VulPecker: An Automated Vulnerability Detection System Based on Code Similarity Analysis

被引:111
|
作者
Li, Zhen [1 ,2 ]
Zou, Deqing [1 ]
Xu, Shouhuai [3 ]
Jin, Hai [1 ]
Qi, Hanchao [1 ]
Hu, Jie [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Cluster & Grid Comp Lab, Big Data Technol & Syst Lab,Serv Comp Technol & S, Wuhan 430074, Peoples R China
[2] Hebei Univ, Sch Comp Sci & Technol, Baoding 071002, Peoples R China
[3] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
基金
美国国家科学基金会;
关键词
Vulnerability detection; code similarity; vulnerability signature; CLONE DETECTION;
D O I
10.1145/2991079.2991102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software vulnerabilities are the fundamental cause of many attacks. Even with rapid vulnerability patching, the problem is more complicated than it looks. One reason is that instances of the same vulnerability may exist in multiple software copies that are difficult to track in real life (e.g., different versions of libraries and applications). This calls for tools that can automatically search for vulnerable software with respect to a given vulnerability. In this paper, we move a step forward in this direction by presenting Vulnerability Pecker (VulPecker), a system for automatically detecting whether a piece of software source code contains a given vulnerability or not. The key insight underlying VulPecker is to leverage (i) a set of features that we define to characterize patches, and (ii) code-similarity algorithms that have been proposed for various purposes, while rioting that no single code similarity algorithm is effective for all kinds of vulnerabilities. Experiments show that VulPecker detects 40 vulnerabilities that are not published in the National Vulnerability Database (NVD). Among these vulnerabilities, 18 are mint known for their existence and have yet to be confirmed by vendors at the time of writing (these vulnerabilities are "anonymized" in the present paper for ethical reasons), and the other 22 vulnerabilities have been "silently" patched by the vendors in the later releases of the vulnerable products.
引用
收藏
页码:201 / 213
页数:13
相关论文
共 50 条
  • [1] Enhancing Code Similarity Analysis for Effective Vulnerability Detection
    Zhu, Chunlei
    Tang, Yunshan
    Wang, Qiang
    Li, Mei
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (CSSE 2019), 2019,
  • [2] Staged Method of Code Similarity Analysis for Firmware Vulnerability Detection
    Wang, Yisen
    Shen, Jianjing
    Lin, Jian
    Lou, Rui
    IEEE ACCESS, 2019, 7 : 14171 - 14185
  • [3] VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches
    Sun, Hao
    Cui, Lei
    Li, Lun
    Ding, Zhenquan
    Hao, Zhiyu
    Cui, Jiancong
    Liu, Peng
    COMPUTERS & SECURITY, 2021, 110
  • [4] A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code
    Li, Xingzheng
    Feng, Bingwen
    Li, Guofeng
    Li, Tong
    He, Mingjin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [5] Unsupervised Binary Code Translation with Application to Code Similarity Detection and Vulnerability Discovery
    Ahmad, Iftakhar
    Luo, Lannan
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (EMNLP 2023), 2023, : 14581 - 14592
  • [6] Binary Similarity Analysis for Vulnerability Detection
    Tai, Zeming
    Washizaki, Hironori
    Fukazawa, Yoshiaki
    Fujimatsu, Yurie
    Kanai, Jun
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1121 - 1122
  • [7] Combining Graph-Based Learning with Automated Data Collection for Code Vulnerability Detection
    Wang, Huanting
    Ye, Guixin
    Tang, Zhanyong
    Tan, Shin Hwei
    Huang, Songfang
    Fang, Dingyi
    Feng, Yansong
    Bian, Lizhong
    Wang, Zheng
    IEEE Transactions on Information Forensics and Security, 2021, 16 : 1943 - 1958
  • [8] Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection
    Wang, Huanting
    Ye, Guixin
    Tang, Zhanyong
    Tan, Shin Hwei
    Huang, Songfang
    Fang, Dingyi
    Feng, Yansong
    Bian, Lizhong
    Wang, Zheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1943 - 1958
  • [9] Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis
    Yang, Shouguo
    Xu, Zhengzi
    Xiao, Yang
    Lang, Zhe
    Tang, Wei
    Liu, Yang
    Shi, Zhiqiang
    Li, Hong
    Sun, Limin
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 32 (06)
  • [10] VFDETECT: A Vulnerable Code Clone Detection System Based on Vulnerability Fingerprint
    Liu, Zhen
    Wei, Qiang
    Cao, Yan
    2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 548 - 553