A new approach to software vulnerability detection based on CPG analysis

被引:3
|
作者
Do Xuan, Cho [1 ]
机构
[1] Posts & Telecommun Inst Technol, Fac Informat Secur, Hanoi, Vietnam
来源
COGENT ENGINEERING | 2023年 / 10卷 / 01期
关键词
source code vulnerabilities; source code vulnerability detection; source code features; feature profile; Deep Graph Convolutional Neural Network; GRAPH; PERFORMANCE; IMPACT;
D O I
10.1080/23311916.2023.2221962
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Detecting source code vulnerabilities is an essential issue today. In this paper, to improve the efficiency of detecting vulnerabilities in software written in C/C++, we propose to use a combination of Deep Graph Convolutional Neural Network (DGCNN) and code property graph (CPG). Specifically, 3 main proposed phases in the research method include: phase 1: building feature profiles of source code. At this step, we suggest using analysis techniques such as Word2vec, one hot encoding to standardize and analyze the source code; phase 2: extracting features of source code based on feature profiles. Accordingly, at this phase, we propose to use Deep Graph Convolutional Neural Network (DGCNN) model to analyze and extract features of the source code; phase 3: classifying source code based on the features extracted in phase 2 to find normal source code and source code containing security vulnerabilities. Some scenarios for comparing and evaluating the proposed method in this study compared with other approaches we have taken show the superior effectiveness of our approach. Besides, this result proves that our method in this paper is not only correct and reasonable, but it also opens up a new approach to the task of detecting source code vulnerabilities.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C
    Lee, Jaehyuk
    Yim, Kangbin
    Lee, Kyungroul
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS 2021, 2022, 279 : 59 - 66
  • [22] A Vulnerability Detection Approach Based on Comparative Learning
    Chen X.
    Liu J.
    Xia X.
    Zhou S.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (09): : 2152 - 2168
  • [23] Vulnerability detection based on a dangerous function approach
    Liu, Jie
    Wang, Jiajie
    Wei, Qiang
    Wang, Qingxian
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1529 - 1533
  • [24] Ontology-based services for software vulnerability detection: a survey
    Wang, Bingquan
    Cui, Baojiang
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2019, 13 (04) : 333 - 339
  • [25] Binary software vulnerability detection method based on attention mechanism
    Han, Wenjie
    Pang, Jianmin
    Zhou, Xin
    Zhu, Di
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1462 - 1466
  • [26] Ontology-based services for software vulnerability detection: a survey
    Bingquan Wang
    Baojiang Cui
    Service Oriented Computing and Applications, 2019, 13 : 333 - 339
  • [27] A Software Vulnerability Detection Method Based on Complex Network Community
    Shan, Chun
    Gong, Yinghui
    Xiong, Ling
    Liao, Shuyan
    Wang, Yuyang
    Security and Communication Networks, 2022, 2022
  • [28] Automatic Software Vulnerability Detection Based on Guided Deep Fuzzing
    Cai, Jun
    Yang, Shangfei
    Men, Jinquan
    He, Jun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 231 - 234
  • [29] Automated Software Vulnerability Detection Based on Hybrid Neural Network
    Li, Xin
    Wang, Lu
    Xin, Yang
    Yang, Yixian
    Tang, Qifeng
    Chen, Yuling
    APPLIED SCIENCES-BASEL, 2021, 11 (07):
  • [30] Transformer-Based Language Models for Software Vulnerability Detection
    Thapa, Chandra
    Jang, Seung Ick
    Ahmed, Muhammad Ejaz
    Camtepe, Seyit
    Pieprzyk, Josef
    Nepal, Surya
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 481 - 496