ABSTRACT
This paper 1 addresses a problem of vulnerability detection in software represented as assembly code. An extended approach to the vulnerability detection problem is proposed. This work concentrates on improvement of neural network-based approach described in previous works of authors. The authors propose to include the morphology of instructions in vector representations. The bidirectional recurrent neural network is used with access to the execution traces of the program. This has significantly improved the vulnerability detecting accuracy.
- NIPS Workshop: Deep Learning for Speech Recognition and Related Applications, Whistler, BC, Canada, Dec. 2009 (Organizers: Li Deng, Geoff Hinton, D. Yu).Google Scholar
- Deng, L.; Hinton, G.; Kingsbury, B. (2013). "New types of deep neural network learning for speech recognition and related applications: An overview (ICASSP)" (PDF).Google Scholar
- Yu, D.; Deng, L. (2014). "Automatic Speech Recognition: A Deep Learning Approach (Publisher: Springer)". ISBN 978-1-4471-5779-3. Patricia S. Abril and Robert Plant. 2007. The patent holder's dilemma: Buy, sell, or troll? Commun. ACM 50, 1 (Jan. 2007), 36--44. Google ScholarDigital Library
- Hannun, Awni; Case, Carl; Casper, Jared; Catanzaro, Bryan; Diamos, Greg; Elsen, Erich; Prenger, Ryan; Satheesh, Sanjeev; Sengupta, Shubho; Coates, Adam; Ng, Andrew Y (2014). "Deep Speech: Scaling up end-to-end speech recognition". arXiv:1412.5567 Freely accessible {cs.CL}.Google Scholar
- "Using Deep Learning Neural Networks To Find Best Performing Audience Segments" (PDF). IJSTR. 5 (4).Google Scholar
- De, Shaunak; Maity, Abhishek; Goel, Vritti; Shitole, Sanjay; Bhattacharya, Avik (2017). "Predicting the popularity of instagram posts for a lifestyle magazine using deep learning". 2nd IEEE Conference on Communication Systems, Computing and IT Applications: 174--177. ISBN 978-1-5090-4381-1.Google Scholar
- Waseem Rawat and Zenghui Wang. 2017. "Deep convolutional neural networks for image classification: A comprehensive review". Neural Comput. 29, 9 (September 2017), 2352--2449. Google ScholarDigital Library
- Shen, Yelong; He, Xiaodong; Gao, Jianfeng; Deng, Li; Mesnil, Gregoire (2014-11-01). "A Latent Semantic Model with Convolutional-Pooling Structure for Information Retrieval". Microsoft Research. Google ScholarDigital Library
- Huang, Po-Sen; He, Xiaodong; Gao, Jianfeng; Deng, Li; Acero, Alex; Heck, Larry (2013-10-01). "Learning Deep Structured Semantic Models for Web Search using Clickthrough Data". Microsoft Research Google ScholarDigital Library
- Sutskever, L.; Vinyals, O.; Le, Q. (2014). "Sequence to Sequence Learning with Neural Networks" (PDF). Proc. NIPS. https://papers.nips.cc/paper/5346-sequence-to-sequence-learning-with-neural-networks.pdf Google ScholarDigital Library
- Gao, Jianfeng; He, Xiaodong; Yih, Scott Wen-tau; Deng, Li (2014-06-01). "Learning Continuous Phrase Representations for Translation Modeling". Microsoft ResearchGoogle Scholar
- Brocardo ML, Traore I, Woungang I, Obaidat MS. "Authorship verification using deep belief network systems". Int J Commun Syst. 2017.Google ScholarCross Ref
- R. Socher, J. Pennington, E. H. Huang, A. Y. Ng, and C. D. Manning. 2011b. Semi-Supervised Recursive Autoencoders for Predicting Sentiment Distributions. In EMNLP. Google ScholarDigital Library
- Socher, Richard (2013). "Recursive Deep Models for Semantic Compositionality Over a Sentiment Treebank" (PDF).Google Scholar
- R. Demidov, A. Pechenkin, "Vector representation of machine instructions for vulnerability assessment of digital infrastructure components", 2018 IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, pp. 835--840.Google Scholar
