Vulnerability Detection for Source Code Using Contextual LSTM

被引:0
|
作者
Xu, Aidong [1 ,2 ]
Dai, Tao [1 ,2 ]
Chen, Huajun [1 ,2 ]
Ming, Zhe [1 ,2 ]
Li, Weining [3 ]
机构
[1] China Southern Power Grid, Guangzhou 510080, Guangdong, Peoples R China
[2] Elect Power Informat Secur Classified Protect Tes, Guangzhou 510080, Guangdong, Peoples R China
[3] Hainan Power Grid Co Ltd, Haikou 570100, Hainan, Peoples R China
关键词
component; vulnerability detection; CLSTM; neural network;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of Internet technology, software vulnerabilities have become a major threat to current computer security. In this work, we propose the vulnerability detection for source code using Contextual LSTM. Compared with CNN and LSTM, we evaluated the CLSTM on 23185 programs, which are collected from SARD. We extracted the features through the program slicing. Based on the features, we used the natural language processing to analysis programs with source code. The experimental results demonstrate that CLSTM has the best performance for vulnerability detection, reaching the accuracy of 96.711% and the F1 score of 0.96984.
引用
收藏
页码:1225 / 1230
页数:6
相关论文
共 50 条
  • [21] Python']Python source code vulnerability detection with named entity recognition
    Ehrenberg, Melanie
    Sarkani, Shahram
    Mazzuchi, Thomas A.
    [J]. COMPUTERS & SECURITY, 2024, 140
  • [22] Vulnerability Prediction From Source Code Using Machine Learning
    Bilgin, Zeki
    Ersoy, Mehmet Akif
    Soykan, Elif Ustundag
    Tomur, Emrah
    Comak, Pinar
    Karacay, Leyli
    [J]. IEEE ACCESS, 2020, 8 : 150672 - 150684
  • [23] Scalable Source Code Plagiarism Detection Using Source Code Vectors Clustering
    Duracik, Michal
    Krsak, Emil
    Hrkut, Patrik
    [J]. PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 499 - 502
  • [24] Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
    Akter, Mst. Shapna
    Shahriar, Hossain
    Cardenas, Juan Rodriguez
    Ahamed, Sheikh Iqbal
    Cuzzocrea, Alfredo
    [J]. 2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 765 - 776
  • [25] On the Vulnerability of Large Corpora Source Code
    Barr, Joseph R.
    Thatcher, Tyler
    [J]. 16TH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2022), 2022, : 314 - 317
  • [26] VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer
    Yang, Hongyu
    Yang, Haiyun
    Zhang, Liang
    [J]. CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 217 - 224
  • [27] SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment
    Akram, Junaid
    Luo, Ping
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (02): : 294 - 318
  • [28] Source Code Vulnerability Detection Based on Residual Gated Graph Convolutional Networks
    Zhang, Jun
    Li, Shanshan
    Li, Lei
    Wang, Haoyu
    [J]. Computer Engineering and Applications, 2023, 59 (22) : 293 - 299
  • [29] An Empirical Study on Vulnerability Detection for Source Code Software based on Deep Learning
    Lin, Wei
    Cai, Saihua
    [J]. 2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 1159 - 1160
  • [30] Contextual Information Enhanced Source Code Summarization
    Hu T.-X.
    Xie R.
    Ye W.
    Zhang S.-K.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1695 - 1710