chen-Hao
    Wang, Chia-Yu
    Li, Hsin-Han
    Chiu, Cheng-Di
    IEEE ACCESS, 2021, 9 : 116564 - 116571
  • [34] Damage Detection for Cantilever Beam Structures Using Two-stage Method
    Li, Cuihong
    Yang, Qiuwei
    Shen, Xue
    ADVANCES IN CIVIL STRUCTURES, PTS 1 AND 2, 2013, 351-352 : 1084 - 1087
  • [35] Detection of daily living activities using a two-stage Markov model
    Kalra, Love
    Zhao, Xinghui
    Soto, Axel J.
    Milios, Evangelos
    JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2013, 5 (03) : 273 - 285
  • [36] Low-observable target detection using two-stage RFRFT
    Wang, Wenguang
    Chen, Cheng
    Qu, Gaolong
    Zuo, Yan
    Zeng, Guoqi
    IET RADAR SONAR AND NAVIGATION, 2019, 13 (04): : 653 - 663
  • [37] Two-stage credit card fraud detection using sequence alignment
    Kundu, Amlan
    Sural, Shamik
    Majumdar, A. K.
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 260 - +
  • [38] Gene-Gene Interactions Detection Using a Two-Stage Model
    Wang, Zhanyong
    Sul, Jae-Hoon
    Snir, Sagi
    Lozano, Jose A.
    Eskin, Eleazar
    RESEARCH IN COMPUTATIONAL MOLECULAR BIOLOGY, RECOMB2014, 2014, 8394 : 340 - 355
  • [39] Two-stage multiuser detection for asynchronous CDMA using DPSK signalling
    Hegarty, C
    Vojcic, B
    IEEE GLOBECOM 1996 - COMMUNICATIONS THEORY MINI-CONFERENCE, CONFERENCE RECORD: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 132 - 136
  • [40] Polycystic Ovarian Syndrome Detection by Using Two-Stage Image Denoising
    Choubey, Shruti Bhargava
    Choubey, Abhishek
    Nandan, Durgesh
    Mahajan, Anurag
    TRAITEMENT DU SIGNAL, 2021, 38 (04) : 1217 - 1227