- K. Fukushima, S. Miyake, and T. Ito, "Neocognitron: A neural network model for a mechanism of visual pattern recognition," in IEEE Transactions on Systems, Man, and Cybernetics, vol. SMC-13, no. 5, pp. 826--834, Sept.-Oct. 1983Google ScholarCross Ref
- Y. LeCun et al., "Backpropagation Applied to Handwritten Zip Code Recognition," in Neural Computation, vol. 1, no. 4, pp. 541--551, Dec. 1989, Google ScholarDigital Library
- DE Rumelhart, GE Hinton, RJ Williams, "Learning representations by back-propagating errors", Nature 323, 533--536Google ScholarCross Ref
- G.E. Hinton, et al., "A Fast Learning Algorithm for Deep Belief Nets", Neural Computation 18, 1527--1554, 2006 Google ScholarDigital Library
- David E. Rumelhart, Geoffrey E. Hinton, and Ronald J. Williams. 1988. Neurocomputing: Foundations of research. chapter Learning Representations by Backpropagating Errors, pages 696--699. MIT Press Google ScholarDigital Library
- Léon Bottou. "From machine learning to machine reasoning." Mach. Learn. 94, 2 (February 2014), 133--149., 2014 Google ScholarDigital Library
- Scott Deerwester, Susan T. Dumais, George W. Furnas, Thomas K. Landauer, and Richard Harshman. 1990. Indexing by latent semantic analysis. Journal of the American Society for Information Science, 41(6):391--407.Google Scholar
- Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Distributed representations of words and phrases and their compositionality. In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'13), C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger (Eds.), Vol. 2. Curran Associates Inc., USA, 3111--3119 Google ScholarDigital Library
- Learning Unified Features from Natural and Programming Languages for Locating Buggy Source Code, Xuan Huo, Ming Li, and Zhi-Hua Zhou., In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI'16), Gerhard Brewka (Ed.). AAAI Press 1606--1612. 2016 Google ScholarDigital Library
- Deep Learning to Find Bugs. Michael Pradel and Koushik Sen. Technical Report TUD-CS-2017-0295. TU Darmstadt, Department of Computer Science.Google Scholar
- Schuster, Mike, and Kuldip K. Paliwal. "Bidirectional recurrent neural networks." Signal Processing, IEEE Transactions on 45.11 (1997): 2673--2681.2 Google ScholarDigital Library
- Young Jun Lee, Sang-Hoon Choi, Chulwoo Kim, Seung-Ho Lim, Ki-Woong Park. "Learning Binary Code with Deep Learning to Detect Software Weakness", KSII The 9th International Conference on Internet (ICONI) 2017 SymposiumGoogle Scholar
Index Terms
- Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection
Recommendations
Commit-Level, Neural Vulnerability Detection and Assessment
ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringSoftware Vulnerabilities (SVs) are security flaws that are exploitable in cyber-attacks. Delay in the detection and assessment of SVs might cause serious consequences due to the unknown impacts on the attacked systems. The state-of-the-art approaches ...
Activation functions in deep learning: A comprehensive survey and benchmark
AbstractNeural networks have shown tremendous growth in recent years to solve numerous problems. Various types of neural networks have been introduced to deal with different types of problems. However, the main goal of any neural network is to ...
Multiclass Classification of Software Vulnerabilities with Deep Learning
ICMLC '23: Proceedings of the 2023 15th International Conference on Machine Learning and ComputingDetecting software vulnerabilities has been a challenge for decades. Many techniques have been developed to detect vulnerabilities by reporting whether a vulnerability exists in the code of software. But few of them have the capability to categorize the ...
Comments