HGVul: A Code Vulnerability Detection Method Based on Heterogeneous Source-Level Intermediate Representation

نویسندگان

چکیده

Vulnerability detection on source code can prevent the risk of cyber-attacks as early possible. However, lacking fine-grained analysis has rendered existing solutions still suffering from low performance; besides, explosive growth open-source projects dramatically increased complexity and diversity code. This paper presents HGVul, a vulnerability method based heterogeneous intermediate representation The key proposed is handling source-level (SIR) without expert knowledge. It first extracts graph SIR with multiple syntactic-semantic information. Then, HGVul splits into different subgraphs according to various semantic relations, which are used obtain information conveyed by types edges. Next, neural network attention operations deployed each subgraph learn representation, captures subtle effects node neighbors their representation. Finally, learned feature representations utilized perform detection. Experiments conducted datasets. F1 reaches 96.1% sample-balanced Big-Vul-VP dataset 88.3% unbalanced Big-Vul dataset. Further experiments actual project datasets prove better performance HGVul.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

(CLSCR) Cross Language Source Code Reuse Detection Using Intermediate Language

In today's digital era information access is just a click away. so computer science students also have easy access to all the source codes from different websites thus it has become difficult for academicians to detect source code reuse in students programming assignments. The new trend in the area of source code reuse is using the source code by translating it in another programming language p...

متن کامل

A New IRIS Segmentation Method Based on Sparse Representation

Iris recognition is one of the most reliable methods for identification. In general, itconsists of image acquisition, iris segmentation, feature extraction and matching. Among them, iris segmentation has an important role on the performance of any iris recognition system. Eyes nonlinear movement, occlusion, and specular reflection are main challenges for any iris segmentation method. In thi...

متن کامل

A New IRIS Segmentation Method Based on Sparse Representation

Iris recognition is one of the most reliable methods for identification. In general, itconsists of image acquisition, iris segmentation, feature extraction and matching. Among them, iris segmentation has an important role on the performance of any iris recognition system. Eyes nonlinear movement, occlusion, and specular reflection are main challenges for any iris segmentation method. In thi...

متن کامل

Towards A Portable XML-based Source Code Representation

Program representation is a critical issue in the area of software analysis and software re-engineering. It heavily relates to the portability and effectiveness of the software analysis tools that can be developed. This paper describes an approach that focuses on source code representation schemes in the form of Abstract Syntax Trees that are encoded as XML documents. These XML source code repr...

متن کامل

A Hybrid Malicious Code Detection Method based on Deep Learning

In this paper, we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2022

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2022/1919907