A new approach to software vulnerability detection based on CPG analysis

نویسندگان

چکیده

Detecting source code vulnerabilities is an essential issue today. In this paper, to improve the efficiency of detecting in software written C/C++, we propose use a combination Deep Graph Convolutional Neural Network (DGCNN) and property graph (CPG). Specifically, 3 main proposed phases research method include: phase 1: building feature profiles code. At step, suggest using analysis techniques such as Word2vec, one hot encoding standardize analyze code; 2: extracting features based on profiles. Accordingly, at phase, model extract 3: classifying extracted 2 find normal containing security vulnerabilities. Some scenarios for comparing evaluating study compared with other approaches have taken show superior effectiveness our approach. Besides, result proves that paper not only correct reasonable, but it also opens up new approach task

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a new approach to credibility premium for zero-inflated poisson models for panel data

هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...

15 صفحه اول

A New Approach to Nonstandard Analysis

In this paper, we propose a new approach to nonstandard analysis without using the ultrafilters. This method is very simple in practice. Moreover, we construct explicitly the total order relation in the new field of the infinitesimal numbers. To illustrate the importance of this work, we suggest comparing  a few applications of this approach with the former methods.

متن کامل

A Software Engineering Approach for Vulnerability Analysis

Due to the increasing dependency on networked computer system, it is important to make a network reliable and dependent. This is even more relevant as new threats of attack are constantly being revealed, compromising the security of systems. This paper addresses this problem by presenting an attack injection methodology for the automatic discovery of vulnerabilities in software components. The ...

متن کامل

A New Optimized Hybrid Model Based On COCOMO to Increase the Accuracy of Software Cost Estimation

The literature review shows software development projects often neither meet time deadlines, nor run within the allocated budgets. One common reason can be the inaccurate cost estimation process, although several approaches have been proposed in this field. Recent research studies suggest that in order to increase the accuracy of this process, estimation models have to be revised. The Construct...

متن کامل

iranian english learners’ perception and personality: a dual approach to investigating influential factors on willingness to communicate

abstract previous studies on willingness to communicate (wtc) have shown the influence of many individual or situational factors on students’ tendency to engage in classroom communication, in which wtc has been viewed either at the trait-level or situational level. however, due to the complexity of the notion of willingness to communicate, the present study suggests that these two strands are ...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cogent engineering

سال: 2023

ISSN: ['2331-1916']

DOI: https://doi.org/10.1080/23311916.2023.2221962