MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks

被引:44
|
作者
Cao, Sicong [1 ]
Sun, Xiaobing [1 ]
Bo, Lili [1 ]
Wu, Rongxin [2 ]
Li, Bin [1 ]
Tao, Chuanqi [3 ]
机构
[1] Yangzhou Univ, Yangzhou, Jiangsu, Peoples R China
[2] Xiamen Univ, Xiamen, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Memory-Related Vulnerability; Vulnerability Detection; Graph Neural Networks; Flow Analysis;
D O I
10.1145/3510003.3510219
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Memory-related vulnerabilities constitute severe threats to the security of modern software. Despite the success of deep learning-based approaches to generic vulnerability detection, they are still limited by the underutilization of flow information when applied for detecting memory-related vulnerabilities, leading to high false positives. In this paper, we propose MVD, a statement-levelMemory-related Vulnerability Detection approach based on flow-sensitive graph neural networks (FS-GNN). FS-GNN is employed to jointly embed both unstructured information (i.e., source code) and structured information (i.e., control- and data-flow) to capture implicit memory-related vulnerability patterns. We evaluate MVD on the dataset which contains 4,353 real-world memory-related vulnerabilities, and compare our approach with three state-of-the-art deep learning-based approaches as well as five popular static analysisbased memory detectors. The experiment results show that MVD achieves better detection accuracy, outperforming both state-of-theart DL-based and static analysis-based approaches. Furthermore, MVD makes a great trade-off between accuracy and efficiency.
引用
收藏
页码:1456 / 1468
页数:13
相关论文
共 50 条
  • [1] A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
    Jinchang Hu
    Jinfu Chen
    Lin Zhang
    Yisong Liu
    Qihao Bao
    Hilary Ackah-Arthur
    Chi Zhang
    [J]. Tsinghua Science and Technology, 2020, 25 (05) : 604 - 613
  • [2] A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
    Hu, Jinchang
    Chen, Jinfu
    Zhang, Lin
    Liu, Yisong
    Bao, Qihao
    Ackah-Arthur, Hilary
    Zhang, Chi
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2020, 25 (05) : 604 - 613
  • [3] A memory-related vulnerability detection approach based on vulnerability model with Petri Net
    Chen, Jinfu
    Zhang, Chi
    Cai, Saihua
    Zhang, Lin
    Ma, Liang
    [J]. JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2023, 132
  • [4] ReGVD: Revisiting Graph Neural Networks for Vulnerability Detection
    Van-Anh Nguyen
    Dai Quoc Nguyen
    Van Nguyen
    Trung Le
    Quan Hung Tran
    Dinh Phung
    [J]. 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2022), 2022, : 178 - 182
  • [5] Flow-sensitive buffer overrun detection based on syntax node
    Liao, GD
    Liu, F
    Wu, YH
    [J]. International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 1064 - 1067
  • [6] Smart Contract Vulnerability Detection Using Graph Neural Networks
    Zhuang, Yuan
    Liu, Zhenguang
    Qian, Peng
    Liu, Qi
    Wang, Xiang
    He, Qinming
    [J]. PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, : 3283 - 3290
  • [7] Comparison of Program Representations on Vulnerability Detection with Graph Neural Networks
    Choi, Yoola
    Kwon, Young-Woo
    [J]. IEIE Transactions on Smart Processing and Computing, 2021, 10 (06): : 477 - 482
  • [8] VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization
    Wu, Jingzheng
    Ling, Xiang
    Duan, Xu
    Luo, Tianyue
    Yang, Mutian
    [J]. PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 323 - 332
  • [9] iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks
    Chen, Jinfu
    Yin, Yemin
    Cai, Saihua
    Wang, Weijia
    Wang, Shengran
    Chen, Jiming
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2024, 238
  • [10] Graph Neural Networks Based Memory Inefficiency Detection Using Selective Sampling
    Li, Pengcheng
    Guo, Yixin
    Luo, Yingwei
    Wang, Xiaolin
    Wang, Zhenlin
    Liu, Xu
    [J]. SC22: INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS, 2022,