首页 | 本学科首页   官方微博 | 高级检索  
     

基于图神经网络的代码漏洞检测方法
引用本文:陈皓,易平. 基于图神经网络的代码漏洞检测方法[J]. 网络与信息安全学报, 2021, 7(3): 37-45. DOI: 10.11959/j.issn.2096-109x.2021039
作者姓名:陈皓  易平
作者单位:上海交通大学网络空间安全学院,上海 200240
基金项目:国家重点研发计划(2019YFB1405000);国家重点研发计划(2017YFB0802900)
摘    要:使用神经网络进行漏洞检测的方案大多基于传统自然语言处理的思路,将源代码当作序列样本处理,忽视了代码中所具有的结构性特征,从而遗漏了可能存在的漏洞.提出了一种基于图神经网络的代码漏洞检测方法,通过中间语言的控制流图特征,实现了函数级别的智能化代码漏洞检测.首先,将源代码编译为中间表示,进而提取其包含结构信息的控制流图,同...

关 键 词:漏洞检测  图神经网络  控制流图  中间表示

Code vulnerability detection method based on graph neural network
Hao CHEN,Ping YI. Code vulnerability detection method based on graph neural network[J]. Chinese Journal of Network and Information Security, 2021, 7(3): 37-45. DOI: 10.11959/j.issn.2096-109x.2021039
Authors:Hao CHEN  Ping YI
Affiliation:School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
Abstract:The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.
Keywords:vulnerability detection  graph neural network  control flow graph  intermediate representation  
本文献已被 维普 等数据库收录!
点击此处可从《网络与信息安全学报》浏览原始摘要信息
点击此处可从《网络与信息安全学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号