Vulnerability Detection for Source Code Using Contextual LSTM

被引:0
|
作者
Xu, Aidong [1 ,2 ]
Dai, Tao [1 ,2 ]
Chen, Huajun [1 ,2 ]
Ming, Zhe [1 ,2 ]
Li, Weining [3 ]
机构
[1] China Southern Power Grid, Guangzhou 510080, Guangdong, Peoples R China
[2] Elect Power Informat Secur Classified Protect Tes, Guangzhou 510080, Guangdong, Peoples R China
[3] Hainan Power Grid Co Ltd, Haikou 570100, Hainan, Peoples R China
关键词
component; vulnerability detection; CLSTM; neural network;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of Internet technology, software vulnerabilities have become a major threat to current computer security. In this work, we propose the vulnerability detection for source code using Contextual LSTM. Compared with CNN and LSTM, we evaluated the CLSTM on 23185 programs, which are collected from SARD. We extracted the features through the program slicing. Based on the features, we used the natural language processing to analysis programs with source code. The experimental results demonstrate that CLSTM has the best performance for vulnerability detection, reaching the accuracy of 96.711% and the F1 score of 0.96984.
引用
收藏
页码:1225 / 1230
页数:6
相关论文
共 50 条
  • [1] Detecting vulnerability in source code using CNN and LSTM network
    Guo, Junjun
    Wang, Zhengyuan
    Li, Haonan
    Xue, Yang
    [J]. SOFT COMPUTING, 2023, 27 (02) : 1131 - 1141
  • [2] Detecting vulnerability in source code using CNN and LSTM network
    Junjun Guo
    Zhengyuan Wang
    Haonan Li
    Yang Xue
    [J]. Soft Computing, 2023, 27 : 1131 - 1141
  • [3] Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph
    Yang, Hongyu
    Yang, Haiyun
    Zhang, Liang
    Cheng, Xiang
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 457 - 464
  • [4] Automated Vulnerability Detection in Source Code Using Deep Representation Learning
    Russell, Rebecca L.
    Kim, Louis
    Hamilton, Lei H.
    Lazovich, Tomo
    Harer, Jacob A.
    Ozdemir, Onur
    Ellingwood, Paul M.
    McConley, Marc W.
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 757 - 762
  • [5] Code vulnerability detection method based on contextual feature fusion
    Xu Z.-X.
    Duan L.-J.
    Wang W.-J.
    En Q.
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2022, 56 (11): : 2260 - 2270
  • [6] Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning
    Li, Xin
    Wang, Lu
    Xin, Yang
    Yang, Yixian
    Chen, Yuling
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (05):
  • [7] A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code
    Li, Xingzheng
    Feng, Bingwen
    Li, Guofeng
    Li, Tong
    He, Mingjin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Source Code and Binary Level Vulnerability Detection and Hot Patching
    Xu, Zhengzi
    [J]. 2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 2020, : 1397 - 1399
  • [9] An Automatic Source Code Vulnerability Detection Approach Based on KELM
    Tang, Gaigai
    Yang, Lin
    Ren, Shuangyin
    Meng, Lianxiao
    Yang, Feng
    Wang, Huiqiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [10] Machine-Learning Supported Vulnerability Detection in Source Code
    Sonnekalb, Tim
    [J]. ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 1180 - 1183