2021
DOI: 10.48550/arxiv.2109.02527
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

VulSPG: Vulnerability detection based on slice property graph representation learning

Abstract: Vulnerability detection is an important issue in software security. Although various data-driven vulnerability detection methods have been proposed, the task remains challenging since the diversity and complexity of real-world vulnerable code in syntax and semantics make it difficult to extract vulnerable features with regular deep learning models, especially in analyzing a large program. Moreover, the fact that real-world vulnerable codes contain a lot of redundant information unrelated to vulnerabilities wil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…To optimally represent the characteristics of a node in the entire code attribute graph, it is necessary to map the information of its neighbor nodes to itself. Considering that each neighbor node has different weights for its influence, we use a Graph Attention Network with a multi-head attention mechanism; the aggregation effect of the attention mechanism on node information has been demonstrated in many studies [27], [34], [45], [46], [47], [48]. Besides, the attention mechanism can deal with latent noise features.…”
Section: Graph Feature Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…To optimally represent the characteristics of a node in the entire code attribute graph, it is necessary to map the information of its neighbor nodes to itself. Considering that each neighbor node has different weights for its influence, we use a Graph Attention Network with a multi-head attention mechanism; the aggregation effect of the attention mechanism on node information has been demonstrated in many studies [27], [34], [45], [46], [47], [48]. Besides, the attention mechanism can deal with latent noise features.…”
Section: Graph Feature Extractionmentioning
confidence: 99%
“…Attention-based graph neural network methods are also widely used in vulnerability detection. VulSPG [45] introduced a triple attention mechanism of node attention mechanism, sentence attention mechanism, and subgraph attention mechanism for slice attribute graph to improve the ability of node information aggregation. ACGVD [46] designed a node-level attention mechanism and a pathlevel attention mechanism for data control flow graphs to improve the classification performance.…”
Section: Related Workmentioning
confidence: 99%
“…Many researchers argued that the control and data flows are well-structured which can also reveal useful information for understanding code semantics indicative of vulnerable patterns. Therefore, a number of studies utilize Graph Neural Networks (GNNs) for structural information extraction, including FUNDED [42], Devign [3], VulSPG [43], and Zhuang et al [44]. However, these studies highly depend on code analysis to obtain code graph.…”
Section: Software Vulnerability Detectionmentioning
confidence: 99%