Software Vulnerability Mining and Analysis Based on Deep Learning

被引:0
|
作者
Zhao, Shibin [1 ]
Zhu, Junhu [1 ]
Peng, Jianshan [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 80卷 / 02期
关键词
Vulnerability mining; software security; deep learning; static analysis;
D O I
10.32604/cmc.2024.041949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the rapid development of computer software has led to numerous security problems, particularly software vulnerabilities. These flaws can cause significant harm to users' privacy and property. Current security defect detection technology relies on manual or professional reasoning, leading to missed detection and high false detection rates. Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes, reducing missed alarms and false alarms. So, this XSS (Transform), and Structured Query Language (SQL) injection. Also, the project uses open-source Javalang to translate the Java source code, conducts a deep search on the AST to obtain the empty syntax feature library, and converts the Java source code into a dependency graph. The feature vector is then used as the learning target for the neural network. Four types of Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), Bi-directional Long Short-Term Memory (BiLSTM), and Attention Mechanism + Bidirectional LSTM, are used to investigate various code defects, including blank pointer reference exception, XSS, and SQL injection defects. Experimental results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition, verifying the correctness of the method.
引用
收藏
页码:3263 / 3287
页数:25
相关论文
共 50 条
  • [1] Survey of Software Vulnerability Mining Methods Based on Machine Learning
    Li Y.
    Huang C.-L.
    Wang Z.-F.
    Yuan L.
    Wang X.-C.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (07): : 2040 - 2061
  • [2] A deep learning based static taint analysis approach for IoT software vulnerability location
    Niu, Weina
    Zhang, Xiaosong
    Du, Xiaojiang
    Zhao, Lingyuan
    Cao, Rong
    Guizani, Mohsen
    [J]. MEASUREMENT, 2020, 152
  • [3] A software vulnerability detection method based on deep learning with complex network analysis and subgraph partition
    Cai, Wenjing
    Chen, Junlin
    Yu, Jiaping
    Gao, Lipeng
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2023, 164
  • [4] Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey
    Zeng, Peng
    Lin, Guanjun
    Pan, Lei
    Tai, Yonghang
    Zhang, Jun
    [J]. IEEE ACCESS, 2020, 8 : 197158 - 197172
  • [5] Software Vulnerability Detection and Analysis Technology Integrating Static Taint Analysis and Deep Learning
    Luo, Li
    Zhu, Honghua
    [J]. International Journal of Network Security, 2024, 26 (05) : 776 - 785
  • [6] Survey on Software Vulnerability Analysis method based on Machine Learning
    Gong Jie
    Kuang Xiao-hui
    Liu Qiang
    [J]. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 642 - 647
  • [7] Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning
    Sun, Wei
    Yan, Zheng
    Xu, Xi
    Ding, Wenxiu
    Gao, Lijun
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 800 - 809
  • [8] An Empirical Study on Vulnerability Detection for Source Code Software based on Deep Learning
    Lin, Wei
    Cai, Saihua
    [J]. 2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 1159 - 1160
  • [9] Cross-Project Vulnerability Prediction Based on Software Metrics and Deep Learning
    Kalouptsoglou, Ilias
    Siavvas, Miltiadis
    Tsoukalas, Dimitrios
    Kehagias, Dionysios
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2020, PART IV, 2020, 12252 : 877 - 893
  • [10] Android software vulnerability mining framework based on dynamic taint analysis technology
    Zhao Min
    Yang Haimin
    Chen Ping
    Yang Zhengxing
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2112 - 2115