MSGVUL: Multi-semantic integration vulnerability detection based on relational graph convolutional neural networks

被引:0
|
作者
Xiao, Wei [1 ]
Hou, Zhengzhang [2 ]
Wang, Tao [1 ]
Zhou, Chengxian [1 ]
Pan, Chao [1 ]
机构
[1] Changchun Univ Technol, Sch Comp Sci & Engn, Changchun 130012, Jilin, Peoples R China
[2] Jilin Univ, Coll Software, Changchun 130012, Jilin, Peoples R China
关键词
Vulnerability detection; Code representation; Program slicing; Graph convolutional neural networks;
D O I
10.1016/j.infsof.2024.107442
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software security has drawn extensive attention as software projects have grown increasingly large and complex. Since the traditional manual or equipment vulnerability detection technology cannot meet today's software development needs, there is a recognized need to create more effective techniques to address security issues. Although various vulnerability detection systems have been proposed, most are based only on serialization or graph representation, to inadequate effect. We propose a system, MSGVUL, that provides superior vulnerability detection using a new multi-semantic approach. MSGVUL uses versatile and efficient code slicing employing a search algorithm based on sensitive data and functions and innovatively constructs an SSVEC model to fully integrate the semantic and structural information into the code. We also developed a novel BAG model, made up of BAP and PAG frameworks, that enables the hierarchical extraction of code vulnerability representations from the graph and sequence levels. The MSGVUL model is evaluated on slice-level and function-level vulnerability datasets, and the results demonstrate that the MSGVUL method outperforms other state-of-the-art methods.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Smart Contract Vulnerability Detection Based on Multi Graph Convolutional Neural Networks with Self-attention
    Li, Jiale
    Yu, Xiao
    Yu, Jie
    Sun, Haoxin
    Sun, Mengdi
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT III, ICIC 2024, 2024, 14864 : 319 - 330
  • [2] Reentrancy Vulnerability Detection Based on Graph Convolutional Networks and Expert Patterns
    Guo, Longtao
    Huang, Huakun
    Xue, Sihun
    Wang, Peiliang
    Zhao, Lingjun
    2023 IEEE 16TH INTERNATIONAL SYMPOSIUM ON EMBEDDED MULTICORE/MANY-CORE SYSTEMS-ON-CHIP, MCSOC, 2023, : 312 - 316
  • [3] APT Attack Detection Based on Graph Convolutional Neural Networks
    Ren, Weiwu
    Song, Xintong
    Hong, Yu
    Lei, Ying
    Yao, Jinyu
    Du, Yazhou
    Li, Wenjuan
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2023, 16 (01)
  • [4] APT Attack Detection Based on Graph Convolutional Neural Networks
    Weiwu Ren
    Xintong Song
    Yu Hong
    Ying Lei
    Jinyu Yao
    Yazhou Du
    Wenjuan Li
    International Journal of Computational Intelligence Systems, 16
  • [5] Combine sliced joint graph with graph neural networks for smart contract vulnerability detection?
    Cai, Jie
    Li, Bin
    Zhang, Jiale
    Sun, Xiaobing
    Chen, Bing
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 195
  • [6] Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
    Chu, Zhaoyang
    Wan, Yao
    Li, Qian
    Wu, Yang
    Zhang, Hongyu
    Sui, Yulei
    Xu, Guandong
    Jin, Hai
    PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 2024, : 389 - 401
  • [7] ReGVD: Revisiting Graph Neural Networks for Vulnerability Detection
    Van-Anh Nguyen
    Dai Quoc Nguyen
    Van Nguyen
    Trung Le
    Quan Hung Tran
    Dinh Phung
    2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2022), 2022, : 178 - 182
  • [8] Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping
    Guo, Longtao
    Huang, Huakun
    Zhao, Lingjun
    Wang, Peiliang
    Jiang, Shan
    Su, Chunhua
    COMPUTERS & SECURITY, 2024, 142
  • [9] Comparison of Program Representations on Vulnerability Detection with Graph Neural Networks
    Choi Y.
    Kwon Y.-W.
    IEIE Transactions on Smart Processing and Computing, 2021, 10 (06) : 477 - 482
  • [10] VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization
    Wu, Jingzheng
    Ling, Xiang
    Duan, Xu
    Luo, Tianyue
    Yang, Mutian
    PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 323 - 332