Journal on Communications ›› 2023, Vol. 44 ›› Issue (1): 103-117.doi: 10.11959/j.issn.1000-436x.2023018

• Papers • Previous Articles     Next Articles

Feature dependence graph based source code loophole detection method

Hongyu YANG1,2, Haiyun YANG2, Liang ZHANG3, Xiang CHENG4,5   

  1. 1 School of Safety Science and Engineering, Civil Aviation University of China, Tianjin 300300, China
    2 School of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China
    3 School of Information, University of Arizona, Tucson AZ85721, USA
    4 School of Information Engineering, Yangzhou University, Yangzhou 225127, China
    5 Jiangsu Engineering Research Center for Knowledge Management and Intelligent Service, Yangzhou 225127, China
  • Revised:2022-12-03 Online:2023-01-25 Published:2023-01-01
  • Supported by:
    The National Natural Science Foundation of China(U1833107)

Abstract:

Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.

Key words: source code, loophole detection, semantic information, dependence graph, neural network

CLC Number: 

No Suggested Reading articles found!