GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics

被引:6
|
作者
Wang, Shu [1 ]
Wang, Xinda [1 ]
Sun, Kun [1 ]
Jajodia, Sushil [1 ]
Wang, Haining [2 ]
Li, Qi [3 ]
机构
[1] George Mason Univ, Fairfax, VA 22030 USA
[2] Virginia Tech, Blacksburg, VA USA
[3] Tsinghua Univ, Beijing, Peoples R China
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP46215.2023.10179479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing popularity of open-source software, embedded vulnerabilities have been widely propagating to downstream software. Due to different maintenance policies, software vendors may silently release security patches without providing sufficient advisories (e.g., CVE). This leaves users unaware of security patches and provides attackers good chances to exploit unpatched vulnerabilities. Thus, detecting those silent security patches becomes imperative for secure software maintenance. In this paper, we propose a graph neural network based security patch detection system named GraphSPD, which represents patches as graphs with richer semantics and utilizes a patch-tailored graph model for detection. We first develop a novel graph structure called PatchCPG to represent software patches by merging two code property graphs (CPGs) for the pre-patch and post-patch source code as well as retaining the context, deleted, and added components for the patch. By applying a slicing technique, we retain the most relevant context and reduce the size of PatchCPG. Then, we develop the first end-to-end deep learning model called PatchGNN to determine if a patch is security-related directly from its graph-structured PatchCPG. PatchGNN includes a new embedding process to convert PatchCPG into a numeric format and a new multi-attributed graph convolution mechanism to adapt diverse relationships in PatchCPG. The experimental results show GraphSPD can significantly outperform the state-of-the-art approaches on security patch detection.
引用
收藏
页码:2409 / 2426
页数:18
相关论文
共 50 条
  • [1] Graph-based code semantics learning for efficient semantic code clone detection
    Yu, Dongjin
    Yang, Quanxin
    Chen, Xin
    Chen, Jie
    Xu, Yihang
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2023, 156
  • [2] Towards an integrated graph-based semantics for UML
    Kuske, Sabine
    Gogolla, Martin
    Kreowski, Hans-Joerg
    Ziemann, Paul
    [J]. SOFTWARE AND SYSTEMS MODELING, 2009, 8 (03): : 403 - 422
  • [3] Towards an integrated graph-based semantics for UML
    Sabine Kuske
    Martin Gogolla
    Hans-Jörg Kreowski
    Paul Ziemann
    [J]. Software & Systems Modeling, 2009, 8 : 403 - 422
  • [4] A Graph-Based Operational Semantics of OO Programs
    Ke, Wei
    Liu, Zhiming
    Wang, Shuling
    Zhao, Liang
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 5885 : 347 - +
  • [5] Graph-Based IoT Microservice Security
    Pahl, Marc-Oliver
    Aubet, Francois-Xavier
    Liebald, Stefan
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [6] Graph-Based Analysis in Network Security
    Collins, M. Patrick
    [J]. 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1333 - 1337
  • [7] Wrongdoing Monitor: A Graph-Based Behavioral Anomaly Detection in Cyber Security
    Wang, Cheng
    Zhu, Hangyu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2703 - 2718
  • [8] A review on graph-based approaches for network security monitoring and botnet detection
    Lagraa, Sofiane
    Husak, Martin
    Seba, Hamida
    Vuppala, Satyanarayana
    State, Radu
    Ouedraogo, Moussa
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) : 119 - 140
  • [9] A Knowledge Graph-Based Consistency Detection Method for Network Security Policies
    Chen, Yaang
    Hu, Teng
    Lou, Fang
    Yin, Mingyong
    Zeng, Tao
    Wu, Guo
    Wang, Hao
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (18):
  • [10] A review on graph-based approaches for network security monitoring and botnet detection
    Sofiane Lagraa
    Martin Husák
    Hamida Seba
    Satyanarayana Vuppala
    Radu State
    Moussa Ouedraogo
    [J]. International Journal of Information Security, 2024, 23 : 119 - 140