Auto-Detection of Programming Code Vulnerabilities with Natural Language Processing

Auto-Detection of Programming Code Vulnerabilities with Natural Language Processing
Author: Yubai Zhang
Publisher:
Total Pages: 0
Release: 2021
Genre:
ISBN:

Security vulnerabilities in source code are traditionally detected manually by software developers because there are no effective auto-detection tools. Current vulnerability detection tools require great human effort, and the results have flaws in many ways. However, deep learning models could be a solution to this problem for the following reasons: 1. Deep learning models are relatively accurate for text classification and text summarization for source code. 2. After being deployed on the cloud servers, the efficiency of deep learning based auto-detection could be much higher than human effort. Therefore, we developed two Natural Language Processing (NLP) models: the first one is a text-classification model that takes source code as input and outputs the classification of the security vulnerability of the input. The second one is a text-to-text model that takes source code as input and outputs a completely machine-generated summary about the security vulnerability of the input. Our evaluation shows that both models get impressive results.

Digital Forensics and Cyber Crime

Digital Forensics and Cyber Crime
Author: Pavel Gladyshev
Publisher: Springer Nature
Total Pages: 392
Release: 2022-06-03
Genre: Computers
ISBN: 3031063651

This book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2021, held in Singapore in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 22 reviewed full papers were selected from 52 submissions and present digital forensic technologies and techniques for a variety of applications in criminal investigations, incident response and information security. The focus of ICDS2C 2021 was on various applications and digital evidence and forensics beyond traditional cybercrime investigations and litigation.

Machine Learning Based Cross-language Vulnerability Detection

Machine Learning Based Cross-language Vulnerability Detection
Author: Anki Chauhan
Publisher:
Total Pages:
Release: 2020
Genre: Computer networks
ISBN:

This thesis concerns the study of Machine Learning based methods for detecting vulnerable code. Various Neural Network models have been trained to detect specific vulnerabilities on a programming language dataset. This work, entails an approach not targeting specific vulnerabilities. We also leverage the commonality among programming languages like JAVA and C# by training the model on both languages and detecting vulnerabilities.

Information Security and Cryptology

Information Security and Cryptology
Author: Yu Yu
Publisher: Springer Nature
Total Pages: 554
Release: 2021-10-17
Genre: Computers
ISBN: 303088323X

This book constitutes the post-conference proceedings of the 17th International Conference on Information Security and Cryptology, Inscrypt 2021, in August 2021. Due the COVID-19, the conference was held online The 28 full papers presented were carefully reviewed and selected from 81 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications.

Software Source Code

Software Source Code
Author: Raghavendra Rao Althar
Publisher: Walter de Gruyter GmbH & Co KG
Total Pages: 385
Release: 2021-07-19
Genre: Computers
ISBN: 311070353X

This book will focus on utilizing statistical modelling of the software source code, in order to resolve issues associated with the software development processes. Writing and maintaining software source code is a costly business; software developers need to constantly rely on large existing code bases. Statistical modelling identifies the patterns in software artifacts and utilize them for predicting the possible issues.

Intelligent Computing Theories and Application

Intelligent Computing Theories and Application
Author: De-Shuang Huang
Publisher: Springer
Total Pages: 802
Release: 2019-07-30
Genre: Computers
ISBN: 3030267636

This two-volume set of LNCS 11643 and LNCS 11644 constitutes - in conjunction with the volume LNAI 11645 - the refereed proceedings of the 15th International Conference on Intelligent Computing, ICIC 2019, held in Nanchang, China, in August 2019. The 217 full papers of the three proceedings volumes were carefully reviewed and selected from 609 submissions. The ICIC theme unifies the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. The theme for this conference is “Advanced Intelligent Computing Methodologies and Applications.” Papers related to this theme are especially solicited, including theories, methodologies, and applications in science and technology.

Proceedings of the 13th International Conference on Computer Engineering and Networks

Proceedings of the 13th International Conference on Computer Engineering and Networks
Author: Yonghong Zhang
Publisher: Springer Nature
Total Pages: 491
Release: 2024-01-03
Genre: Technology & Engineering
ISBN: 9819992478

This book aims to examine innovation in the fields of computer engineering and networking. The text covers important developments in areas such as artificial intelligence, machine learning, information analysis, communication system, computer modeling, internet of things. This book presents papers from the 13th International Conference on Computer Engineering and Networks (CENet2023) held in Wuxi, China on November 3-5, 2023.

