VulPecker: An Automated Vulnerability Detection System Based on Code Similarity Analysis

被引:111
|
作者
Li, Zhen [1 ,2 ]
Zou, Deqing [1 ]
Xu, Shouhuai [3 ]
Jin, Hai [1 ]
Qi, Hanchao [1 ]
Hu, Jie [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Cluster & Grid Comp Lab, Big Data Technol & Syst Lab,Serv Comp Technol & S, Wuhan 430074, Peoples R China
[2] Hebei Univ, Sch Comp Sci & Technol, Baoding 071002, Peoples R China
[3] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
基金
美国国家科学基金会;
关键词
Vulnerability detection; code similarity; vulnerability signature; CLONE DETECTION;
D O I
10.1145/2991079.2991102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software vulnerabilities are the fundamental cause of many attacks. Even with rapid vulnerability patching, the problem is more complicated than it looks. One reason is that instances of the same vulnerability may exist in multiple software copies that are difficult to track in real life (e.g., different versions of libraries and applications). This calls for tools that can automatically search for vulnerable software with respect to a given vulnerability. In this paper, we move a step forward in this direction by presenting Vulnerability Pecker (VulPecker), a system for automatically detecting whether a piece of software source code contains a given vulnerability or not. The key insight underlying VulPecker is to leverage (i) a set of features that we define to characterize patches, and (ii) code-similarity algorithms that have been proposed for various purposes, while rioting that no single code similarity algorithm is effective for all kinds of vulnerabilities. Experiments show that VulPecker detects 40 vulnerabilities that are not published in the National Vulnerability Database (NVD). Among these vulnerabilities, 18 are mint known for their existence and have yet to be confirmed by vendors at the time of writing (these vulnerabilities are "anonymized" in the present paper for ethical reasons), and the other 22 vulnerabilities have been "silently" patched by the vendors in the later releases of the vulnerable products.
引用
收藏
页码:201 / 213
页数:13
相关论文
共 50 条
  • [31] Example-Based Vulnerability Detection and Repair in Java Code
    Zhang, Ying
    Xiao, Ya
    Kabir, Md Mahir Asef
    Yao, Danfeng Daphne
    Meng, Na
    arXiv, 2022,
  • [32] Smart Contract Timestamp Vulnerability Detection Based on Code Homogeneity
    Wang, Weizhi
    Xia, Lei
    Zhang, Zhuo
    Meng, Xiankai
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2024, E107D (10) : 1362 - 1366
  • [33] Example-Based Vulnerability Detection and Repair in Java Code
    Zhang, Ying
    Xiao, Ya
    Kabir, Md Mahir Asef
    Yao, Danfeng
    Meng, Na
    IEEE International Conference on Program Comprehension, 2022, 2022-March : 190 - 201
  • [34] The detection and analysis system for Web vulnerability
    Liu, Z. (liuzheng528@hrbeu.edu.cn), 1600, Editorial Board of Journal of Harbin Engineering (34):
  • [35] Software Vulnerability Detection Based on Code Coverage and Test Cost
    Shuai, Bo
    Li, Haifeng
    Zhang, Lei
    Zhang, Quan
    Tang, Chaojing
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 317 - 321
  • [36] On the Code Vulnerability Detection Based on Deep Learning: A Comparative Study
    Li, Guiping
    Yang, Yege
    IEEE ACCESS, 2024, 12 : 152377 - 152391
  • [37] Vulnerability Detection Method Based on Structured Text and Code Metrics
    Yang H.
    Ying L.
    Zhang L.
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2022, 49 (04): : 58 - 68
  • [38] Similarity Code File Detection Model Based on Frequent Itemsets
    Jiang, Jian-hong
    Wang, Ke
    2018 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND NETWORK TECHNOLOGY (CCNT 2018), 2018, 291 : 254 - 262
  • [39] A method for efficient malicious code detection based on conceptual similarity
    Kim, Sungsuk
    Choi, Chang
    Choi, Junho
    Kim, Pankoo
    Kim, Hanil
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 567 - 576
  • [40] ASVG: Automated Software Vulnerability Sample Generation Technology Based on Source Code
    Yang, Jun
    Zhou, Peng
    Ni, Yunze
    ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 316 - 325