Automated Vulnerability Detection in Source Code Using Deep Representation Learning

被引:399
作者
Russell, Rebecca L. [1 ]
Kim, Louis [1 ]
Hamilton, Lei H. [1 ]
Lazovich, Tomo [1 ,3 ]
Harer, Jacob A. [1 ,2 ]
Ozdemir, Onur [1 ]
Ellingwood, Paul M. [1 ]
McConley, Marc W. [1 ]
机构
[1] Draper, Spiceland, IN 47385 USA
[2] Boston Univ, Boston, MA 02215 USA
[3] Lightmatter, Boston, MA USA
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA) | 2018年
关键词
artificial neural networks; computer security; data mining; machine learning;
D O I
10.1109/ICMLA.2018.00120
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Increasing numbers of software vulnerabilities are discovered every year whether they are reported publicly or discovered internally in proprietary code. These vulnerabilities can pose serious risk of exploit and result in system compromise, information leaks, or denial of service. We leveraged the wealth of C and C++ open-source code available to develop a large-scale function-level vulnerability detection system using machine learning. To supplement existing labeled vulnerability datasets, we compiled a vast dataset of millions of open-source functions and labeled it with carefully-selected findings from three different static analyzers that indicate potential exploits. Using these datasets, we developed a fast and scalable vulnerability detection tool based on deep feature representation learning that directly interprets lexed source code. We evaluated our tool on code from both real software packages and the NIST SATE IV benchmark dataset. Our results demonstrate that deep feature representation learning on source code is a promising approach for automated software vulnerability detection.
引用
收藏
页码:757 / 762
页数:6
相关论文
共 21 条
[1]  
[Anonymous], 2018, ABS180101681 CORR
[2]  
[Anonymous], 2017, ABS170906182 CORR
[3]  
Arnold C., 2017, EQUIFAX HACK CALLS B
[4]  
Debian, DEB UN OP SYST
[5]  
Foxx C., 2017, CYBER ATTACK EUROPOL
[6]  
Harer J., 2018, ARXIV180507475
[7]  
Hovsepyan A., 2012, Proceedings of the 4th International Workshop on Security Measurements and Metrics. MetriSec'12, P7
[8]  
Kim Y., 2014, P C EMP METH NAT LAN, P1746, DOI DOI 10.3115/V1/D14-1181
[9]   SYMBOLIC EXECUTION AND PROGRAM TESTING [J].
KING, JC .
COMMUNICATIONS OF THE ACM, 1976, 19 (07) :385-394
[10]  
LaToza T. D., 2006, 28th International Conference on Software Engineering Proceedings, P492, DOI 10.1145/1134285.1134355