VulPecker: An Automated Vulnerability Detection System Based on Code Similarity Analysis

被引:111
|
作者
Li, Zhen [1 ,2 ]
Zou, Deqing [1 ]
Xu, Shouhuai [3 ]
Jin, Hai [1 ]
Qi, Hanchao [1 ]
Hu, Jie [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Cluster & Grid Comp Lab, Big Data Technol & Syst Lab,Serv Comp Technol & S, Wuhan 430074, Peoples R China
[2] Hebei Univ, Sch Comp Sci & Technol, Baoding 071002, Peoples R China
[3] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
基金
美国国家科学基金会;
关键词
Vulnerability detection; code similarity; vulnerability signature; CLONE DETECTION;
D O I
10.1145/2991079.2991102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software vulnerabilities are the fundamental cause of many attacks. Even with rapid vulnerability patching, the problem is more complicated than it looks. One reason is that instances of the same vulnerability may exist in multiple software copies that are difficult to track in real life (e.g., different versions of libraries and applications). This calls for tools that can automatically search for vulnerable software with respect to a given vulnerability. In this paper, we move a step forward in this direction by presenting Vulnerability Pecker (VulPecker), a system for automatically detecting whether a piece of software source code contains a given vulnerability or not. The key insight underlying VulPecker is to leverage (i) a set of features that we define to characterize patches, and (ii) code-similarity algorithms that have been proposed for various purposes, while rioting that no single code similarity algorithm is effective for all kinds of vulnerabilities. Experiments show that VulPecker detects 40 vulnerabilities that are not published in the National Vulnerability Database (NVD). Among these vulnerabilities, 18 are mint known for their existence and have yet to be confirmed by vendors at the time of writing (these vulnerabilities are "anonymized" in the present paper for ethical reasons), and the other 22 vulnerabilities have been "silently" patched by the vendors in the later releases of the vulnerable products.
引用
收藏
页码:201 / 213
页数:13
相关论文
共 50 条
  • [21] Research and Implementation of Security Vulnerability Detection in Application System of WEB Static Source Code Analysis Based on JAVA']JAVA
    Yuan, Hui
    Zheng, Lei
    Dong, Liang
    Peng, Xiangli
    Zhuang, Yan
    Deng, Guoru
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 444 - 452
  • [22] Rampo: A CEGAR-based Integration of Binary Code Analysis and System Falsification for Cyber-Kinetic Vulnerability Detection
    Tsujio, Kohei
    Al Faruque, Mohammad Abdullah
    Shoukry, Yasser
    PROCEEDINGS 15TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, ICCPS 2024, 2024, : 45 - 54
  • [23] DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-Architecture Firmware Vulnerability Detection
    Sun, Hao
    Tong, Yanjun
    Zhao, Jing
    Gu, Zhaoquan
    INFORMATION SECURITY (ISC 2021), 2021, 13118 : 320 - 337
  • [24] FASSFuzzer-An Automated Vulnerability Detection System for Android System Services
    Weng, Le
    Feng, Chao
    Shi, Zhi-Yuan
    Zhang, Ying-Min
    Huang, Lian-Fen
    Journal of Computers (Taiwan), 2022, 33 (02): : 189 - 200
  • [25] Binary Vulnerability Similarity Detection Based on Function Parameter Dependency
    Xia, Bing
    Liu, Wenbo
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2023, 19 (01)
  • [26] Binary Code Similarity Detection
    Liu, Zian
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 1056 - 1060
  • [27] HCRVD: A Vulnerability Detection System Based on CST-PDG Hierarchical Code Representation Learning
    Song, Zhihui
    Xu, Jinchen
    Li, Kewei
    Shan, Zheng
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (03): : 4573 - 4601
  • [28] An Automatic Source Code Vulnerability Detection Approach Based on KELM
    Tang, Gaigai
    Yang, Lin
    Ren, Shuangyin
    Meng, Lianxiao
    Yang, Feng
    Wang, Huiqiang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [29] Code vulnerability detection method based on contextual feature fusion
    Xu Z.-X.
    Duan L.-J.
    Wang W.-J.
    En Q.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2022, 56 (11): : 2260 - 2270
  • [30] Code vulnerability static detection method based on graphrepresentation and MHGAT
    Cheng J.
    Wang B.
    Luo P.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2023, 45 (05): : 1535 - 1543