Automatic software vulnerability assessment by extracting vulnerability elements

被引:7
|
作者
Sun, Xiaobing [1 ,2 ]
Ye, Zhenlei [1 ]
Bo, Lili [1 ,2 ,3 ]
Wu, Xiaoxue [1 ,2 ]
Wei, Ying [1 ]
Zhang, Tao [4 ]
Li, Bin [1 ,2 ]
机构
[1] Yangzhou Univ, Sch Informat Engn, Yangzhou, Peoples R China
[2] Yangzhou Univ, Jiangsu Prov Engn Res Ctr Knowledge Management & I, Yangzhou, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Key Lab Safety Crit Software, Minist Ind & Informat Technol, Nanjing, Peoples R China
[4] Macau Univ Sci & Technol MUST, Sch Comp Sci & Engn, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Vulnerability assessment; Deep learning; Multi-class classification; Mining software repositories; CLASSIFICATION;
D O I
10.1016/j.jss.2023.111790
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software vulnerabilities take threats to software security. When faced with multiple software vulnerabilities, the most urgent ones need to be fixed first. Therefore, it is critical to assess the severity of vulnerabilities in advance. However, increasing number of vulnerability descriptions do not use templates, which reduces the performance of the existing software vulnerability assessment approaches. In this paper, we propose an automated vulnerability assessment approach that using vulnerability elements for predicting the severity of six vulnerability metrics (i.e., Access Vector, Access Complexity, Authentication, Confidentiality Impact, Integrity Impact and Availability Impact). First, we use BERT-MRC to extract vulnerability elements from vulnerability descriptions. Second, we assess six metrics using vulnerability elements instead of full descriptions. We conducted experiments on our manually labeled dataset. The experimental results show that our approach has an improvement of 12.03%, 14.37%, and 38.65% on Accuracy over three baselines.& COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description
    Han, Zhuobing
    Li, Xiaohong
    Xing, Zhenchang
    Liu, Hongtao
    Feng, Zhiyong
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, : 125 - 136
  • [2] Software Support of the Common Criteria Vulnerability Assessment
    Bialas, Andrzej
    ADVANCES IN DEPENDABILITY ENGINEERING OF COMPLEX SYSTEMS, 2018, 582 : 26 - 38
  • [3] A novel automatic severity vulnerability assessment framework
    Wen, Tao
    Zhang, Yuqing
    Dong, Ying
    Yang, Gang
    Journal of Communications, 2015, 10 (05): : 320 - 329
  • [4] Software Vulnerability Assessment: Vendor, Scanner, and User Analysis
    Boonchuay, Kietthibhum
    Siripaktanakon, Wachirawich
    Sangpetch, Orathai
    Sangpetch, Akkarit
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2022), 2022, : 214 - 221
  • [5] A Survey on Data-driven Software Vulnerability Assessment and Prioritization
    Le, Triet H. M.
    Chen, Huaming
    Babar, M. Ali
    ACM COMPUTING SURVEYS, 2023, 55 (05)
  • [6] On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
    Le, Triet Huynh Minh
    Babar, M. Ali
    2022 MINING SOFTWARE REPOSITORIES CONFERENCE (MSR 2022), 2022, : 621 - 633
  • [7] VULNERABILITY ASSESSMENT OF TRANSPORT INFRASTRUCTURE ELEMENTS- CASE STUDY IN RAJEC
    Kubas, Jozef
    Kollar, Boris
    Ristvej, Jozef
    Petrlova, Katarina
    Blazkova, Katerina
    KOMUNIKACIE - VEDECKE LISTY ZILINSKEJ UNIVERZITY V ZILINE, 2024, 26 (04): : F23 - F35
  • [8] A vulnerability index formulation for the seismic vulnerability assessment of vernacular architecture
    Ortega, Javier
    Vasconcelos, Graca
    Rodrigues, Hugo
    Correia, Mariana
    ENGINEERING STRUCTURES, 2019, 197
  • [9] Variables are a Curse in Software Vulnerability Prediction
    Groppe, Jinghua
    Groppe, Sven
    Moeller, Ralf
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2023, PT I, 2023, 14146 : 516 - 521
  • [10] Vulnerability assessment of power system using various vulnerability indices
    Haidar, Ahmed M. A.
    Mohamed, Azah
    Hussain, Aini
    2006 4TH STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, 2006, : 223 - 228