Convolutional Neural Network for Software Vulnerability Detection

被引:1
作者
Yang, Kaixi [1 ]
Miller, Paul [2 ]
Martinez-del-Rincon, Jesus [2 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, EBay, Belfast, Antrim, North Ireland
[2] Queens Univ Belfast, Ctr Secure Informat Technol, Belfast, Antrim, North Ireland
来源
2022 CYBER RESEARCH CONFERENCE - IRELAND (CYBER-RCI) | 2022年
基金
英国工程与自然科学研究理事会;
关键词
Software Vulnerability; Deep Learning;
D O I
10.1109/Cyber-RCI55324.2022.10032684
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Exploitable vulnerabilities in software are one of the root causes of cybercrime, leading to financial losses, reputational damage, and wider security breaches for both enterprise and consumers. Furthermore, checking for vulnerabilities in software is no longer a human-scale problem due to code volume and complexity. To help address this problem, our work presents a deep learning model able to identify risk signals in Java source code and output a classification for a program as either vulnerable or safe. Sequences of raw Java opcodes are used to train a convolutional neural network that automatically encapsulates discriminative characteristics of a program that are then used for the prediction. Compared to traditional machine learning methods, this approach requires no prior knowledge of the software vulnerability domain, nor any hand-crafted input features. When evaluated on the publicly available benchmark dataset Juliet Test Suite containing 38520 vulnerable and 38806 safe programs, our method achieves an F1 score of 0.92.
引用
收藏
页码:83 / 86
页数:4
相关论文
共 7 条
[1]  
Jun Lee Y., LEARNING BINARY CODE
[2]   Deep Android Malware Detection [J].
McLaughlin, Niall ;
del Rincon, Jesus Martinez ;
Kang, BooJoong ;
Yerima, Suleiman ;
Miller, Paul ;
Sezer, Sakir ;
Safaei, Yeganeh ;
Trickel, Erik ;
Zhao, Ziming ;
Doup, Adam ;
Ahn, Gail Joon .
PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, :301-308
[3]  
Mou LL, 2015, Arxiv, DOI arXiv:1409.5718
[4]   DEEPLINK: Recovering issue-commit links based on deep learning [J].
Ruan, Hang ;
Chen, Bihuan ;
Peng, Xin ;
Zhao, Wenyun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2019, 158
[5]   Automated Vulnerability Detection in Source Code Using Deep Representation Learning [J].
Russell, Rebecca L. ;
Kim, Louis ;
Hamilton, Lei H. ;
Lazovich, Tomo ;
Harer, Jacob A. ;
Ozdemir, Onur ;
Ellingwood, Paul M. ;
McConley, Marc W. .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, :757-762
[6]   Automatically Learning Semantic Features for Defect Prediction [J].
Wang, Song ;
Liu, Taiyue ;
Tan, Lin .
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, :297-308
[7]   Improving Bug Localization with Character-level Convolutional Neural Network and Recurrent Neural Network [J].
Xiao, Yan ;
Keung, Jacky .
2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, :703-704