期刊文献+

基于关系图卷积网络的源代码漏洞检测 被引量:10

Source code vulnerability detection based on relational graph convolution network
下载PDF
导出
摘要 软件安全的根源在于软件开发人员开发的源代码,但随着软件规模和复杂性不断提高,仅靠人工检测漏洞代价高昂且难以扩展,而现有的代码分析工具有较高的误报率与漏报率。为此,提出一种基于关系图卷积网络(RGCN)的自动化漏洞检测方法以进一步提高漏洞检测的精度。首先将程序源代码转换为包含语法、语义特征信息的CPG;然后使用RGCN对图结构进行表示学习;最后训练神经网络模型预测程序源代码中的漏洞。为验证所提方法的有效性,在真实的软件漏洞样本上开展了实验验证,结果表明所提方法的漏洞检测结果的召回率和F1值分别达到了80.27%和63.78%。与Flawfinder、VulDeepecker和基于图卷积网络(GCN)的同类方法相比,所提方法的F1值分别提高了182%、12%和55%,可见所提方法能有效提高漏洞检测能力。 The root cause of software security lies in the source code developed by software developers,but with the continues increasing size and complexity of software,it is costly and difficult to perform vulnerability detection only manually,while the existing code analysis tools have high false positive rate and false negative rate.Therefore,an automatic vulnerability detection method based on Relational Graph Convolution Network(RGCN)was proposed to further improve the accuracy of vulnerability detection.Firstly,the program source code was transformed into CPG containing syntax and semantic information.Then,representation learning was performed to the graph structure by RGCN.Finally,a neural network model was trained to predict the vulnerabilities in the program source code.To verify the effectiveness of the proposed method,an experimental validation was conducted on the real-world software vulnerability samples,and the results show that the recall and F1-measure of vulnerability detection results of the proposed method reach 80.27%and 63.78%respectively.Compared with Flawfinder,VulDeepecker and similar method based on Graph Convolution Network(GCN),the proposed method has the F1-measure increased by 182%,12%and 55%respectively.It can be seen that the proposed method can effectively improve the vulnerability detection capability.
作者 文敏 王荣存 姜淑娟 WEN Min;WANG Rongcun;JIANG Shujuan(Engineering Research Center of Mine Digitalization,Ministry of Education(China University of Mining and Technology),Xuzhou Jiangsu 221116,China;School of Computer Science and Technology,China University of Mining and Technology,Xuzhou Jiangsu 221116,China;Key Laboratory of Safety-Critical Software,Ministry of Industry and Information Technology(Nanjing University of Aeronautics and Astronautics),Nanjing Jiangsu 211106,China)
出处 《计算机应用》 CSCD 北大核心 2022年第6期1814-1821,共8页 journal of Computer Applications
基金 国家自然科学基金资助项目(61673384,618761860) 江苏省自然科学基金资助项目(BK20181353) 高安全系统的软件开发与验证技术工业和信息化部重点实验室开放基金资助项目(1015-56XCA18164)。
关键词 漏洞检测 代码属性图 关系图卷积网络 深度学习 预测模型 vulnerability detection Code Property Graph(CPG) Relational Graph Convolution Network(RGCN) deep learning prediction model
  • 相关文献

参考文献6

二级参考文献107

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2吴世忠.信息安全漏洞分析回顾与展望[J].清华大学学报(自然科学版),2009(S2):2065-2072. 被引量:22
  • 3陈石坤,李舟军,黄永刚,邢建英.一种基于SAT的C程序缓冲区溢出漏洞检测技术[J].清华大学学报(自然科学版),2009(S2):2169-2175. 被引量:2
  • 4易锦,郭涛,黄永刚,张普含.基于语言等价关系化简Büchi自动机的算法[J].清华大学学报(自然科学版),2009(S2):2181-2185. 被引量:1
  • 5赵云山,宫云战.基于符号分析的静态缺陷检测技术研究[博士学位论文].北京:北京邮电大学,2012.
  • 6Tassey G. The economic impacts of inadequate infrastructure for software testing. Gaithershurg National. Institute of Standards and Technology, Planning Report 02-3, 2002.
  • 7Sipser M. Introduction to the Theory of Computation. Boston, USA: Thomson Course Technology, 2006.
  • 8Hoare C A R. An axiomatic approach to computer program- ming. Communications of the ACM, 1969, 12(10) : 576-580.
  • 9Godefroid P, Klarlund N, Sen K. DART: Directed automated random testing//Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation. New York, USA, 2005:213-223.
  • 10Ball T, Cook B, Levin V, Rajamani S K. SLAM and static driver verifierz Technology transfer of formal methods inside Microsoft//Proceedings of the Integrated Formal Methods. Canterbury, England, 2004, 1-20.

共引文献170

同被引文献92

引证文献10

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部