Vulnerable Function

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 32268 Experts worldwide ranked by ideXlab platform

Jun Zhang - One of the best experts on this subject based on the ideXlab platform.

  • ICICS - Deep Learning-Based Vulnerable Function Detection: A Benchmark
    Information and Communications Security, 2020
    Co-Authors: Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
    Abstract:

    The application of Deep Learning (DL) technique for code analysis enables the rich and latent patterns within software code to be revealed, facilitating various downstream tasks such as the software defect and vulnerability detection. Many DL architectures have been applied for identifying Vulnerable code segments in recent literature. However, the proposed studies were evaluated on self-constructed/-collected datasets. There is a lack of unified performance criteria, acting as a baseline for measuring the effectiveness of the proposed DL-based approaches. This paper proposes a benchmarking framework for building and testing DL-based vulnerability detectors, providing six built-in mainstream neural network models with three embedding solutions available for selection. The framework also offers easy-to-use APIs for integration of new network models and embedding methods. In addition, we constructed a real-world vulnerability ground truth dataset containing manually labelled 1,471 Vulnerable Functions and 1,320 Vulnerable files from nine open-source software projects. With the proposed framework and the ground truth dataset, researchers can conveniently establish a vulnerability detection baseline system for comparison and evaluation. This paper also includes usage examples of the proposed framework, aiming to investigate the performance behaviours of mainstream neural network models and providing a reference for DL-based vulnerability detection at Function-level.

  • deep learning based Vulnerable Function detection a benchmark
    International Conference on Information and Communication Security, 2019
    Co-Authors: Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
    Abstract:

    The application of Deep Learning (DL) technique for code analysis enables the rich and latent patterns within software code to be revealed, facilitating various downstream tasks such as the software defect and vulnerability detection. Many DL architectures have been applied for identifying Vulnerable code segments in recent literature. However, the proposed studies were evaluated on self-constructed/-collected datasets. There is a lack of unified performance criteria, acting as a baseline for measuring the effectiveness of the proposed DL-based approaches. This paper proposes a benchmarking framework for building and testing DL-based vulnerability detectors, providing six built-in mainstream neural network models with three embedding solutions available for selection. The framework also offers easy-to-use APIs for integration of new network models and embedding methods. In addition, we constructed a real-world vulnerability ground truth dataset containing manually labelled 1,471 Vulnerable Functions and 1,320 Vulnerable files from nine open-source software projects. With the proposed framework and the ground truth dataset, researchers can conveniently establish a vulnerability detection baseline system for comparison and evaluation. This paper also includes usage examples of the proposed framework, aiming to investigate the performance behaviours of mainstream neural network models and providing a reference for DL-based vulnerability detection at Function-level.

  • Cross-Project Transfer Representation Learning for Vulnerable Function Discovery
    IEEE Transactions on Industrial Informatics, 2018
    Co-Authors: Jun Zhang, Yang Xiang, Paul Montague
    Abstract:

    Machine learning is now widely used to detect security vulnerabilities in the software, even before the software is released. But its potential is often severely compromised at the early stage of a software project when we face a shortage of high-quality training data and have to rely on overly generic hand-crafted features. This paper addresses this cold-start problem of machine learning, by learning rich features that generalize across similar projects. To reach an optimal balance between feature-richness and generalizability, we devise a data-driven method including the following innovative ideas. First, the code semantics are revealed through serialized abstract syntax trees (ASTs), with tokens encoded by Continuous Bag-of-Words neural embeddings. Next, the serialized ASTs are fed to a sequential deep learning classifier (Bi-LSTM) to obtain a representation indicative of software vulnerability. Finally, the neural representation obtained from existing software projects is then transferred to the new project to enable early vulnerability detection even with a small set of training labels. To validate this vulnerability detection approach, we manually labeled 457 Vulnerable Functions and collected 30 000+ nonVulnerable Functions from six open-source projects. The empirical results confirmed that the trained model is capable of generating representations that are indicative of program vulnerability and is adaptable across multiple projects. Compared with the traditional code metrics, our transfer-learned representations are more effective for predicting Vulnerable Functions, both within a project and across multiple projects.

Yang Xiang - One of the best experts on this subject based on the ideXlab platform.

