A deep learning based static taint analysis approach for IoT software vulnerability location
المؤلف | Niu, Weina |
المؤلف | Zhang, Xiaosong |
المؤلف | Du, Xiaojiang |
المؤلف | Zhao, Lingyuan |
المؤلف | Cao, Rong |
المؤلف | Guizani, Mohsen |
تاريخ الإتاحة | 2022-12-22T08:15:56Z |
تاريخ النشر | 2020-02-01 |
اسم المنشور | Measurement: Journal of the International Measurement Confederation |
المعرّف | http://dx.doi.org/10.1016/j.measurement.2019.107139 |
الاقتباس | Niu, W., Zhang, X., Du, X., Zhao, L., Cao, R., & Guizani, M. (2020). A deep learning based static taint analysis approach for IoT software vulnerability location. Measurement, 152, 107139. |
الرقم المعياري الدولي للكتاب | 02632241 |
الملخص | Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of software. The core content is the discovery and location of software vulnerability. However, traditional human experts-based approaches are labor-consuming and time-consuming. Thus, some automatic detection approaches are proposed to solve the problem. But, they have a high false negative rate. In this paper, a deep learning based static taint analysis approach is proposed to automatically locate Internet of Things (IoT) software vulnerability, which can relieve tedious manual analysis and improve detection accuracy. Deep learning is used to detect vulnerability since it considers the program context. Firstly, the taint from the difference file between the source program and its patched program selection rules are designed. Secondly, the taint propagation paths are got using static taint analysis. Finally, the detection model based on two-stage Bidirectional Long Short Term Memory (BLSTM) is applied to discover and locate software vulnerabilities. The Code Gadget Database is used to evaluate the proposed approach, which includes two types of vulnerabilities in C/C++ programs, buffer error vulnerability (CWE-119) and resource management error vulnerability (CWE-399). Experimental results show that our proposed approach can achieve an accuracy of 0.9732 for CWE-119 and 0.9721 for CWE-399, which is higher than that of the other three models (the accuracy of RNN, LSTM, and BLSTM is under than 0.97) and achieve a lower false negative rate and false positive rate than the other approaches. |
راعي المشروع | This work was supported in part by the National Key R&D Plan under Grant CNS 2016QY06X1205 ,in part by the Basic Research Business Fees of Central Colleges under Grant CNS 20826041B4252 , in part by the National Natural Science Foundation (NSFC) under Grant CNS 61572115 , and in part by the Science and Technology Project of State Grid Corporation of China under Grant CNS 522722180007 . Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not reflect the views of the funding agencies. |
اللغة | en |
الناشر | Elsevier B.V. |
الموضوع | Deep learning IoT software vulnerability location Software patching Static taint analysis |
النوع | Article |
رقم المجلد | 152 |
تحقق من خيارات الوصول
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2402 items ]