Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph

被引:1
|
作者
Yang, Hongyu [1 ]
Yang, Haiyun [2 ]
Zhang, Liang [3 ]
Cheng, Xiang [4 ]
机构
[1] Civil Aviat Univ China, Sch Comp Sci & Technol, Sch Safely Sci & Engn, Tianjin, Peoples R China
[2] Civil Aviat Univ China, Sch Comp Sci & Technol, Tianjin, Peoples R China
[3] Univ Arizona, Sch Informat, Tucson, AZ USA
[4] Yangzhou Univ, Sch Informat Engn, Yangzhou, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
source code representation; vulnerability dependency representation graph; source code vulnerability detection; heterogeneous graph transformer;
D O I
10.1109/TrustCom56396.2022.00070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the fact that the existing source code vulnerability detection methods did not explicitly maintain the semantic information related to the vulnerability in the source code, which made it difficult for the vulnerability detection model to extract the vulnerability sentence features and had a high detection false positive rate, a source code vulnerability detection method based on the vulnerability dependency graph is proposed. Firstly, the candidate vulnerability sentences of the function were matched, and the vulnerability dependency representation graph corresponding to the function was generated by analyzing the multi-layer control dependencies and data dependencies of the candidate vulnerability sentences. Secondly, abstracted the function name and variable name of the code sentences node and generated the initial representation vector of the code sentence nodes in the vulnerability dependency representation graph. Finally, the source code vulnerability detection model based on the heterogeneous graph transformer was used to learn the context information of the code sentence nodes in the vulnerability dependency representation graph. In this paper, the proposed method was verified on three datasets. The experimental results show that the proposed method have better performance in source code vulnerability detection, and the recall rate is increased by 1.50%similar to 22.27%, and the F1 score is increased by 1.86%similar to 16.69%, which is better than the existing methods.
引用
收藏
页码:457 / 464
页数:8
相关论文
共 50 条
  • [1] Improving Vulnerability Detection with Hybrid Code Graph Representation
    Meng, Xiangxin
    Lu, Shaoxiao
    Wang, Xu
    Liu, Xudong
    Hu, Chunming
    [J]. PROCEEDINGS OF THE 2023 30TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC 2023, 2023, : 259 - 268
  • [2] Automated Vulnerability Detection in Source Code Using Deep Representation Learning
    Russell, Rebecca L.
    Kim, Louis
    Hamilton, Lei H.
    Lazovich, Tomo
    Harer, Jacob A.
    Ozdemir, Onur
    Ellingwood, Paul M.
    McConley, Marc W.
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 757 - 762
  • [3] Vulnerability Detection in C/C plus plus Source Code With Graph Representation Learning
    Wu, Yuelong
    Lu, Jintian
    Zhang, Yunyi
    Jin, Shuyuan
    [J]. 2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 1519 - 1524
  • [4] Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning
    Li, Xin
    Wang, Lu
    Xin, Yang
    Yang, Yixian
    Chen, Yuling
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (05):
  • [5] Vulnerability Detection via Multiple-Graph-Based Code Representation
    Qiu, Fangcheng
    Liu, Zhongxin
    Hu, Xing
    Xia, Xin
    Chen, Gang
    Wang, Xinyu
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 50 (08) : 2178 - 2199
  • [6] Vulnerability Detection for Source Code Using Contextual LSTM
    Xu, Aidong
    Dai, Tao
    Chen, Huajun
    Ming, Zhe
    Li, Weining
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2018, : 1225 - 1230
  • [7] Software Vulnerability Detection Using Informed Code Graph Pruning
    Gear, Joseph
    Xu, Yue
    Foo, Ernest
    Gauravaram, Praveen
    Jadidi, Zahra
    Simpson, Leonie
    [J]. IEEE ACCESS, 2023, 11 : 135626 - 135644
  • [8] Smart Contract Vulnerability Detection Using Code Representation Fusion
    Wang, Ben
    Chu, Hanting
    Zhang, Pengcheng
    Dong, Hai
    [J]. 2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2021), 2021, : 564 - 565
  • [9] Towards Attention Based Vulnerability Discovery Using Source Code Representation
    Kim, Junae
    Hubczenko, David
    Montague, Paul
    [J]. ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2019: TEXT AND TIME SERIES, PT IV, 2019, 11730 : 731 - 746
  • [10] VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer
    Yang, Hongyu
    Yang, Haiyun
    Zhang, Liang
    [J]. CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 217 - 224