Detection of Vulnerabilities by Incorrect Use of Variable Using Machine Learning

被引:1
|
作者
Park, Jihyun [1 ]
Shin, Jaeyoung [2 ]
Choi, Byoungju [2 ]
机构
[1] Ewha Womans Univ, Dept Artificial Intelligence & Software, Seoul 03760, South Korea
[2] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul 03760, South Korea
关键词
software fault detection; machine learning; variable vulnerability;
D O I
10.3390/electronics12051197
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Common Weakness Enumeration (CWE) refers to a list of faults caused from software or hardware. The CWE includes the faults related to programming language and security. We propose a technique to detect the vulnerabilities from incorrect use of a variable in C language. There are various static/dynamic methods to detect the variable vulnerabilities. However, when analyzing the vulnerabilities, a static technique causes a lot of false alarms, meaning that there is no fault in the actual implementation. When monitoring the variable via the static analysis, there is a great overhead during execution, so its application is not easy in a real environment. In this paper, we propose a method to reduce false alarms and detect vulnerabilities by performing static analysis and dynamic verification using machine learning. Our method extracts information on variables through static analysis and detects defects through static analysis results and execution monitoring of the variables. In this process, it is determined whether the currently used variable values are valid and whether the variables are used in the correct order by learning the initial values and permissible range of the variables using machine learning techniques. We implemented our method as VVDUM (Variable Vulnerability Detector Using Machine learning). We conducted the comparative experiment with the existing static/dynamic analysis tools. As a result, compared with other tools with the rate of variable vulnerability detection between 9.17 similar to 18.5%, ours had that of 89.5%. In particular, VVDUM detects 'defects out of the range of valid' that are difficult to detect with existing methods, and the overhead due to defect detection is small. In addition, there were a few overheads at run time that were caused during data collection for detection of a fault.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Automatic Detection and Correction of Vulnerabilities using Machine Learning
    Tommy, Robin
    Sundeep, Gullapudi
    Jose, Hima
    [J]. 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 1062 - 1065
  • [2] Extracting rules for vulnerabilities detection with static metrics using machine learning
    Gupta, Aakanshi
    Suri, Bharti
    Kumar, Vijay
    Jain, Pragyashree
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2021, 12 (01) : 65 - 76
  • [3] Extracting rules for vulnerabilities detection with static metrics using machine learning
    Aakanshi Gupta
    Bharti Suri
    Vijay Kumar
    Pragyashree Jain
    [J]. International Journal of System Assurance Engineering and Management, 2021, 12 : 65 - 76
  • [4] Early Detection of Vulnerabilities from News Websites using Machine Learning Models
    Iorga, Denis
    Corlatescu, Dragos
    Grigorescu, Octavian
    Sandescu, Cristian
    Dascalu, Mihai
    Rughinis, Razvan
    [J]. 2020 19TH ROEDUNET CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2020,
  • [5] Predicting Phishing Vulnerabilities Using Machine Learning
    Rutherford, Sarah
    Lin, Kevin
    Blaine, Raymond W.
    [J]. SOUTHEASTCON 2022, 2022, : 779 - 786
  • [6] Utilization of Machine Learning for the Detection of Self-admitted Vulnerabilities
    Mock, Moritz
    [J]. PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROFES 2023, PT II, 2024, 14484 : 139 - 145
  • [7] Detecting Vulnerabilities in Source Code Using Machine Learning
    Hany, Omar
    Abu-Elkheir, Mervat
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED CYBER SECURITY (ACS) 2021, 2022, 378 : 35 - 41
  • [8] Analysis of Software Vulnerabilities Using Machine Learning Techniques
    Diako, Doffou Jerome
    Achiepo, Odilon Yapo M.
    Mensah, Edoete Patrice
    [J]. E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2019), 2020, 311 : 30 - 37
  • [9] Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms
    Ramesh, Vishnu
    Abraham, Sara
    Vinod, P.
    Mohamed, Isham
    Visaggio, Corrado A.
    Laudanna, Sonia
    [J]. 2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [10] False Positive Analysis of software vulnerabilities using Machine learning
    Gowda, Sumanth
    Prajapati, Divyesh
    Singh, Ranjit
    Gadre, Swanand S.
    [J]. 2018 SEVENTH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2018, : 3 - 6