Abstract
AbstractSoftware vulnerabilities pose a significant threat to system security, necessitating effective automatic detection methods. Current techniques face challenges such as dependency issues, language bias, and coarse detection granularity. This study presents a novel deep learning-based vulnerability detection system for Java code. Leveraging hybrid feature extraction through graph and sequence-based techniques enhances semantic and syntactic understanding. The system utilizes control flow graphs (CFG), abstract syntax trees (AST), program dependencies (PD), and greedy longest-match first vectorization for graph representation. A hybrid neural network (GCN-RFEMLP) and the pre-trained CodeBERT model extract features, feeding them into a quantum convolutional neural network with self-attentive pooling. The system addresses issues like long-term information dependency and coarse detection granularity, employing intermediate code representation and inter-procedural slice code. To mitigate language bias, a benchmark software assurance reference dataset is employed. Evaluations demonstrate the system's superiority, achieving 99.2% accuracy in detecting vulnerabilities, outperforming benchmark methods. The proposed approach comprehensively addresses vulnerabilities, including improper input validation, missing authorizations, buffer overflow, cross-site scripting, and SQL injection attacks listed by common weakness enumeration (CWE).
Funder
The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding Program grant code
Publisher
Springer Science and Business Media LLC
Reference133 articles.
1. CVSS Security Distribution Over Time. (2023) https://nvd.nist.gov/general/visualizations/vulnerability-visualizations/cvss-severity-distribution-over-time.
2. Tassey, G. The Economic Impact of Inadequate Infrastructure for Software Testing (RTI Health, Social, and Economics Research, 2002).
3. Zhivich, M. & Cunningham, R. K. The real cost of software errors. IEEE Secur. Priv. 7(2), 87–90 (2009).
4. Starsbug, J. & Bunge, J. Loss swamps trading firm. Wall Street J 8(2). 1–15 (2012).
5. Geppert, L. Lost radio contact leaves pilots on their own. IEEE Spectrum 41(11), 16–17 (2004).