Automatic CWE Assignment for Vulnerabilities with Graph Neural Networks

被引:0
作者
Liu, Peng [1 ]
Ye, Wenzhe [1 ]
Duan, Haiying [2 ]
Li, Xianxian [1 ]
Zhang, Shuyi [1 ]
Li, Yongnan [3 ]
机构
[1] Guangxi Normal Univ, Guilin, Peoples R China
[2] Beihang Univ, Sch Software, Beijing, Peoples R China
[3] Peoples Publ Secur Univ China, Beijing, Peoples R China
来源
2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS | 2023年
基金
中国国家自然科学基金;
关键词
vulnerability report; CWE; graph neural network;
D O I
10.1109/ACCTCS58815.2023.00044
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Vulnerability reports are essential for improving software security since they record many key information of vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps understand the cause of the vulnerability quickly. Therefore, CWE assignment useful for categorizing newly discovered vulnerabilities. In this paper, we propose an automatic CWE assignment method with Graph Neural Networks. First, we prepare a dataset that contains 3,394 real world vulnerabilities from Linux, OpenSSL, Wireshark and many other software. Then, we extract statements with vulnerability syntax features from these vulnerabilities and use program slicing to slice them according to the categories of syntax features. On top of slices, we represent these slices with graphs that characterize the data dependency and control dependency between statements. Finally, we employ the Graph Neural Network to learn the hidden information from these graphs, and leverage the Siamese Network to compute the similarity between vulnerability functions, thereby performing assignment of CWE ID for these vulnerabilities. The experimental results show that the proposed method is effective compared to existing methods.
引用
收藏
页码:188 / 193
页数:6
相关论文
共 25 条
[1]  
Aghaei E, 2020, Arxiv, DOI arXiv:2009.11501
[2]   A tree-based machine learning methodology to automatically classify software vulnerabilities [J].
Aivatoglou, Georgios ;
Anastasiadis, Mike ;
Spanos, Georgios ;
Voulgaridis, Antonis ;
Votis, Konstantinos ;
Tzovaras, Dimitrios .
PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, :312-317
[3]  
[Anonymous], 1995, Ar- tificial Intelligence, V25, P27
[4]   Automation of Vulnerability Classification from its Description using Machine Learning [J].
Aota, Masaki ;
Kanehara, Hideaki ;
Kubo, Masaki ;
Murata, Noboru ;
Sun, Bo ;
Takahashi, Takeshi .
2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, :26-32
[5]  
checkmarx, CODE STATIC ANAL TOO
[6]  
Common Vulnerabilities and Exposures, ABOUT US
[7]  
Common weakness enumeration, About Us
[8]  
CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
[9]  
cvedetails, CVE202233936
[10]  
cvedetails, CVE202232552