Function-level software vulnerability detection method
A software vulnerability and detection method technology, applied in neural learning methods, electrical digital data processing, biological neural network models, etc., can solve problems such as lack of generalization ability, and achieve the effect of saving manpower and material resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0020] A function-level software vulnerability detection method, such as figure 1 As shown, it is a flow chart of the vulnerability detection method of Embodiment 1. This embodiment includes the following steps: A) Import training code, the vulnerability of the training code is known; B) Obtain the abstract semantic tree of the training code, and extract the elements of the abstract semantic tree one by one Form a one-dimensional vector, called the initial feature vector; C) unify the function names and variable names contained in the initial feature vector; D) intercept the first N elements of the feature vector processed in step B as the original feature; E) Input the original features into the trained bidirectional cyclic neural network (Bi-LSTM) to obtain the feature expression; F) use the feature expression and the known vulnerabilities of the training code as training data to train the neural network model; G) use the software code to be detected Obtain the feature expre...
Embodiment 2
[0026] A function-level software vulnerability detection method. This embodiment specifically improves the training method of the bidirectional cyclic neural network (Bi-LSTM). In this embodiment, the training method of the bidirectional cyclic neural network (Bi-LSTM) is: E1 ) Obtain the software source code and security vulnerability information of known security vulnerability information; E2) Extract the code segment corresponding to each security vulnerability; E3) Manually write several extended codes with the same security vulnerabilities as the several code segments obtained in step E2 Segment, the several code segments obtained in step E2 and their extended code segments written by humans with the same security vulnerability, respectively obtain their original features according to steps B-D; E4) use the code segment to mark the original code segment and its extended code segment Features as training sample data; E5) Use the training sample data obtained in step E4 to t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com