  • ICICS - Deep Learning-Based Vulnerable Function Detection: A Benchmark
    Information and Communications Security, 2020
    Co-Authors: Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
    Abstract:

    The application of Deep Learning (DL) technique for code analysis enables the rich and latent patterns within software code to be revealed, facilitating various downstream tasks such as the software defect and vulnerability detection. Many DL architectures have been applied for identifying Vulnerable code segments in recent literature. However, the proposed studies were evaluated on self-constructed/-collected datasets. There is a lack of unified performance criteria, acting as a baseline for measuring the effectiveness of the proposed DL-based approaches. This paper proposes a benchmarking framework for building and testing DL-based vulnerability detectors, providing six built-in mainstream neural network models with three embedding solutions available for selection. The framework also offers easy-to-use APIs for integration of new network models and embedding methods. In addition, we constructed a real-world vulnerability ground truth dataset containing manually labelled 1,471 Vulnerable Functions and 1,320 Vulnerable files from nine open-source software projects. With the proposed framework and the ground truth dataset, researchers can conveniently establish a vulnerability detection baseline system for comparison and evaluation. This paper also includes usage examples of the proposed framework, aiming to investigate the performance behaviours of mainstream neural network models and providing a reference for DL-based vulnerability detection at Function-level.

  • deep learning based Vulnerable Function detection a benchmark
    International Conference on Information and Communication Security, 2019
    Co-Authors: Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
    Abstract:

    The application of Deep Learning (DL) technique for code analysis enables the rich and latent patterns within software code to be revealed, facilitating various downstream tasks such as the software defect and vulnerability detection. Many DL architectures have been applied for identifying Vulnerable code segments in recent literature. However, the proposed studies were evaluated on self-constructed/-collected datasets. There is a lack of unified performance criteria, acting as a baseline for measuring the effectiveness of the proposed DL-based approaches. This paper proposes a benchmarking framework for building and testing DL-based vulnerability detectors, providing six built-in mainstream neural network models with three embedding solutions available for selection. The framework also offers easy-to-use APIs for integration of new network models and embedding methods. In addition, we constructed a real-world vulnerability ground truth dataset containing manually labelled 1,471 Vulnerable Functions and 1,320 Vulnerable files from nine open-source software projects. With the proposed framework and the ground truth dataset, researchers can conveniently establish a vulnerability detection baseline system for comparison and evaluation. This paper also includes usage examples of the proposed framework, aiming to investigate the performance behaviours of mainstream neural network models and providing a reference for DL-based vulnerability detection at Function-level.

  • Cross-Project Transfer Representation Learning for Vulnerable Function Discovery
    IEEE Transactions on Industrial Informatics, 2018
    Co-Authors: Jun Zhang, Yang Xiang, Paul Montague
    Abstract:

    Machine learning is now widely used to detect security vulnerabilities in the software, even before the software is released. But its potential is often severely compromised at the early stage of a software project when we face a shortage of high-quality training data and have to rely on overly generic hand-crafted features. This paper addresses this cold-start problem of machine learning, by learning rich features that generalize across similar projects. To reach an optimal balance between feature-richness and generalizability, we devise a data-driven method including the following innovative ideas. First, the code semantics are revealed through serialized abstract syntax trees (ASTs), with tokens encoded by Continuous Bag-of-Words neural embeddings. Next, the serialized ASTs are fed to a sequential deep learning classifier (Bi-LSTM) to obtain a representation indicative of software vulnerability. Finally, the neural representation obtained from existing software projects is then transferred to the new project to enable early vulnerability detection even with a small set of training labels. To validate this vulnerability detection approach, we manually labeled 457 Vulnerable Functions and collected 30 000+ nonVulnerable Functions from six open-source projects. The empirical results confirmed that the trained model is capable of generating representations that are indicative of program vulnerability and is adaptable across multiple projects. Compared with the traditional code metrics, our transfer-learned representations are more effective for predicting Vulnerable Functions, both within a project and across multiple projects.

Paul Montague - One of the best experts on this subject based on the ideXlab platform.

  • Cross-Project Transfer Representation Learning for Vulnerable Function Discovery
    IEEE Transactions on Industrial Informatics, 2018
    Co-Authors: Jun Zhang, Yang Xiang, Paul Montague
    Abstract:

    Machine learning is now widely used to detect security vulnerabilities in the software, even before the software is released. But its potential is often severely compromised at the early stage of a software project when we face a shortage of high-quality training data and have to rely on overly generic hand-crafted features. This paper addresses this cold-start problem of machine learning, by learning rich features that generalize across similar projects. To reach an optimal balance between feature-richness and generalizability, we devise a data-driven method including the following innovative ideas. First, the code semantics are revealed through serialized abstract syntax trees (ASTs), with tokens encoded by Continuous Bag-of-Words neural embeddings. Next, the serialized ASTs are fed to a sequential deep learning classifier (Bi-LSTM) to obtain a representation indicative of software vulnerability. Finally, the neural representation obtained from existing software projects is then transferred to the new project to enable early vulnerability detection even with a small set of training labels. To validate this vulnerability detection approach, we manually labeled 457 Vulnerable Functions and collected 30 000+ nonVulnerable Functions from six open-source projects. The empirical results confirmed that the trained model is capable of generating representations that are indicative of program vulnerability and is adaptable across multiple projects. Compared with the traditional code metrics, our transfer-learned representations are more effective for predicting Vulnerable Functions, both within a project and across multiple projects.

Guanjun Lin - One of the best experts on this subject based on the ideXlab platform.

  • ICICS - Deep Learning-Based Vulnerable Function Detection: A Benchmark
    Information and Communications Security, 2020
    Co-Authors: Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
    Abstract:

    The application of Deep Learning (DL) technique for code analysis enables the rich and latent patterns within software code to be revealed, facilitating various downstream tasks such as the software defect and vulnerability detection. Many DL architectures have been applied for identifying Vulnerable code segments in recent literature. However, the proposed studies were evaluated on self-constructed/-collected datasets. There is a lack of unified performance criteria, acting as a baseline for measuring the effectiveness of the proposed DL-based approaches. This paper proposes a benchmarking framework for building and testing DL-based vulnerability detectors, providing six built-in mainstream neural network models with three embedding solutions available for selection. The framework also offers easy-to-use APIs for integration of new network models and embedding methods. In addition, we constructed a real-world vulnerability ground truth dataset containing manually labelled 1,471 Vulnerable Functions and 1,320 Vulnerable files from nine open-source software projects. With the proposed framework and the ground truth dataset, researchers can conveniently establish a vulnerability detection baseline system for comparison and evaluation. This paper also includes usage examples of the proposed framework, aiming to investigate the performance behaviours of mainstream neural network models and providing a reference for DL-based vulnerability detection at Function-level.

  • deep learning based Vulnerable Function detection a benchmark
    International Conference on Information and Communication Security, 2019
    Co-Authors: Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
    Abstract:

    The application of Deep Learning (DL) technique for code analysis enables the rich and latent patterns within software code to be revealed, facilitating various downstream tasks such as the software defect and vulnerability detection. Many DL architectures have been applied for identifying Vulnerable code segments in recent literature. However, the proposed studies were evaluated on self-constructed/-collected datasets. There is a lack of unified performance criteria, acting as a baseline for measuring the effectiveness of the proposed DL-based approaches. This paper proposes a benchmarking framework for building and testing DL-based vulnerability detectors, providing six built-in mainstream neural network models with three embedding solutions available for selection. The framework also offers easy-to-use APIs for integration of new network models and embedding methods. In addition, we constructed a real-world vulnerability ground truth dataset containing manually labelled 1,471 Vulnerable Functions and 1,320 Vulnerable files from nine open-source software projects. With the proposed framework and the ground truth dataset, researchers can conveniently establish a vulnerability detection baseline system for comparison and evaluation. This paper also includes usage examples of the proposed framework, aiming to investigate the performance behaviours of mainstream neural network models and providing a reference for DL-based vulnerability detection at Function-level.

Wu Dong-ying - One of the best experts on this subject based on the ideXlab platform.

  • Design and implementation of model for positioning Vulnerable Function in buffer overflow
    Computer Engineering and Design, 2010
    Co-Authors: Wu Dong-ying
    Abstract:

    Attacks by vulnerability exploiting of buffer overflow is one of the major threats in current security field.Buffer overflow vulnerability analysis generally starts from the Vulnerable Function which triggers the overflow,while a lot of time and effort is often required to spend on the positioning of the Vulnerable Function,achieving the automatic positioning of this Function could shorten the response time significantly.In view of this situation,LVF,which is a model of positioning the Vulnerable Function in a buffer overflow automatically,is proposed and implemented based on Windows debugging framework.The operation mode of LVF is briefly introduced.Positioning method used LVF is discussed,and the framework design of LVF is presented.Finally,experiments are given,which verify that LVF can effectively achieve the automatic positioning of the Vulnerable Function in a buffer overflow.