Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software vulnerability intelligent detection method and system based on code attribute graph and medium

An intelligent detection and vulnerability technology, applied in platform integrity maintenance, biological neural network models, instruments, etc., can solve problems such as lack of integrity, false negatives, and diversified vulnerability difficulties.

Pending Publication Date: 2021-04-30
NAT UNIV OF DEFENSE TECH
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Dynamic testing methods are usually time-consuming and lack completeness, prone to false negatives
The hybrid method combines static and dynamic analysis techniques to overcome some shortcomings, but the hybrid method is difficult to fully realize automatic detection, and the detection effect on unknown vulnerabilities is relatively weak
[0004] At present, the scale of software is becoming larger and more complex, and the forms of vulnerabilities are becoming more diverse. Traditional software vulnerability detection methods have difficulties in dealing with complex and diverse vulnerabilities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software vulnerability intelligent detection method and system based on code attribute graph and medium
  • Software vulnerability intelligent detection method and system based on code attribute graph and medium
  • Software vulnerability intelligent detection method and system based on code attribute graph and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0042] Such as figure 1 As shown, the software vulnerability intelligent detection method based on the code attribute graph in this embodiment includes:

[0043] 1) Generate a code attribute graph based on a code sample to be detected, where the code sample is a function;

[0044] 2) Extract abstract syntax tree sequences, control flow graph sequences and program dependency graph sequences from the code attribute graph;

[0045] 3) The abstract syntax tree sequence, the control flow graph sequence and the program dependency graph sequence are respectively converted into numerical vectors through the pre-trained vector mapper, and the abstract syntax tree vector, the control flow graph vector and the program dependency graph vector are obtained;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software vulnerability intelligent detection method and system based on a code attribute graph and a medium. The method comprises the steps: generating the code attribute graph for a detected code sample, and extracting an abstract syntax tree sequence, a control flow graph sequence and a program dependence graph sequence; converting the obtained various sequences into numerical type vectors through a pre-trained vector mapper, extracting feature vectors through corresponding pre-trained feature extractors, and combining the extracted three feature vectors into feature vectors of a code sample; utilizing a pre-trained vulnerability detector to obtain the probability that the code sample is a vulnerability code according to the feature direction of the code sample, and if the probability exceeds a preset threshold value, judging that the code sample is the vulnerability code. According to the processing mode, more grammars, semantics and other information of the source codes can be reserved, the vulnerability detection effect of the cross-software source code mixing-oriented real data set can be improved, and the false alarm rate and the missing report rate are reduced.

Description

technical field [0001] The invention relates to the technical fields of computer program detection and software vulnerability detection and detection, in particular to a software vulnerability intelligent detection method, system and medium based on a code attribute graph. Background technique [0002] Software vulnerability refers to the flaws existing in software during its life cycle (that is, the whole process of development, deployment, and execution). It causes security issues such as leakage of user privacy data, theft of digital assets, and alteration of system information, resulting in huge economic losses and reputational losses for enterprises and individuals. With the increasing complexity and scale of software systems, the frequency of vulnerable codes is also increasing. According to data released by the National Vulnerability Database (NVD), the number of vulnerable codes released in 2017 was 14,645, the number of vulnerable codes released in 2018 was 16,511,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06N3/04G06N3/00
CPCG06F21/577G06N3/006G06N3/044G06N3/045
Inventor 任怡肖添明谭郁松李宝杨立明杨洒情蹇松雷董攀阳国贵张建锋王静黄辰林王晓川丁滟谭霜王庆坤姜智文
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products