A new approach to software vulnerability detection based on CPG analysis

被引:3
|
作者
Do Xuan, Cho [1 ]
机构
[1] Posts & Telecommun Inst Technol, Fac Informat Secur, Hanoi, Vietnam
来源
COGENT ENGINEERING | 2023年 / 10卷 / 01期
关键词
source code vulnerabilities; source code vulnerability detection; source code features; feature profile; Deep Graph Convolutional Neural Network; GRAPH; PERFORMANCE; IMPACT;
D O I
10.1080/23311916.2023.2221962
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Detecting source code vulnerabilities is an essential issue today. In this paper, to improve the efficiency of detecting vulnerabilities in software written in C/C++, we propose to use a combination of Deep Graph Convolutional Neural Network (DGCNN) and code property graph (CPG). Specifically, 3 main proposed phases in the research method include: phase 1: building feature profiles of source code. At this step, we suggest using analysis techniques such as Word2vec, one hot encoding to standardize and analyze the source code; phase 2: extracting features of source code based on feature profiles. Accordingly, at this phase, we propose to use Deep Graph Convolutional Neural Network (DGCNN) model to analyze and extract features of the source code; phase 3: classifying source code based on the features extracted in phase 2 to find normal source code and source code containing security vulnerabilities. Some scenarios for comparing and evaluating the proposed method in this study compared with other approaches we have taken show the superior effectiveness of our approach. Besides, this result proves that our method in this paper is not only correct and reasonable, but it also opens up a new approach to the task of detecting source code vulnerabilities.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] A NOVEL METHOD OF SOFTWARE VULNERABILITY DETECTION BASED ON FUZZING TECHNIQUE
    Zhang, Xiao-Song
    Shao, Lin
    Zheng, Jiong
    2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 270 - 273
  • [32] A Software Vulnerability Detection Method Based on Complex Network Community
    Shan, Chun
    Gong, Yinghui
    Xiong, Ling
    Liao, Shuyan
    Wang, Yuyang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [33] Software Vulnerability Detection Based on Code Coverage and Test Cost
    Shuai, Bo
    Li, Haifeng
    Zhang, Lei
    Zhang, Quan
    Tang, Chaojing
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 317 - 321
  • [34] Software vulnerability detection system based on uniform intermediate representation
    Wang, Jinding
    Wang, Jiajie
    Cheng, Shaoyin
    Jiang, Fan
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2010, 50 (SUPPL. 1): : 1502 - 1507
  • [35] A software vulnerability detection method based on deep learning with complex network analysis and subgraph partition
    Cai, Wenjing
    Chen, Junlin
    Yu, Jiaping
    Gao, Lipeng
    INFORMATION AND SOFTWARE TECHNOLOGY, 2023, 164
  • [36] A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
    Hu, Jinchang
    Chen, Jinfu
    Zhang, Lin
    Liu, Yisong
    Bao, Qihao
    Ackah-Arthur, Hilary
    Zhang, Chi
    TSINGHUA SCIENCE AND TECHNOLOGY, 2020, 25 (05) : 604 - 613
  • [37] A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
    Jinchang Hu
    Jinfu Chen
    Lin Zhang
    Yisong Liu
    Qihao Bao
    Hilary Ackah-Arthur
    Chi Zhang
    TsinghuaScienceandTechnology, 2020, 25 (05) : 604 - 613
  • [38] Software Vulnerability Mining and Analysis Based on Deep Learning
    Zhao, Shibin
    Zhu, Junhu
    Peng, Jianshan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 3263 - 3287
  • [39] A Software Vulnerability Analysis Environment Based on Virtualization Technology
    Wang Chunlei
    Wen Yan
    Dai Yiqi
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 620 - +
  • [40] Topological Vulnerability Analysis: A Powerful New Approach For Network Attack Prevention, Detection, and Response
    Jajodia, Sushil
    Noel, Steven
    ALGORITHMS, ARCHITECTURES AND INFORMATION SYSTEMS SECURITY, 2009, 3 : 285 - 305