Paper
13 June 2024 A software vulnerability intelligent detection method based on code association graph
Haofei Xie, Changzhi Li, Jincheng Jiang, Yiwen Qin, Futao Lu, Kaiwen Deng
Author Affiliations +
Proceedings Volume 13180, International Conference on Image, Signal Processing, and Pattern Recognition (ISPP 2024); 131806I (2024) https://doi.org/10.1117/12.3033812
Event: International Conference on Image, Signal Processing, and Pattern Recognition (ISPP 2024), 2024, Guangzhou, China
Abstract
In order to improve the accuracy of software source code vulnerability detection and reduce the false positive rate, this paper proposes a software vulnerability intelligent detection method based on code association graph(VDCAG). This method constructs a new and more comprehensive graph structure representation for software source code by adding different dependency edges in AST, known as a Code Association Graph (CAG). Furthermore, research has found that nodes with higher in and out degrees in the code association graph have higher importance in the code and are more likely to trigger vulnerabilities. Therefore, we have introduced a multi-channel attention mechanism in the vulnerability detection model, focusing on nodes that may trigger vulnerabilities and assigns them higher weights to guide the generation of the final graph embedding vector, thus completing fine-grained vulnerability detection. This paper conducted a comprehensive evaluation of our model on the SARD and NVD datasets, verifying the superiority of our proposed method.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Haofei Xie, Changzhi Li, Jincheng Jiang, Yiwen Qin, Futao Lu, and Kaiwen Deng "A software vulnerability intelligent detection method based on code association graph", Proc. SPIE 13180, International Conference on Image, Signal Processing, and Pattern Recognition (ISPP 2024), 131806I (13 June 2024); https://doi.org/10.1117/12.3033812
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Feature extraction

Matrices

Network security

Neural networks

Reflection

Semantics

Back to Top