Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks

被引:0
|
作者
Zhou, Yaqin [1 ]
Liu, Shangqing [1 ]
Siow, Jingkai [1 ]
Du, Xiaoning [1 ]
Liu, Yang [1 ]
机构
[1] Nanyang Technol Univ, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Vulnerability identification is crucial to protect the software systems from attacks for cyber security. It is especially important to localize the vulnerable functions among the source code to facilitate the fix. However, it is a challenging and tedious process, and also requires specialized security expertise. Inspired by the work on manually-defined patterns of vulnerabilities from various code representation graphs and the recent advance on graph neural networks, we propose Devign, a general graph neural network based model for graph-level classification through learning on a rich set of code semantic representations. It includes a novel Conv module to efficiently extract useful features in the learned rich node representations for graph-level classification. The model is trained over manually labeled datasets built on 4 diversified large-scale open-source C projects that incorporate high complexity and variety of real source code instead of synthesis code used in previous works. The results of the extensive evaluation on the datasets demonstrate that Devign outperforms the state of the arts significantly with an average of 10.51% higher accuracy and 8.68% F1 score, increases averagely 4.66% accuracy and 6.37% F1 by the Conv module.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Self-admitted technical debt detection by learning its comprehensive semantics via graph neural networks
    Li, Hui
    Qu, Yang
    Liu, Yong
    Chen, Rong
    Ai, Jun
    Guo, Shikai
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2022, 52 (10): : 2152 - 2176
  • [2] A Unified Framework to Learn Program Semantics with Graph Neural Networks
    Liu, Shangqing
    [J]. 2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 2020, : 1364 - 1366
  • [3] CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph
    Liu, Jingqiang
    Zhu, Xiaoxi
    Liu, Chaoge
    Cui, Xiang
    Liu, Qixu
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 274 - 282
  • [4] Comparison of Program Representations on Vulnerability Detection with Graph Neural Networks
    Choi Y.
    Kwon Y.-W.
    [J]. IEIE Transactions on Smart Processing and Computing, 2021, 10 (06): : 477 - 482
  • [5] ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention
    Li, Min
    Li, Chunfang
    Li, Shuailou
    Wu, Yanna
    Zhang, Boyang
    Wen, Yu
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT I, 2021, 12918 : 243 - 259
  • [6] Effective Fault Scenario Identification for Communication Networks via Knowledge-Enhanced Graph Neural Networks
    Zhao, Haihong
    Yang, Bo
    Cui, Jiaxu
    Xing, Qianli
    Shen, Jiaxing
    Zhu, Fujin
    Cao, Jiannong
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) : 3243 - 3258
  • [7] Comprehensive Study on Molecular Supervised Learning with Graph Neural Networks
    Hwang, Doyeong
    Yang, Soojung
    Kwon, Yongchan
    Lee, Kyung Hoon
    Lee, Grace
    Jo, Hanseok
    Yoon, Seyeol
    Ryu, Seongok
    [J]. JOURNAL OF CHEMICAL INFORMATION AND MODELING, 2020, 60 (12) : 5936 - 5945
  • [8] Robust Graph Neural Networks via Ensemble Learning
    Lin, Qi
    Yu, Shuo
    Sun, Ke
    Zhao, Wenhong
    Alfarraj, Osama
    Tolba, Amr
    Xia, Feng
    [J]. MATHEMATICS, 2022, 10 (08)
  • [9] Streaming Graph Neural Networks via Continual Learning
    Wang, Junshan
    Song, Guojie
    Wu, Yi
    Wang, Liang
    [J]. CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, 2020, : 1515 - 1524
  • [10] Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing
    Wu, Bozhi
    Liu, Shangqing
    Xiao, Yang
    Li, Zhiming
    Sun, Jun
    Lin, Shang-Wei
    [J]. PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 1371 - 1383