VulPecker: An Automated Vulnerability Detection System Based on Code Similarity Analysis

被引:111
|
作者
Li, Zhen [1 ,2 ]
Zou, Deqing [1 ]
Xu, Shouhuai [3 ]
Jin, Hai [1 ]
Qi, Hanchao [1 ]
Hu, Jie [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Cluster & Grid Comp Lab, Big Data Technol & Syst Lab,Serv Comp Technol & S, Wuhan 430074, Peoples R China
[2] Hebei Univ, Sch Comp Sci & Technol, Baoding 071002, Peoples R China
[3] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
基金
美国国家科学基金会;
关键词
Vulnerability detection; code similarity; vulnerability signature; CLONE DETECTION;
D O I
10.1145/2991079.2991102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software vulnerabilities are the fundamental cause of many attacks. Even with rapid vulnerability patching, the problem is more complicated than it looks. One reason is that instances of the same vulnerability may exist in multiple software copies that are difficult to track in real life (e.g., different versions of libraries and applications). This calls for tools that can automatically search for vulnerable software with respect to a given vulnerability. In this paper, we move a step forward in this direction by presenting Vulnerability Pecker (VulPecker), a system for automatically detecting whether a piece of software source code contains a given vulnerability or not. The key insight underlying VulPecker is to leverage (i) a set of features that we define to characterize patches, and (ii) code-similarity algorithms that have been proposed for various purposes, while rioting that no single code similarity algorithm is effective for all kinds of vulnerabilities. Experiments show that VulPecker detects 40 vulnerabilities that are not published in the National Vulnerability Database (NVD). Among these vulnerabilities, 18 are mint known for their existence and have yet to be confirmed by vendors at the time of writing (these vulnerabilities are "anonymized" in the present paper for ethical reasons), and the other 22 vulnerabilities have been "silently" patched by the vendors in the later releases of the vulnerable products.
引用
收藏
页码:201 / 213
页数:13
相关论文
共 50 条
  • [41] Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning
    Ahn, Sunwoo
    Ahn, Seonggwan
    Koo, Hyungjoon
    Paek, Yunheung
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 361 - 374
  • [42] Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models
    Senanayake, Janaka
    Kalutarage, Harsha
    Al-Kadri, Mhd Omar
    Piras, Luca
    Petrovski, Andrei
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 659 - 666
  • [43] Automated Software Vulnerability Detection Based on Hybrid Neural Network
    Li, Xin
    Wang, Lu
    Xin, Yang
    Yang, Yixian
    Tang, Qifeng
    Chen, Yuling
    APPLIED SCIENCES-BASEL, 2021, 11 (07):
  • [44] AI and Blockchain-based source code vulnerability detection and prevention system for multiparty software development
    Nath, Panchanan
    Mushahary, Jaya Rani
    Roy, Ujjal
    Brahma, Maharaj
    Singh, Pranav Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 106
  • [45] A Method for Automated Detection of Cultural Difference Based on Image Similarity
    Pituxcoosuvarn, Mondheera
    Lin, Donghui
    Ishida, Toru
    COLLABORATION TECHNOLOGIES AND SOCIAL COMPUTING (CRIWG+COLLABTECH 2019), 2019, 11677 : 129 - 143
  • [46] VYPER: Vulnerability detection in binary code
    Boudjema, El Habib
    Verlan, Sergey
    Mokdad, Lynda
    Faure, Christele
    SECURITY AND PRIVACY, 2020, 3 (02)
  • [47] Research and Progress on Learning-Based Source Code Vulnerability Detection
    Su X.-H.
    Zheng W.-N.
    Jiang Y.
    Wei H.-W.
    Wan J.-Y.
    Wei Z.-Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (02): : 337 - 374
  • [48] Software vulnerability code clone detection method based on characteristic metrics
    Gan, Shui-Tao
    Qin, Xiao-Jun
    Chen, Zuo-Ning
    Wang, Lin-Zhang
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (02): : 348 - 363
  • [49] Vulnerability Detection via Multiple-Graph-Based Code Representation
    Qiu, Fangcheng
    Liu, Zhongxin
    Hu, Xing
    Xia, Xin
    Chen, Gang
    Wang, Xinyu
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 50 (08) : 2178 - 2199
  • [50] Dsn2Code: An automated approach for similarity-based Software Architecture selection for Code reuse
    South Eastern University of Sri Lanka, Department of Information and Communication Technolgy, Sri Lanka
    Proc. - Int. Res. Conf. Smart Comput. Syst. Eng., SCSE,