Detection of Vulnerabilities by Incorrect Use of Variable Using Machine Learning

被引:1
|
作者
Park, Jihyun [1 ]
Shin, Jaeyoung [2 ]
Choi, Byoungju [2 ]
机构
[1] Ewha Womans Univ, Dept Artificial Intelligence & Software, Seoul 03760, South Korea
[2] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul 03760, South Korea
关键词
software fault detection; machine learning; variable vulnerability;
D O I
10.3390/electronics12051197
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Common Weakness Enumeration (CWE) refers to a list of faults caused from software or hardware. The CWE includes the faults related to programming language and security. We propose a technique to detect the vulnerabilities from incorrect use of a variable in C language. There are various static/dynamic methods to detect the variable vulnerabilities. However, when analyzing the vulnerabilities, a static technique causes a lot of false alarms, meaning that there is no fault in the actual implementation. When monitoring the variable via the static analysis, there is a great overhead during execution, so its application is not easy in a real environment. In this paper, we propose a method to reduce false alarms and detect vulnerabilities by performing static analysis and dynamic verification using machine learning. Our method extracts information on variables through static analysis and detects defects through static analysis results and execution monitoring of the variables. In this process, it is determined whether the currently used variable values are valid and whether the variables are used in the correct order by learning the initial values and permissible range of the variables using machine learning techniques. We implemented our method as VVDUM (Variable Vulnerability Detector Using Machine learning). We conducted the comparative experiment with the existing static/dynamic analysis tools. As a result, compared with other tools with the rate of variable vulnerability detection between 9.17 similar to 18.5%, ours had that of 89.5%. In particular, VVDUM detects 'defects out of the range of valid' that are difficult to detect with existing methods, and the overhead due to defect detection is small. In addition, there were a few overheads at run time that were caused during data collection for detection of a fault.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Fraud Detection using Machine Learning and Deep Learning
    Raghavan, Pradheepan
    El Gayar, Neamat
    [J]. PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 335 - 340
  • [32] Fault Detection in State Variable Filter Circuit Using Kernel Extreme Learning Machine (KELM) Algorithm
    Shanthi, M.
    Bhuvaneswari, M. C.
    [J]. INFORMACIJE MIDEM-JOURNAL OF MICROELECTRONICS ELECTRONIC COMPONENTS AND MATERIALS, 2016, 46 (04): : 209 - 218
  • [33] Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning
    Mughaid, Ala
    Obeidat, Ibrahim
    Shdaifat, Andaleeb
    Alhayjna, Razan
    AlZu'bi, Shadi
    [J]. 2023 EIGHTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2023, : 123 - 127
  • [34] Endpoint Detection and Response: Why Use Machine Learning?
    Sjarif, Nilam Nur Amir
    Chuprat, Suriayati
    Mahrin, Mohd Naz'ri
    Ahmad, Noor Azurati
    Ariffin, Aswami
    Senan, Firham M.
    Zamani, Nazri Ahmad
    Saupi, Afifah
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 283 - 288
  • [35] Detection of Facebook Addiction Using Machine Learning
    Islam, Md Zahirul
    Jannat, Ziniatul
    Habib, Md. Tarek
    Rahman, Md. Sadekur
    Islam, Gazi Zahirul
    [J]. THIRD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND CAPSULE NETWORKS (ICIPCN 2022), 2022, 514 : 625 - 638
  • [36] Semantic Clone Detection Using Machine Learning
    Sheneamer, Abdullah
    Kalita, Jugal
    [J]. 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 1024 - 1028
  • [37] Brain Tumor Detection Using Machine Learning
    Bonny, Talal
    Al Jaziri, Maryam
    Al-Shabi, Mohammad
    [J]. OPTICS, PHOTONICS, AND DIGITAL TECHNOLOGIES FOR IMAGING APPLICATIONS VIII, 2024, 12998
  • [38] Review Spam Detection using Machine Learning
    Radovanovic, Drasko
    Krstajic, Boza
    [J]. 2018 23RD INTERNATIONAL SCIENTIFIC-PROFESSIONAL CONFERENCE ON INFORMATION TECHNOLOGY (IT), 2018,
  • [39] Image Forgery Detection Using Machine Learning
    Janokar, Sagar
    Kulkarni, Tejas
    Kulkarni, Yash
    Kulkarni, Varad
    Kullarkar, Harshal
    Kumare, Rahul
    Kumawat, Jay
    [J]. SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 5, SMARTCOM 2024, 2024, 949 : 169 - 181
  • [40] USING MACHINE LEARNING FOR INTRUSION DETECTION SYSTEMS
    Quang-Vinh Dang
    [J]. COMPUTING AND INFORMATICS, 2022, 41 (01) : 12 - 33