Deep Learning for Security-oriented Program Analysis

Deep Learning for Security-oriented Program Analysis
Author: Zhilong Wang
Publisher:
Total Pages: 0
Release: 2023
Genre:
ISBN:

Deep learning methods have revolutionized the field of Natural Language Processing and Computer Vision with their exceptional capabilities. This success has intrigued the attention of security researchers, to explore its potential for addressing security problems. Lately, many works tried to apply deep learning to security-centric program analysis tasks, like reverse engineering, code similarity detection, etc. However, given the complex structure and dependency relationships inside programs, the popular models in related research often only recognize superficial features from binary and even source code, falling short in capturing high-level semantics. In this thesis, we delve into the limitations of mainstream models (including RNN, CNN, and BERT) when applied to program analysis. This thesis explores the potential of deep learning in understanding and analyzing the high-level semantics of binary-only programs, when appropriate deep neural model architectures and features are selected. The thesis tackles three selected security challenges that require comprehension of a program's high-level semantics and attempts to address them using deep learning-based approaches. The first challenge pertains to algorithm inference in Reverse Engineering (RE). RE is a critical task performed by security professionals for various purposes. However, the complexity and laboriousness of ransomware, have posed significant challenges to experts in the field. In response, this study explores the feasibility of incorporating deep learning techniques to assist the ransomware RE. To tackle the specific challenges of encryption loop localization, our approach employs two learning strategies. Firstly, we identify and utilize code-obfuscation-resilient and encryption-algorithm-agnostic features, including $K$-complexity and operations that yield equiprobable outputs. Secondly, we carefully select a neural network architecture capable of extracting informative features. By validating the effectiveness of our approach in automatically recognizing encryption code during ransomware RE, this study proves the feasibility of the deep-learning-assisted semantic-level RE. The second delves into the identification of security-critical non-control variables in software protection. As control-flow protection methods get widely used, it is difficult for attackers to corrupt control-data to build attacks. Instead, data-oriented exploits, which modify non-control data for malicious goals, have been demonstrated to be possible and powerful. To defend against data-oriented exploits, the first fundamental step is to identify non-control, security-critical data. In this work, we investigate the application of deep learning to critical-data identification. This work provides an in-depth understanding about how to effectively learn data and control dependence features from the dynamic execution trace, and a detailed explanation about why many other baselines of applying deep learning would fail to solve this problem. The third focuses on silent buffer overflow detection in vulnerability discovery and analysis. A software vulnerability could be exploited without any visible symptoms. Although such silent program executions could cause very serious damage, analyzing silent yet harmful executions is still an open problem when no source code is available. In this work, we propose a graph neural network assisted data flow analysis method for spotting silent buffer overflows in execution traces. The new method combines a novel graph structure (denoted DFG+) beyond data-flow graphs, and a modified Relational Graph Convolutional Network as the GNN model to be trained. The evaluation results show that a well-trained model can be used to analyze vulnerabilities in execution traces (of previously-unseen programs) without support of any source code.

Formal Methods and Software Engineering

Formal Methods and Software Engineering
Author: Yi Li
Publisher: Springer Nature
Total Pages: 320
Release: 2023-11-09
Genre: Computers
ISBN: 9819975840

This book constitutes the proceedings of the 24th International Conference on Formal Methods and Software Engineering, ICFEM 2023, held in Brisbane, QLD, Australia, during November 21–24, 2023. The 13 full papers presented together with 8 doctoral symposium papers in this volume were carefully reviewed and selected from 34 submissions, the volume also contains one invited paper. The conference focuses on applying formal methods to practical applications and presents papers for research in all areas related to formal engineering methods.

Embedded Computer Systems: Architectures, Modeling, and Simulation

Embedded Computer Systems: Architectures, Modeling, and Simulation
Author: Cristina Silvano
Publisher: Springer Nature
Total Pages: 504
Release: 2023-12-08
Genre: Computers
ISBN: 3031460774

This book constitutes the proceedings of the 22st International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, SAMOS 2021, which took place in July 2022 in Samos, Greece. The 11 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 45 submissions. The conference covers a wide range of embedded systems design aspects, including machine learning accelerators, and power management and programmable dataflow systems.