Discovering API usage specifications for security detection using two-stage code mining

被引:0
|
作者
Yin, Zhongxu [1 ]
Song, Yiran [2 ]
Zong, Guoxiao [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450001, Peoples R China
[2] Henan Univ Anim Husb Econ, Zhengzhou 450046, Peoples R China
来源
CYBERSECURITY | 2024年 / 7卷 / 01期
关键词
Specification mining; Frequent API sequence; Semantic relationship; Under-constrained symbolic execution; Vulnerability mining;
D O I
10.1186/s42400-024-00224-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An application programming interface (API) usage specification, which includes the conditions, calling sequences, and semantic relationships of the API, is important for verifying its correct usage, which is in turn critical for ensuring the security and availability of the target program. However, existing techniques either mine the co-occurring relationships of multiple APIs without considering their semantic relationships, or they use data flow and control flow information to extract semantic beliefs on API pairs but difficult to incorporate when mining specifications for multiple APIs. Hence, we propose an API specification mining approach that efficiently extracts a relatively complete list of the API combinations and semantic relationships between APIs. This approach analyzes a target program in two stages. The first stage uses frequent API set mining based on frequent common API identification and filtration to extract the maximal set of frequent context-sensitive API sequences. In the second stage, the API relationship graph is constructed using three semantic relationships extracted from the symbolic path information, and the specifications containing semantic relationships for multiple APIs are mined. The experimental results on six popular open-source code bases of different scales show that the proposed two-stage approach not only yields better results than existing typical approaches, but also can effectively discover the specifications along with the semantic relationships for multiple APIs. Instance analysis shows that the analysis of security-related API call violations can assist in the cause analysis and patch of software vulnerabilities.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] Two-stage classification using selective attention for fast face detection
    Jones, SR
    Capson, DW
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 465 - 468
  • [42] Two-Stage Underwater Object Detection Network Using Swin Transformer
    Liu, Jia
    Liu, Shuang
    Xu, Shujuan
    Zhou, Changjun
    IEEE ACCESS, 2022, 10 : 117235 - 117247
  • [43] Low Complexity Two-Stage Sensing using Energy Detection and Beamforming
    Latha, M. Madhuri
    Gohain, Prakash B.
    Chaudhari, Sachin
    2018 TWENTY FOURTH NATIONAL CONFERENCE ON COMMUNICATIONS (NCC), 2018,
  • [44] Two-stage damage detection to a benchmark structure using ambient data
    Xu, L. H.
    Qian, J. R.
    STRUCTURAL HEALTH MONITORING AND INTELLIGENT INFRASTRUCTURE, VOLS 1 AND 2, 2006, : 785 - 789
  • [45] Two-Stage Spectrum Sensing for Cognitive Radio Using Eigenvalues Detection
    Mashta, Faten
    Altabban, Wissam
    Wainakh, Mohieddin
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2020, 12 (04) : 18 - 36
  • [46] Gene-Gene Interactions Detection Using a Two-stage Model
    Wang, Zhanyong
    Sul, Jae Hoon
    Snir, Sagi
    Lozano, Jose A.
    Eskin, Eleazar
    JOURNAL OF COMPUTATIONAL BIOLOGY, 2015, 22 (06) : 563 - 576
  • [47] Co-saliency detection with two-stage co-attention mining and individual calibration
    Tan, Zhenshan
    Gu, Xiaodong
    Cheng, Qingrong
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 127
  • [48] White blood cell detection using saliency detection and CenterNet: A two-stage approach
    Zheng, Xin
    Tang, Pan
    Ai, Liefu
    Liu, Deyang
    Zhang, Youzhi
    Wang, Boyang
    JOURNAL OF BIOPHOTONICS, 2023, 16 (03)
  • [49] Modeling of a Two-Stage Photovoltaic System for Grid Code Compatibility
    Huka, Gelma Boneya
    Chao, Pupu
    Li, Weixing
    Yang, Libin
    Zhang, Lei
    Liu, Xin
    2018 2ND IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2018, : 767 - 772
  • [50] Guided pattern mining for API misuse detection by change-based code analysis
    Nielebock, Sebastian
    Heumueller, Robert
    Schott, Kevin Michael
    Ortmeier, Frank
    AUTOMATED SOFTWARE ENGINEERING, 2021, 28 (02)