skip to main content
10.1145/3264437.3264489acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection

Authors Info & Claims
Published:10 September 2018Publication History

ABSTRACT

This paper 1 addresses a problem of vulnerability detection in software represented as assembly code. An extended approach to the vulnerability detection problem is proposed. This work concentrates on improvement of neural network-based approach described in previous works of authors. The authors propose to include the morphology of instructions in vector representations. The bidirectional recurrent neural network is used with access to the execution traces of the program. This has significantly improved the vulnerability detecting accuracy.

References

  1. NIPS Workshop: Deep Learning for Speech Recognition and Related Applications, Whistler, BC, Canada, Dec. 2009 (Organizers: Li Deng, Geoff Hinton, D. Yu).Google ScholarGoogle Scholar
  2. Deng, L.; Hinton, G.; Kingsbury, B. (2013). "New types of deep neural network learning for speech recognition and related applications: An overview (ICASSP)" (PDF).Google ScholarGoogle Scholar
  3. Yu, D.; Deng, L. (2014). "Automatic Speech Recognition: A Deep Learning Approach (Publisher: Springer)". ISBN 978-1-4471-5779-3. Patricia S. Abril and Robert Plant. 2007. The patent holder's dilemma: Buy, sell, or troll? Commun. ACM 50, 1 (Jan. 2007), 36--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Hannun, Awni; Case, Carl; Casper, Jared; Catanzaro, Bryan; Diamos, Greg; Elsen, Erich; Prenger, Ryan; Satheesh, Sanjeev; Sengupta, Shubho; Coates, Adam; Ng, Andrew Y (2014). "Deep Speech: Scaling up end-to-end speech recognition". arXiv:1412.5567 Freely accessible {cs.CL}.Google ScholarGoogle Scholar
  5. "Using Deep Learning Neural Networks To Find Best Performing Audience Segments" (PDF). IJSTR. 5 (4).Google ScholarGoogle Scholar
  6. De, Shaunak; Maity, Abhishek; Goel, Vritti; Shitole, Sanjay; Bhattacharya, Avik (2017). "Predicting the popularity of instagram posts for a lifestyle magazine using deep learning". 2nd IEEE Conference on Communication Systems, Computing and IT Applications: 174--177. ISBN 978-1-5090-4381-1.Google ScholarGoogle Scholar
  7. Waseem Rawat and Zenghui Wang. 2017. "Deep convolutional neural networks for image classification: A comprehensive review". Neural Comput. 29, 9 (September 2017), 2352--2449. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Shen, Yelong; He, Xiaodong; Gao, Jianfeng; Deng, Li; Mesnil, Gregoire (2014-11-01). "A Latent Semantic Model with Convolutional-Pooling Structure for Information Retrieval". Microsoft Research. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Huang, Po-Sen; He, Xiaodong; Gao, Jianfeng; Deng, Li; Acero, Alex; Heck, Larry (2013-10-01). "Learning Deep Structured Semantic Models for Web Search using Clickthrough Data". Microsoft Research Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sutskever, L.; Vinyals, O.; Le, Q. (2014). "Sequence to Sequence Learning with Neural Networks" (PDF). Proc. NIPS. https://papers.nips.cc/paper/5346-sequence-to-sequence-learning-with-neural-networks.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gao, Jianfeng; He, Xiaodong; Yih, Scott Wen-tau; Deng, Li (2014-06-01). "Learning Continuous Phrase Representations for Translation Modeling". Microsoft ResearchGoogle ScholarGoogle Scholar
  12. Brocardo ML, Traore I, Woungang I, Obaidat MS. "Authorship verification using deep belief network systems". Int J Commun Syst. 2017.Google ScholarGoogle ScholarCross RefCross Ref
  13. R. Socher, J. Pennington, E. H. Huang, A. Y. Ng, and C. D. Manning. 2011b. Semi-Supervised Recursive Autoencoders for Predicting Sentiment Distributions. In EMNLP. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Socher, Richard (2013). "Recursive Deep Models for Semantic Compositionality Over a Sentiment Treebank" (PDF).Google ScholarGoogle Scholar
  15. R. Demidov, A. Pechenkin, "Vector representation of machine instructions for vulnerability assessment of digital infrastructure components", 2018 IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, pp. 835--840.Google ScholarGoogle Scholar
  16. K. Fukushima, S. Miyake, and T. Ito, "Neocognitron: A neural network model for a mechanism of visual pattern recognition," in IEEE Transactions on Systems, Man, and Cybernetics, vol. SMC-13, no. 5, pp. 826--834, Sept.-Oct. 1983Google ScholarGoogle ScholarCross RefCross Ref
  17. Y. LeCun et al., "Backpropagation Applied to Handwritten Zip Code Recognition," in Neural Computation, vol. 1, no. 4, pp. 541--551, Dec. 1989, Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. DE Rumelhart, GE Hinton, RJ Williams, "Learning representations by back-propagating errors", Nature 323, 533--536Google ScholarGoogle ScholarCross RefCross Ref
  19. G.E. Hinton, et al., "A Fast Learning Algorithm for Deep Belief Nets", Neural Computation 18, 1527--1554, 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. David E. Rumelhart, Geoffrey E. Hinton, and Ronald J. Williams. 1988. Neurocomputing: Foundations of research. chapter Learning Representations by Backpropagating Errors, pages 696--699. MIT Press Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Léon Bottou. "From machine learning to machine reasoning." Mach. Learn. 94, 2 (February 2014), 133--149., 2014 Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Scott Deerwester, Susan T. Dumais, George W. Furnas, Thomas K. Landauer, and Richard Harshman. 1990. Indexing by latent semantic analysis. Journal of the American Society for Information Science, 41(6):391--407.Google ScholarGoogle Scholar
  23. Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Distributed representations of words and phrases and their compositionality. In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'13), C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger (Eds.), Vol. 2. Curran Associates Inc., USA, 3111--3119 Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Learning Unified Features from Natural and Programming Languages for Locating Buggy Source Code, Xuan Huo, Ming Li, and Zhi-Hua Zhou., In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI'16), Gerhard Brewka (Ed.). AAAI Press 1606--1612. 2016 Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Deep Learning to Find Bugs. Michael Pradel and Koushik Sen. Technical Report TUD-CS-2017-0295. TU Darmstadt, Department of Computer Science.Google ScholarGoogle Scholar
  26. Schuster, Mike, and Kuldip K. Paliwal. "Bidirectional recurrent neural networks." Signal Processing, IEEE Transactions on 45.11 (1997): 2673--2681.2 Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Young Jun Lee, Sang-Hoon Choi, Chulwoo Kim, Seung-Ho Lim, Ki-Woong Park. "Learning Binary Code with Deep Learning to Detect Software Weakness", KSII The 9th International Conference on Internet (ICONI) 2017 SymposiumGoogle ScholarGoogle Scholar

Index Terms

  1. Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SIN '18: Proceedings of the 11th International Conference on Security of Information and Networks
      September 2018
      148 pages
      ISBN:9781450366083
      DOI:10.1145/3264437

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 September 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      SIN '18 Paper Acceptance Rate24of42submissions,57%Overall Acceptance Rate102of289submissions,35%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader