A new approach to software vulnerability detection based on CPG analysis

被引:3
|
作者
Do Xuan, Cho [1 ]
机构
[1] Posts & Telecommun Inst Technol, Fac Informat Secur, Hanoi, Vietnam
来源
COGENT ENGINEERING | 2023年 / 10卷 / 01期
关键词
source code vulnerabilities; source code vulnerability detection; source code features; feature profile; Deep Graph Convolutional Neural Network; GRAPH; PERFORMANCE; IMPACT;
D O I
10.1080/23311916.2023.2221962
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Detecting source code vulnerabilities is an essential issue today. In this paper, to improve the efficiency of detecting vulnerabilities in software written in C/C++, we propose to use a combination of Deep Graph Convolutional Neural Network (DGCNN) and code property graph (CPG). Specifically, 3 main proposed phases in the research method include: phase 1: building feature profiles of source code. At this step, we suggest using analysis techniques such as Word2vec, one hot encoding to standardize and analyze the source code; phase 2: extracting features of source code based on feature profiles. Accordingly, at this phase, we propose to use Deep Graph Convolutional Neural Network (DGCNN) model to analyze and extract features of the source code; phase 3: classifying source code based on the features extracted in phase 2 to find normal source code and source code containing security vulnerabilities. Some scenarios for comparing and evaluating the proposed method in this study compared with other approaches we have taken show the superior effectiveness of our approach. Besides, this result proves that our method in this paper is not only correct and reasonable, but it also opens up a new approach to the task of detecting source code vulnerabilities.
引用
收藏
页数:16
相关论文
共 50 条
  • [11] Predicting software vulnerability based on software metrics: a deep learning approach
    Francis Kwadzo Agbenyegah
    Micheal Asante
    Jinfu Chen
    Ernest Akpaku
    Iran Journal of Computer Science, 2024, 7 (4) : 801 - 812
  • [12] Reverse Analysis and Vulnerability Detection for Network System Software
    Pan, Wei
    Li, Weihua
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 451 - 456
  • [13] Rule-based system for vulnerability detection of software
    Cho, Sung-Hoon
    Jang, Chang-Bok
    Lee, Moo-Hun
    Choi, Eui-In
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1630 - 1633
  • [14] A deep learning based static taint analysis approach for IoT software vulnerability location
    Niu, Weina
    Zhang, Xiaosong
    Du, Xiaojiang
    Zhao, Lingyuan
    Cao, Rong
    Guizani, Mohsen
    MEASUREMENT, 2020, 152
  • [15] A new semantic annotation approach for software vulnerability source code
    Zhang C.
    Chen J.
    Zhang L.
    Chen S.
    Zhang Z.
    International Journal of Simulation and Process Modelling, 2021, 16 (01) : 1 - 13
  • [16] Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection
    Van Nguyen
    Trung Le
    de Vel, Olivier
    Montague, Paul
    Grundy, John
    Dinh Phung
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2020, PT I, 2020, 12084 : 699 - 711
  • [17] A New Approach for Network Vulnerability Analysis
    Vu, Hai L.
    Khaw, Kenneth K.
    Chen, Tsong Yueh
    COMPUTER JOURNAL, 2015, 58 (04): : 878 - 891
  • [18] A New Approach for Network Vulnerability Analysis
    Vu, Hai L.
    Khaw, Kenneth K.
    Chen, T. Y.
    Kuo, Fei-Ching
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 189 - +
  • [19] Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis
    Kim, Seokmo
    Kim, R. Young Chul
    Park, Young B.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (03) : 777 - 793
  • [20] Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis
    Seokmo Kim
    R. Young Chul Kim
    Young B. Park
    Wireless Personal Communications, 2016, 89 : 777 - 793