Software Vulnerability Detection Using Informed Code Graph Pruning

被引:0
作者
Gear, Joseph [1 ]
Xu, Yue [1 ]
Foo, Ernest [2 ]
Gauravaram, Praveen [3 ]
Jadidi, Zahra [2 ]
Simpson, Leonie [1 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
[2] Griffith Univ, Sch Informat & Commun Technol, Brisbane, Qld 4111, Australia
[3] Tata Consultancy Serv Ltd TCS, Cyber Secur Res & Innovat, Brisbane, QLD 4000, Australia
关键词
Code representation; deep learning; source code semantics; vulnerability detection;
D O I
10.1109/ACCESS.2023.3338162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
pruning methods that can be used to reduce graph size to manageable levels by removing information irrelevant to vulnerabilities, while preserving relevant information. We present "Semantic-enhanced Code Embedding for Vulnerability Detection" (SCEVD), a deep learning model for vulnerability detection that seeks to fill these gaps by using more detailed information about code semantics to select vulnerability-relevant features from code graphs. We propose several heuristic-based pruning methods, implement them as part of SCEVD, and conduct experiments to verify their effectiveness. Our heuristic-based pruning improves on vulnerability detection results by up to 12% over the baseline pruning method.
引用
收藏
页码:135626 / 135644
页数:19
相关论文
共 64 条
  • [1] Allamanis M, 2018, Arxiv, DOI arXiv:1711.00740
  • [2] code2vec: Learning Distributed Representations of Code
    Alon, Uri
    Zilberstein, Meital
    Levy, Omer
    Yahav, Eran
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2019, 3 (POPL):
  • [3] [Anonymous], NVD-Vulnerabilities
  • [4] [Anonymous], Software Assurance Reference Dataset Project
  • [5] Vulnerability Prediction From Source Code Using Machine Learning
    Bilgin, Zeki
    Ersoy, Mehmet Akif
    Soykan, Elif Ustundag
    Tomur, Emrah
    Comak, Pinar
    Karacay, Leyli
    [J]. IEEE ACCESS, 2020, 8 : 150672 - 150684
  • [6] MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks
    Cao, Sicong
    Sun, Xiaobing
    Bo, Lili
    Wu, Rongxin
    Li, Bin
    Tao, Chuanqi
    [J]. 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 1456 - 1468
  • [7] BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection
    Cao, Sicong
    Sun, Xiaobing
    Bo, Lili
    Wei, Ying
    Li, Bin
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2021, 136
  • [8] Deep Learning Based Vulnerability Detection: Are We There Yet?
    Chakraborty, Saikat
    Krishna, Rahul
    Ding, Yangruibo
    Ray, Baishakhi
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (09) : 3280 - 3296
  • [9] DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network
    Cheng, Xiao
    Wang, Haoyu
    Hua, Jiayi
    Xu, Guoai
    Sui, Yulei
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (03)
  • [10] Data Quality for Software Vulnerability Datasets
    Croft, Roland
    Babar, M. Ali
    Kholoosi, M. Mehdi
    [J]. 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 121 - 133