Software vulnerability detection method and device based on graph convolution network

A convolutional network and software vulnerability technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as difficult to meet needs, and achieve the effect of improving detection efficiency and software quality

Active Publication Date: 2020-09-01
上海信息安全工程技术研究中心
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods work well in a theoretical environment, but in real scenarios, due to the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software vulnerability detection method and device based on graph convolution network
  • Software vulnerability detection method and device based on graph convolution network
  • Software vulnerability detection method and device based on graph convolution network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the objectives, technical solutions and advantages of the present invention clearer and more comprehensible, the present invention will be described in further detail below with reference to the accompanying drawings and technical solutions.

[0025] With the rapid development of the Internet, the scale of various online systems has been growing rapidly. However, at present, vulnerability mining is still mainly through manual analysis, which requires a lot of time, manpower, and in-depth understanding of software systems and technologies. Therefore, new methods are needed to assist vulnerability analysis to speed up the analysis. To this end, in the embodiments of the present invention, refer to figure 1 As shown, a software vulnerability detection method based on graph convolutional network is provided, which includes the following contents:

[0026] S101) collect a code sample data set for detection;

[0027] S102) for the code sample data set, base...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer security, and particularly relates to a software vulnerability detection method and device based on a graph convolution network, and the methodcomprises the steps: collecting a code sample data set; for the code sample data set, based on the abstract syntax tree and the control flow graph, extracting a code feature semantic expression formin code behavior units; and performing classification detection on the extracted code feature semantic expression form through the trained and learned graph convolutional network, and obtaining software vulnerabilities in the code according to a classification detection result. According to the invention, through extracting the abstract syntax tree, the control flow and the data flow information of the code, a code feature semantic expression mode taking a code as a unit is formed. The possibility that the vulnerability exists in the code is analyzed by using the graph convolution network in deep learning and the characteristics analyzed by the data flow extracted based on the abstract syntax tree, so that the vulnerability detection efficiency and accuracy are effectively improved, the software code reliability is ensured, the software quality is improved, and the method has important significance for software security application.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a software vulnerability detection method and device based on a graph convolution network. Background technique [0002] Now that software technology has penetrated into all aspects of life, the security of these systems themselves is becoming more and more important. However, various loopholes in the software seriously threaten the security of the system. A total of 27,583 vulnerabilities were disclosed between 2015 and 2017, with an average of 9,194 vulnerabilities discovered per year. The number of vulnerabilities discovered has increased by more than 70% compared to an average of 5,400 vulnerabilities being disclosed per year between 2006 and 2014. There are a small number of uncovered vulnerabilities known as 0days that are favored by attackers. The number of zero-day vulnerabilities discovered in 2015 increased dramatically, averaging about one per ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/56
CPCG06F21/577G06F21/563
Inventor 孟罡岳佳郑秋生韩林崔平非马超
Owner 上海信息安全工程技术研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products