Enhancing Java']Java Web Application Security: Injection Vulnerability Detection via Interprocedural Analysis and Deep Learning

被引:1
作者
Zhang, Bing [1 ,2 ]
Zhi, Xu [1 ,2 ]
Wang, Meng [1 ,2 ]
Ren, Rong [1 ,2 ]
Dong, Jun [1 ,2 ]
机构
[1] Yanshan Univ, Sch Informat Sci & Engn, Qinhuangdao 066004, Peoples R China
[2] Key Lab Software Engn Hebei Prov, Qinhuangdao 066004, Peoples R China
基金
中国国家自然科学基金;
关键词
Codes; !text type='Java']Java[!/text; Deep learning; Static analysis; Analytical models; Prototypes; SQL injection; Redundancy; Malware; Libraries; BERT-BiLSTM-CRF; injection vulnerability; intermediate slice language (ISL); system dependency graph; vulnerability detection;
D O I
10.1109/TR.2024.3521381
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Injection attacks exploit vulnerabilities in how applications handle user input, allowing malicious code to infiltrate the execution environment of web applications, leading to severe consequences, such as data leaks and system crashes. Traditional dynamic and static detection methods suffer from limitations in manual rule or pattern design and intraprocedural analysis, lacking the capability to automatically learn complex features. Meanwhile, deep learning models encounter challenges, such as feature redundancy and inefficiency, in processing long code sequences. Here, we propose a prototype for detecting Injection Vulnerabilities in Java web applications based on Interprocedural analysis and the bidirectional encoder representations from transformers BERT-BiLSTM-CRF model (IVIB), effectively transforming vulnerability detection into text sequence annotation. IVIB employs interprocedural analysis to trace complete program data flow, control flow, method and class dependencies, reducing redundancy through a system dependency graph. Then, we develop intermediate language representation rules and conversion mechanisms specifically for Java programs, symbolically representing code snippets and annotating them to construct a corpus. IVIB achieves remarkable results, with over 96% accuracy, precision, recall, and F1-score in binary classification, surpassing other state-of-the-art models in multiclassification performance. Evaluation on real-world projects demonstrates IVIB's effectiveness, detecting 28 vulnerabilities out of 30 vulnerable slices with low false positives and no false negatives.
引用
收藏
页数:15
相关论文
共 51 条
[1]   Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review [J].
Alaoui, Rokia Lamrani ;
Nfaoui, El Habib .
FUTURE INTERNET, 2022, 14 (04)
[2]  
[Anonymous], 2014, Javaparser
[3]  
[Anonymous], 2022, The State of Developer Ecosystem 2022: Microservices
[4]   Bin2vec: learning representations of binary executable programs for security tasks [J].
Arakelyan, Shushan ;
Arasteh, Sima ;
Hauser, Christophe ;
Kline, Erik ;
Galstyan, Aram .
CYBERSECURITY, 2021, 4 (01)
[5]  
Ball T., 1999, ACM SIGSOFT Softw. Eng. 1049 Notes, V24, P1050
[6]   Systematic Analysis of Deep Learning Model for Vulnerable Code Detection [J].
Bin Nazim, Mohammad Taneem ;
Faruk, Md Jobair Hossain ;
Shahriar, Hossain ;
Khan, Md Abdullah ;
Masum, Mohammad ;
Sakib, Nazmus ;
Wu, Fan .
2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, :1768-1773
[7]  
Black P. E., 2018, Juliet 1.3 Text suite: Changes From 1.2
[8]  
Bletvaska, 2017, Dwa
[9]  
Ch35Tnut, 2023, Java DVWA
[10]   Deep Learning Based Vulnerability Detection: Are We There Yet? [J].
Chakraborty, Saikat ;
Krishna, Rahul ;
Ding, Yangruibo ;
Ray, Baishakhi .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (09) :3280-3296