Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Recognition method for detecting software vulnerability with weight deviation based on graph neural network

A software vulnerability and neural network technology, applied in the direction of instruments, electrical digital data processing, platform integrity maintenance, etc.

Pending Publication Date: 2021-09-10
DALIAN MARITIME UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, defective samples often account for a minority of all codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recognition method for detecting software vulnerability with weight deviation based on graph neural network
  • Recognition method for detecting software vulnerability with weight deviation based on graph neural network
  • Recognition method for detecting software vulnerability with weight deviation based on graph neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the technical solutions and advantages of the present invention more clear, the technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the drawings in the embodiments of the present invention:

[0028] Such as figure 1 A method for identifying software vulnerabilities with weight bias based on a graph neural network is shown, which specifically includes the following steps:

[0029] Step 1: Graph Embedding Model

[0030] The words and symbols in the source code are regarded as a node, and the source code composition graph representation G={V,E} is used as the input of GGNN. V represents a point set, and E represents an edge set. First, you need to obtain the initial eigenvalues ​​of each node, and you also need to obtain the initial characteristics of the connected edges of each graph. For the initial feature of the edge, the graph embedding model uses the NL Graph Embedding meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a recognition method for detecting software vulnerability with weight deviation based on a graph neural network. The method comprises the following steps: regarding words and symbols in a source code as a node, representing the source code by adopting a constituent graph, and acquiring an initial characteristic value of each node and an initial characteristic of a connected edge of each graph; taking the generated composition graph as input, finally combining the information output by the reset gate, the information output by the update gate and the information of the own node, and outputting a node activation value through a Sigmoid activation function as a node state at a final moment; after the word nodes are fully updated, aggregating the words to the graphic-level representation of the function codes, and generating a final vulnerability recognition result based on the representation; and minimizing the loss value of the defective software vulnerability by using a-Dice coefficient so as to identify the software vulnerability.

Description

technical field [0001] The invention relates to the technical field of software monitoring, in particular to a method for identifying software vulnerabilities with weight deviations based on a graph neural network. Background technique [0002] Software vulnerability detection is one of the main means to check and discover security vulnerabilities in software systems. Audit the code in the software by using various tools, or analyze the execution process of the software to find software design errors, coding defects, and operational failures. Early vulnerability detection technologies are divided into static analysis methods and dynamic analysis methods according to whether they depend on program operation. With the development of machine learning, researchers have begun to try to predict code vulnerabilities by combining traditional techniques with machine learning. Among them, the static analysis method is generally applied to the development and coding stage of software...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577Y02D10/00
Inventor 李辉曲阳刘慧江汪海博赵娇茹刘勇郭世凯陈荣
Owner DALIAN MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products