GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics

被引:6
|
作者
Wang, Shu [1 ]
Wang, Xinda [1 ]
Sun, Kun [1 ]
Jajodia, Sushil [1 ]
Wang, Haining [2 ]
Li, Qi [3 ]
机构
[1] George Mason Univ, Fairfax, VA 22030 USA
[2] Virginia Tech, Blacksburg, VA USA
[3] Tsinghua Univ, Beijing, Peoples R China
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP46215.2023.10179479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing popularity of open-source software, embedded vulnerabilities have been widely propagating to downstream software. Due to different maintenance policies, software vendors may silently release security patches without providing sufficient advisories (e.g., CVE). This leaves users unaware of security patches and provides attackers good chances to exploit unpatched vulnerabilities. Thus, detecting those silent security patches becomes imperative for secure software maintenance. In this paper, we propose a graph neural network based security patch detection system named GraphSPD, which represents patches as graphs with richer semantics and utilizes a patch-tailored graph model for detection. We first develop a novel graph structure called PatchCPG to represent software patches by merging two code property graphs (CPGs) for the pre-patch and post-patch source code as well as retaining the context, deleted, and added components for the patch. By applying a slicing technique, we retain the most relevant context and reduce the size of PatchCPG. Then, we develop the first end-to-end deep learning model called PatchGNN to determine if a patch is security-related directly from its graph-structured PatchCPG. PatchGNN includes a new embedding process to convert PatchCPG into a numeric format and a new multi-attributed graph convolution mechanism to adapt diverse relationships in PatchCPG. The experimental results show GraphSPD can significantly outperform the state-of-the-art approaches on security patch detection.
引用
收藏
页码:2409 / 2426
页数:18
相关论文
共 50 条
  • [21] An attack graph-based probabilistic security metric
    Wang, Lingyu
    Islam, Tania
    Long, Tao
    Singhal, Anoop
    Jajodia, Sushil
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 283 - +
  • [22] Vulnerability Metrics for Graph-based Configuration Security
    Igartibo, Ibifubara
    Albanese, Massimiliano
    Mosko, Marc
    Bier, Eric
    Brito, Alejandro E.
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 259 - 270
  • [23] A Graph-Based Approach for Analysis of Software Security
    Lunkeit, Armin
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 68 - 79
  • [24] A graph-based code representation method to improve code readability classification
    Qing Mi
    Yi Zhan
    Han Weng
    Qinghang Bao
    Longjie Cui
    Wei Ma
    Empirical Software Engineering, 2023, 28
  • [25] CogCol: Code Graph-Based Contrastive Learning Model for Code Summarization
    Shi, Yucen
    Yin, Ying
    Yu, Mingqian
    Chu, Liangyu
    ELECTRONICS, 2024, 13 (10)
  • [26] Low-Complexity Code Clone Detection using Graph-based Neural Networks
    Liu, Hu
    Zhao, Hui
    Han, Changhao
    Hou, Lu
    2022 18TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN, 2022, : 797 - 802
  • [27] A graph-based code representation method to improve code readability classification
    Mi, Qing
    Zhan, Yi
    Weng, Han
    Bao, Qinghang
    Cui, Longjie
    Ma, Wei
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (04)
  • [28] Learning Graph-based Code Representations for Source-level Functional Similarity Detection
    Liu, Jiahao
    Zeng, Jun
    Wang, Xiang
    Liang, Zhenkai
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 345 - 357
  • [29] A Graph-based Semantics For Object-oriented Programming Constructs
    Luedtke Ferreira, Ana Paula
    Ribeiro, Leila
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 122 : 89 - 104
  • [30] Utilizing knowledge-base semantics in graph-based algorithms
    Darwiche, A
    PROCEEDINGS OF THE THIRTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE, VOLS 1 AND 2, 1996, : 607 - 613