Show simple item record

AuthorNiu, Weina
AuthorZhang, Xiaosong
AuthorDu, Xiaojiang
AuthorZhao, Lingyuan
AuthorCao, Rong
AuthorGuizani, Mohsen
Available date2022-12-22T08:15:56Z
Publication Date2020-02-01
Publication NameMeasurement: Journal of the International Measurement Confederation
Identifierhttp://dx.doi.org/10.1016/j.measurement.2019.107139
CitationNiu, W., Zhang, X., Du, X., Zhao, L., Cao, R., & Guizani, M. (2020). A deep learning based static taint analysis approach for IoT software vulnerability location. Measurement, 152, 107139.‏
ISSN02632241
URIhttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85076016382&origin=inward
URIhttp://hdl.handle.net/10576/37542
AbstractComputer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of software. The core content is the discovery and location of software vulnerability. However, traditional human experts-based approaches are labor-consuming and time-consuming. Thus, some automatic detection approaches are proposed to solve the problem. But, they have a high false negative rate. In this paper, a deep learning based static taint analysis approach is proposed to automatically locate Internet of Things (IoT) software vulnerability, which can relieve tedious manual analysis and improve detection accuracy. Deep learning is used to detect vulnerability since it considers the program context. Firstly, the taint from the difference file between the source program and its patched program selection rules are designed. Secondly, the taint propagation paths are got using static taint analysis. Finally, the detection model based on two-stage Bidirectional Long Short Term Memory (BLSTM) is applied to discover and locate software vulnerabilities. The Code Gadget Database is used to evaluate the proposed approach, which includes two types of vulnerabilities in C/C++ programs, buffer error vulnerability (CWE-119) and resource management error vulnerability (CWE-399). Experimental results show that our proposed approach can achieve an accuracy of 0.9732 for CWE-119 and 0.9721 for CWE-399, which is higher than that of the other three models (the accuracy of RNN, LSTM, and BLSTM is under than 0.97) and achieve a lower false negative rate and false positive rate than the other approaches.
SponsorThis work was supported in part by the National Key R&D Plan under Grant CNS 2016QY06X1205 ,in part by the Basic Research Business Fees of Central Colleges under Grant CNS 20826041B4252 , in part by the National Natural Science Foundation (NSFC) under Grant CNS 61572115 , and in part by the Science and Technology Project of State Grid Corporation of China under Grant CNS 522722180007 . Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not reflect the views of the funding agencies.
Languageen
PublisherElsevier B.V.
SubjectDeep learning
IoT software vulnerability location
Software patching
Static taint analysis
TitleA deep learning based static taint analysis approach for IoT software vulnerability location
TypeArticle
Volume Number152
dc.accessType Abstract Only


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record