Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone
It is quite common for reusing code in soft development, which may lead to the wide spread of the vulnerability, soautomatic detection of vulnerable code clone is becoming more and more important. However, the existing solutions eithercannot automatically extract the characteristics of the vulnerabl...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2020-06-01
|
Series: | EAI Endorsed Transactions on Security and Safety |
Subjects: | |
Online Access: | https://eudl.eu/pdf/10.4108/eai.13-7-2018.165275 |
id |
doaj-59a9bbebda4f4f37afd647081db41536 |
---|---|
record_format |
Article |
spelling |
doaj-59a9bbebda4f4f37afd647081db415362020-11-25T03:09:32ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Security and Safety2032-93932020-06-0172310.4108/eai.13-7-2018.165275Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code CloneYuan He0Wenjie Wang1Hongyu Sun2Yuqing Zhang3National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, ChinaSchool of mathematics and computer science, Dali University, Dali, ChinaNational Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, ChinaSchool of Cyber Engineering, Xidian University, Xi’an, ChinaNational Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, ChinaIt is quite common for reusing code in soft development, which may lead to the wide spread of the vulnerability, soautomatic detection of vulnerable code clone is becoming more and more important. However, the existing solutions eithercannot automatically extract the characteristics of the vulnerable codes or cannot select different algorithms according todifferent codes, which results in low detection accuracy. In this paper, we consider the identification of vulnerable codeclone as a code recognition task and propose a method named Vul-Mirror based on a few-shot learning model fordiscovering clone vulnerable codes. It can not only automatically extract features of vulnerabilities, but also use thenetwork to measure similarity. The results of experiments on open-source projects of five operating systems show that theaccuracy of Vul-Mirror is 95.7%, and its performance is better than the state-of-the-art methods.https://eudl.eu/pdf/10.4108/eai.13-7-2018.165275vulnerabilityfew-shot learningcode clonedistance-metric |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yuan He Wenjie Wang Hongyu Sun Yuqing Zhang |
spellingShingle |
Yuan He Wenjie Wang Hongyu Sun Yuqing Zhang Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone EAI Endorsed Transactions on Security and Safety vulnerability few-shot learning code clone distance-metric |
author_facet |
Yuan He Wenjie Wang Hongyu Sun Yuqing Zhang |
author_sort |
Yuan He |
title |
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone |
title_short |
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone |
title_full |
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone |
title_fullStr |
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone |
title_full_unstemmed |
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone |
title_sort |
vul-mirror: a few-shot learning method for discovering vulnerable code clone |
publisher |
European Alliance for Innovation (EAI) |
series |
EAI Endorsed Transactions on Security and Safety |
issn |
2032-9393 |
publishDate |
2020-06-01 |
description |
It is quite common for reusing code in soft development, which may lead to the wide spread of the vulnerability, soautomatic detection of vulnerable code clone is becoming more and more important. However, the existing solutions eithercannot automatically extract the characteristics of the vulnerable codes or cannot select different algorithms according todifferent codes, which results in low detection accuracy. In this paper, we consider the identification of vulnerable codeclone as a code recognition task and propose a method named Vul-Mirror based on a few-shot learning model fordiscovering clone vulnerable codes. It can not only automatically extract features of vulnerabilities, but also use thenetwork to measure similarity. The results of experiments on open-source projects of five operating systems show that theaccuracy of Vul-Mirror is 95.7%, and its performance is better than the state-of-the-art methods. |
topic |
vulnerability few-shot learning code clone distance-metric |
url |
https://eudl.eu/pdf/10.4108/eai.13-7-2018.165275 |
work_keys_str_mv |
AT yuanhe vulmirrorafewshotlearningmethodfordiscoveringvulnerablecodeclone AT wenjiewang vulmirrorafewshotlearningmethodfordiscoveringvulnerablecodeclone AT hongyusun vulmirrorafewshotlearningmethodfordiscoveringvulnerablecodeclone AT yuqingzhang vulmirrorafewshotlearningmethodfordiscoveringvulnerablecodeclone |
_version_ |
1724662087736623104 |