Vulnerability detection tool in source code by building and leveraging semantic code graph

被引:0
|
作者
Delaitre, Sabine [1 ]
Pulgar Gutierrez, Jose Maria [2 ]
机构
[1] DocExploit Team, Bosonit Grp, Logrono, Spain
[2] DocExploit SL, Logrono, Spain
关键词
Application Security Testing; Vulnerability detection in Code; Knowledge graph; Automation; Preventive secure systems; DevOps framework;
D O I
10.1145/3664476.3670942
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents different vulnerability detection tools to ensure the security of software applications and container environments from a preventive and holistic approach. The solution aims to improve the quality and security of software by leveraging knowledge graph technology for a more accurate and comprehensive detection process of vulnerabilities. The ambition is to detect the vulnerabilities in the whole software supply chain and to support developers holding security as a key component over the Software Development life-cycle. We design reliable tools by building a semantic graph-based abstraction of the code from the compiler state, and we reach high accuracy by developing different static code analyzers optimizing the detection of software vulnerabilities in the source code and dependencies. In this paper, we will introduce the cybersecurity suite composed of different vulnerability detection tools to promote developer autonomy and security automation over the software supply chain. The main tool (DocSpot) detects vulnerabilities in the application source code and leverages knowledge graph technology. The second tool (DocDocker) scans for vulnerabilities in containers, and the third one (SirDocker) detects orchestration vulnerabilities, e.g. related to configuration, recommends secure best practices, and supports secure management of the containers and container images. The main contributions to the field of security automation are detailed and the first experiments and results of the tools are exposed. Finally, we describe the contributions to improving security in software and IoT applications.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] CSGVD: A deep learning approach combining sequence and graph embedding for source code vulnerability detection
    Tang, Wei
    Tang, Mingwei
    Ban, Minchao
    Zhao, Ziguo
    Feng, Mingjun
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 199
  • [22] A vulnerability detection algorithm based on residual graph attention networks for source code imbalance (RGAN)
    Tang, Mingwei
    Tang, Wei
    Gui, Qingchi
    Hu, Jie
    Zhao, Mingfeng
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [23] Software Vulnerability Detection Using Informed Code Graph Pruning
    Gear, Joseph
    Xu, Yue
    Foo, Ernest
    Gauravaram, Praveen
    Jadidi, Zahra
    Simpson, Leonie
    IEEE ACCESS, 2023, 11 : 135626 - 135644
  • [24] Using graph databases in source code plagiarism detection
    Novak, Matija
    Levak, Iva
    CENTRAL EUROPEAN CONFERENCE ON INFORMATION AND INTELLIGENT SYSTEMS, CECIIS 2022, 2022, : 465 - 470
  • [25] VD-HEN: Capturing Semantic Dependencies for Source Code Vulnerability Detection With a Hierarchical Embedding Network
    Hao, Jingwei
    Luo, Senlin
    Pan, Limin
    Chen, Chuantao
    COMPUTER, 2023, 56 (10) : 49 - 61
  • [26] Leveraging source code search for reuse
    Happel, Hans-Joerg
    Schuster, Thomas
    Szulman, Peter
    HIGH CONFIDENCE SOFTWARE REUSE IN LARGE SYSTEMS, PROCEEDINGS, 2008, 5030 : 360 - 371
  • [27] Bud hunting with directed fuzz testing and source code vulnerability detection with advanced graph neural networks
    Le Traon, Yves
    Xie, Tao
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2024, 34 (02):
  • [28] Source Code and Binary Level Vulnerability Detection and Hot Patching
    Xu, Zhengzi
    2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 2020, : 1397 - 1399
  • [29] A Privacy-Preserving Source Code Vulnerability Detection Method
    Zhao, Dongdong
    Yu, Zizhuo
    Zhou, Jing
    Xiang, Jianwen
    PATTERN RECOGNITION AND COMPUTER VISION, PT III, PRCV 2024, 2025, 15033 : 438 - 452
  • [30] An Automatic Source Code Vulnerability Detection Approach Based on KELM
    Tang, Gaigai
    Yang, Lin
    Ren, Shuangyin
    Meng, Lianxiao
    Yang, Feng
    Wang, Huiqiang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021