CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection

被引:1
作者
Wu, Tongshuai [1 ,2 ]
Chen, Liwei [1 ,2 ]
Du, Gewangzi [1 ,2 ]
Zhu, Chenguang [1 ,2 ]
Cui, Ningning [1 ,2 ]
Shi, Gang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Data Normalization; Clustering; Vulnerability Detection; Deep Learning;
D O I
10.1093/comjnl/bxad080
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The key to deep learning vulnerability detection framework is pre-processing source code and learning vulnerability features. Traditional source code representation techniques take a complete normalization to user-defined symbols but ignore the semantic information associated with vulnerabilities. The current mainstream vulnerability feature learning model is Recurrent Neural Network (RNN), whose time-series structure determines its insufficient remote information acquisition capability. This paper proposes a new vulnerability detection framework to solve the above problems. We propose a new data normalization method in the source code pre-processing phase. The user-defined symbols are clustered using the unsupervised clustering algorithm K-means. The normalized classification is performed according to the clustering results, which preserves the primary semantic information in the source code and ensures the smoothness of the sample data. In the feature extraction stage, we input the source code after performing text representation into Bidirectional Encoder Representations for Transformers (BERT) for feature automation learning, which enhances semantic information extraction and remote information acquisition. Experimental results show that the vulnerability detection precision of this method is 18.3% higher than that of the current mainstream vulnerability detection framework in the real-world data collected by ourselves. Further, our method improves the precision of the state-of-the-art method by 4.2%.
引用
收藏
页码:1538 / 1549
页数:12
相关论文
共 68 条
[1]  
Ahmadi M, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P2025
[2]  
[Anonymous], 2014, arXiv
[3]   BinGo: Cross-Architecture Cross-OS Binary Search [J].
Chandramohan, Mahinthan ;
Xue, Yinxing ;
Xu, Zhengzi ;
Liu, Yang ;
Cho, Chia Yuan ;
Kuan, Tan Hee Beng .
FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2016, :678-689
[4]  
Checkmarx, About us
[5]   Hawkeye: Towards a Desired Directed Grey-box Fuzzer [J].
Chen, Hongxu ;
Xue, Yinxing ;
Li, Yuekang ;
Chen, Bihuan ;
Xie, Xiaofei ;
Wu, Xiuheng ;
Liu, Yang .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :2095-2108
[6]   DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network [J].
Cheng, Xiao ;
Wang, Haoyu ;
Hua, Jiayi ;
Xu, Guoai ;
Sui, Yulei .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (03)
[7]  
Cho K., 2014, EMNLP 2014, DOI DOI 10.3115/V1/D14-1179
[8]  
Chung J., 2014, NIPS 2014 WORKSHOP D
[9]  
code.google, ROUGH AUDIT TOOL SEC
[10]  
Collobert R., 2008, P 25 INT C MACH LEAR, P160, DOI [https://doi.org/10.1145/1390156.1390177, DOI 10.1145/1390156.1390177, DOI 10.1145/1390156.1390177.ICML08]