Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-Tail Software Through Feature Inference

被引:0
作者
Han, Linyi [1 ,2 ]
Pan, Shidong [3 ,4 ]
Xing, Zhenchang [3 ]
Sun, Jiamou [3 ]
Yitagesu, Sofonias [1 ]
Zhang, Xiaowang [1 ]
Feng, Zhiyong [1 ]
机构
[1] Tianjin Univ, Coll Intelligence & Comp, Tianjin 300072, Peoples R China
[2] Ctr Natl Railway Intelligent Transportat Syst Engn, Beijing 100081, Peoples R China
[3] CSIROs, Data61, Canberra, ACT 2601, Australia
[4] Australian Natl Univ, Canberra, ACT 0200, Australia
关键词
Software; Heavily-tailed distribution; Vectors; Tail; Operating systems; Databases; Large language models; Security; Feature extraction; Accuracy; Software vulnerability; long-tail software; textual vulnerability descriptions; natural language inference; software feature;
D O I
10.1109/TSE.2024.3523284
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Augmenting missing key aspects in Textual Vulnerability Descriptions (TVDs) is crucial for effective vulnerability analysis. For instance, in TVDs, key aspects include Attack Vector, Vulnerability Type, among others. These key aspects help security engineers understand and address the vulnerability in a timely manner. For software with a large user base (non-long-tail software), augmenting these missing key aspects has significantly advanced vulnerability analysis and software security research. However, software instances with a limited user base (long-tail software) often get overlooked due to inconsistency software names, TVD limited avaliability, and domain-specific jargon, which complicates vulnerability analysis and software repairs. In this paper, we introduce a novel software feature inference framework designed to augment the missing key aspects of TVDs for long-tail software. Firstly, we tackle the issue of non-standard software names found in community-maintained vulnerability databases by cross-referencing government databases with Common Vulnerabilities and Exposures (CVEs). Next, we employ Large Language Models (LLMs) to generate the missing key aspects. However, the limited availability of historical TVDs restricts the variety of examples. To overcome this limitation, we utilize the Common Weakness Enumeration (CWE) to classify all TVDs and select cluster centers as representative examples. To ensure accuracy, we present Natural Language Inference (NLI) models specifically designed for long-tail software. These models identify and eliminate incorrect responses. Additionally, we use a wiki repository to provide explanations for proprietary terms. Our evaluations demonstrate that our approach significantly improves the accuracy of augmenting missing key aspects of TVDs for log-tail software from 0.27 to 0.56 (+107%). Interestingly, the accuracy of non-long-tail software also increases from 64% to 71%. As a result, our approach can be useful in various downstream tasks that require complete TVD information.
引用
收藏
页码:466 / 483
页数:18
相关论文
共 48 条
[1]  
Althebeiti H., 2022, arXiv, DOI [10.48550/arXiv.2210.01260, DOI 10.48550/ARXIV.2210.01260]
[2]  
Banerjee S., 2005, P ACL WORKSHOP INTRI, P65, DOI DOI 10.3115/1626355.1626389
[3]  
Biswas P, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P183
[4]   The origins of the Gini index: extracts from VariabilitA e MutabilitA (1912) by Corrado Gini [J].
Ceriani, Lidia ;
Verme, Paolo .
JOURNAL OF ECONOMIC INEQUALITY, 2012, 10 (03) :421-443
[5]  
Cheng J., 2020, Why socomplicated? Simple term filtering andweighting for location-based bugreport assignment recommendation, P2177, DOI [10.1145/3397271.3401411, DOI 10.1145/3397271.3401411]
[6]  
Cheshkov A, 2023, Arxiv, DOI arXiv:2304.07232
[7]  
cnnvd, ChinaNational Internet Emergency
[8]   NEAREST NEIGHBOR PATTERN CLASSIFICATION [J].
COVER, TM ;
HART, PE .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1967, 13 (01) :21-+
[9]  
Deng Yinlin, 2024, P IEEEACM 46 INT C S, DOI DOI 10.1145/3597503.3623343
[10]  
Evans J., Mitre key details phrasing