Deep Forest and Pruned Syntax Tree-Based Classification Method for Java']Java Code Vulnerability

被引:0
|
作者
Ding, Jiaman [1 ,2 ]
Fu, Weikang [1 ,2 ]
Jia, Lianyin [1 ,2 ]
机构
[1] Kunming Univ Sci & Technol, Fac Informat Engn & Automat, Kunming 650500, Peoples R China
[2] Kunming Univ Sci & Technol, Artificial Intelligence Key Lab Yunnan Prov, Kunming 650500, Peoples R China
基金
中国国家自然科学基金;
关键词
vulnerability classification; abstract syntax tree; code representation; deep forest; NETWORKS;
D O I
10.3390/math11020461
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The rapid development of J2EE (Java 2 Platform Enterprise Edition) has brought unprecedented severe challenges to vulnerability mining. The current abstract syntax tree-based source code vulnerability classification method does not eliminate irrelevant nodes when processing the abstract syntax tree, resulting in a long training time and overfitting problems. Another problem is that different code structures will be translated to the same sequence of tree nodes when processing abstract syntax trees using depth-first traversal, so in this process, the depth-first algorithm will lead to the loss of semantic structure information which will reduce the accuracy of the model. Aiming at these two problems, we propose a deep forest and pruned syntax tree-based classification method (PSTDF) for Java code vulnerability. First, the breadth-first traversal of the abstract syntax tree obtains the sequence of statement trees, next, pruning statement trees removes irrelevant nodes, then we use a depth-first based encoder to obtain the vector, and finally, we use deep forest as the classifier to get classification results. Experiments on publicly accessible vulnerability datasets show that PSTDF can reduce the loss of semantic structure information and effectively remove the impact of redundant information.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] A tree-based alternative to Java']Java byte-codes
    Kistler, T
    Franz, M
    [J]. INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 1999, 27 (01) : 21 - 33
  • [2] Coastal vulnerability assessment using the machine learning tree-based algorithms modeling in the north coast of Java']Java, Indonesia
    Yulianto, Fajar
    Wibowo, Mardi
    Yananto, Ardila
    Perdana, Dhedy Husada Fadjar
    Wiguna, Edwin Adi
    Prabowo, Yudhi
    Rahili, Nurkhalis
    Nurwijayanti, Amalia
    Iswari, Marindah Yulia
    Ratnasari, Esti
    Rusdiutomo, Amien
    Nugroho, Sapto
    Purwoko, Andan Sigit
    Aziz, Hilmi
    Fachrudin, Imam
    [J]. EARTH SCIENCE INFORMATICS, 2023, 16 (04) : 3981 - 4008
  • [3] Example-Based Vulnerability Detection and Repair in Java']Java Code
    Zhang, Ying
    Xiao, Ya
    Kabir, Md Mahir Asef
    Yao, Danfeng
    Meng, Na
    [J]. 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2022), 2022, : 190 - 201
  • [4] A JAVA']JAVA Code Generation Method based on XUML
    Wang, Zhenyu
    [J]. 2019 INTERNATIONAL CONFERENCE ON ADVANCED ELECTRONIC MATERIALS, COMPUTERS AND MATERIALS ENGINEERING (AEMCME 2019), 2019, 563
  • [5] A Tree-Based Alternative to Java Byte-Codes
    Thomas Kistler
    Michael Franz
    [J]. International Journal of Parallel Programming, 1999, 27 : 21 - 33
  • [6] Java']Java Code Clone Detection by Exploiting Semantic and Syntax Information From Intermediate Code-Based Graph
    Yuan, Dawei
    Fang, Sen
    Zhang, Tao
    Xu, Zhou
    Luo, Xiapu
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2023, 72 (02) : 511 - 526
  • [7] Malicious Code Classification Method Based on Deep Forest
    Lu, Xi-Dong
    Duan, Zhe-Min
    Qian, Ye-Kui
    Zhou, Wei
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (05): : 1454 - 1464
  • [8] A Simple Java']Java Code Generator for ACL2 Based on a Deep Embedding of ACL2 in Java']Java
    Coglio, Alessandro
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2018, (280): : 1 - 17
  • [9] Example-Based Vulnerability Detection and Repair in Java Code
    Zhang, Ying
    Xiao, Ya
    Kabir, Md Mahir Asef
    Yao, Danfeng
    Meng, Na
    [J]. IEEE International Conference on Program Comprehension, 2022, 2022-March : 190 - 201
  • [10] A Severity-Based Classification Assessment of Code Smells in Kotlin and Java']Java Application
    Gupta, Aakanshi
    Chauhan, Nidhi Kumari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) : 1831 - 1848