A new approach to software vulnerability detection based on CPG analysis

被引:3
|
作者
Do Xuan, Cho [1 ]
机构
[1] Posts & Telecommun Inst Technol, Fac Informat Secur, Hanoi, Vietnam
来源
COGENT ENGINEERING | 2023年 / 10卷 / 01期
关键词
source code vulnerabilities; source code vulnerability detection; source code features; feature profile; Deep Graph Convolutional Neural Network; GRAPH; PERFORMANCE; IMPACT;
D O I
10.1080/23311916.2023.2221962
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Detecting source code vulnerabilities is an essential issue today. In this paper, to improve the efficiency of detecting vulnerabilities in software written in C/C++, we propose to use a combination of Deep Graph Convolutional Neural Network (DGCNN) and code property graph (CPG). Specifically, 3 main proposed phases in the research method include: phase 1: building feature profiles of source code. At this step, we suggest using analysis techniques such as Word2vec, one hot encoding to standardize and analyze the source code; phase 2: extracting features of source code based on feature profiles. Accordingly, at this phase, we propose to use Deep Graph Convolutional Neural Network (DGCNN) model to analyze and extract features of the source code; phase 3: classifying source code based on the features extracted in phase 2 to find normal source code and source code containing security vulnerabilities. Some scenarios for comparing and evaluating the proposed method in this study compared with other approaches we have taken show the superior effectiveness of our approach. Besides, this result proves that our method in this paper is not only correct and reasonable, but it also opens up a new approach to the task of detecting source code vulnerabilities.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] A New Approach for Software Quality Assessment Based on Automated Code Anomalies Detection
    Biaggi, Andrea
    Azadi, Umberto
    Fontana, Francesca Arcelli
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023, 2023, : 546 - 553
  • [42] Configuration Fuzzing for Software Vulnerability Detection
    Dai, Huning
    Murphy, Christian
    Kaiser, Gail
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 525 - 530
  • [43] Survey of software vulnerability detection techniques
    School of Computer Science and Engineering, Beihang University, Beijing
    100191, China
    不详
    410073, China
    Jisuanji Xuebao, 4 (717-732):
  • [44] Sword DTA: A Dynamic Taint Analysis Tool for Software Vulnerability Detection
    CAI Jun
    ZOU Peng
    MA Jinxin
    HE Jun
    WuhanUniversityJournalofNaturalSciences, 2016, 21 (01) : 10 - 20
  • [45] Software Vulnerability Detection Using Genetic Algorithm and Dynamic Taint Analysis
    Shuai, Bo
    Li, Mengjun
    Li, Haifeng
    Zhang, Quan
    Tang, Chaojing
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 589 - 593
  • [46] An integrated framework for software vulnerability detection, analysis and mitigation: an autonomic system
    Kumar, Manoj
    Sharma, Arun
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (09): : 1481 - 1493
  • [47] An integrated framework for software vulnerability detection, analysis and mitigation: an autonomic system
    Manoj Kumar
    Arun Sharma
    Sādhanā, 2017, 42 : 1481 - 1493
  • [48] Software vulnerability code clone detection method based on characteristic metrics
    Gan, Shui-Tao
    Qin, Xiao-Jun
    Chen, Zuo-Ning
    Wang, Lin-Zhang
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (02): : 348 - 363
  • [49] Research on Software Vulnerability Detection Method Based on Improved CNN Model
    Qiang, Gao
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [50] A Novel Approach for Software Vulnerability Classification
    Li, Xiaodan
    Chang, Xiaolin
    Board, John A.
    Trivedi, Kishor S.
    2017 ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2017,