Using ChatGPT as a Static Application Security Testing Tool

被引:2
|
作者
Bakhshandeh, Atieh [1 ]
Keramatfar, Abdalsamad [1 ]
Norouzi, Amir [1 ]
Chekidehkhoun, Mohammad M. [1 ]
机构
[1] Res Ctr Dev Adv Technol, Tehran, Iran
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2023年 / 15卷 / 03期
关键词
Artificial Intelligence-based Code Review; ChatGPT Model; Common Weakness Enumeration; Static Application Security Testing; Vulnerability Detection;
D O I
10.22042/isecure.2023.182082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, artificial intelligence has had a conspicuous growth in almost every aspect of life. One of the most applicable areas is security code review, in which a lot of AI-based tools and approaches have been proposed. Recently, ChatGPT has caught a huge amount of attention with its remarkable performance in following instructions and providing a detailed response. Regarding the similarities between natural language and code, in this paper, we study the feasibility of using ChatGPT for vulnerability detection in Python source code. Toward this goal, we feed an appropriate prompt along with vulnerable data to ChatGPT and compare its results on two datasets with the results of three widely used Static Application Security Testing tools (Bandit, Semgrep, and SonarQube). We implement different kinds of experiments with ChatGPT and the results indicate that ChatGPT reduces the false positive and false negative rates and has the potential to be used for Python source code vulnerability detection. (c) 2023 ISC. All rights reserved.
引用
收藏
页码:51 / 58
页数:8
相关论文
共 50 条
  • [21] DeVAIC: : A tool for security assessment of AI-generated code
    Cotroneo, Domenico
    De Luca, Roberta
    Liguori, Pietro
    INFORMATION AND SOFTWARE TECHNOLOGY, 2025, 177
  • [22] SolGPT: A GPT-Based Static Vulnerability Detection Model for Enhancing Smart Contract Security
    Zeng, Shengqiang
    Zhang, Hongwei
    Wang, Jinsong
    Shi, Kai
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT IV, 2024, 14490 : 42 - 62
  • [23] An Exploratory Study on Machine Learning to Combine Security Vulnerability Alerts from Static Analysis Tools
    Pereira, Jose D'Abruzzo
    Campos, Joao R.
    Vieira, Marco
    2019 9TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2019, : 1 - 10
  • [24] An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios
    Paulo Nunes
    Ibéria Medeiros
    José Fonseca
    Nuno Neves
    Miguel Correia
    Marco Vieira
    Computing, 2019, 101 : 161 - 185
  • [25] An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios
    Nunes, Paulo
    Medeiros, Iberia
    Fonseca, Jose
    Neves, Nuno
    Correia, Miguel
    Vieira, Marco
    COMPUTING, 2019, 101 (02) : 161 - 185
  • [26] Machine Learning to Combine Static Analysis Alerts with Software Metrics to Detect Security Vulnerabilities: An Empirical Study
    Pereira, Jose D'Abruzzo
    Campos, Joao R.
    Vieira, Marco
    2021 17TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2021), 2021, : 1 - 8
  • [27] Security Testing of Second Order Permission Re-delegation Vulnerabilities in Android Apps
    Demissie, Biniam Fisseha
    Ceccato, Mariano
    2020 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT, 2020, : 1 - 11
  • [28] TipTracer: Detecting Android Application Vulnerabilities Based on the Compliance with Security Guidance
    Zhang L.
    Yang Z.
    Li M.
    Yang M.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (11): : 2315 - 2329
  • [29] IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
    Zhou, Wei
    Shen, Shandian
    Liu, Peng
    FUTURE INTERNET, 2025, 17 (01)
  • [30] Detection of Autism Spectrum Disorder (ASD) from Natural Language Text using BERT and ChatGPT Models
    Mukherjee, Prasenjit
    Gokul, R. S.
    Sadhukhan, Sourav
    Godse, Manish
    Chakraborty, Baisakhi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (10) : 382 - 396