DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
@article{Le2021DeepCVAAC, title={DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning}, author={Triet Huynh Minh Le and David Hin and Roland Croft and Muhammad Ali Babar}, journal={2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE)}, year={2021}, pages={717-729} }
It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there is a lack of effort to assess vulnerability-contributing commits right after they are detected to provide timely information about the exploitability, impact and severity of SVs. Such information is important to plan and prioritize the mitigation for the identified SVs. We propose a novel Deep multi-task learning model, DeepCVA, to…
8 Citations
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
- Computer Science2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)
- 2022
This work investigates ML models for automating function-level SV assessment tasks, i.e., predicting seven Common Vulnerability Scoring System (CVSS) metrics and studies the value and use of vulnerable statements as inputs for developing the assessment models because SVs in functions are originated in these statements.
A Survey on Data-driven Software Vulnerability Assessment and Prioritization
- Computer ScienceACM Comput. Surv.
- 2023
A survey provides a taxonomy of the past research efforts and highlights the best practices for data-driven SV assessment and prioritization and discusses the current limitations and propose potential solutions to address such issues.
VulCurator: a vulnerability-fixing commit detector
- Computer ScienceESEC/SIGSOFT FSE
- 2022
VulCurator is a tool that leverages deep learning on richer sources of information, including commit messages, code changes and issue reports for vulnerability-fixing commit classification, and experimental results show that VulCurator outperforms the state-of-the-art baselines up to 16.1% in terms of F1-score.
Noisy Label Learning for Security Defects
- Computer Science2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)
- 2022
A two-stage learning method based on noise cleaning to identify and remediate the noisy samples, which improves AUC and recall of baselines by up to 8.9% and 23.4%, respectively and shows that learning from noisy labels can be effective for data-driven software and security analytics.
HERMES: Using Commit-Issue Linking to Detect Vulnerability-Fixing Commits
- Computer ScienceSANER
- 2022
This work proposes a machine learning approach to automatically identify vulnerability-fixing commits, which incorporates the rich source of information from issue trackers and uses a commit-issue link recovery technique to infer the potential missing link.
An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources
- Computer Science, Psychology2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
- 2022
This study investigates severity ranking inconsistencies over the SV reporting lifecycle and identifies six potential attributes that are correlated to this misjudgment, and shows that inconsistency in severity reporting schemes can severely degrade the performance of downstream severity prediction by up to 77%.
Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task Learning
- Computer ScienceArXiv
- 2022
This paper proposes a method called Nimbus for function signature recovery that furthest reduces the whole-process resource consumption without performance loss, and utilizes selective inputs and introduces multi-task learning (MTL) structure for function signatures recovery to reduce computational resource consumption, and fully leverage mutual information.
Automated Security Assessment for the Internet of Things
- Computer Science2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC)
- 2021
An automated security assessment framework for IoT networks that leverages machine learning and natural language processing to analyze vulnerability descriptions for predicting vulnerability metrics and identifying the most vulnerable attack paths within an IoT network is proposed.
References
SHOWING 1-10 OF 90 REFERENCES
Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning
- Computer Science2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS)
- 2019
A multi-task machine learning approach for the joint prediction of multiple vulnerability characteristics based on the vulnerability descriptions that gets rid of the requirement of balanced data, and it relies on neural networks that learn to extract features from training data.
Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description
- Computer Science2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)
- 2017
This paper proposes a deep learning approach to predict multi-class severity level of software vulnerability using only vulnerability description, and uses word embeddings and a one-layer shallow Convolutional Neural Network to automatically capture discriminative word and sentence features of vulnerability descriptions for predicting vulnerability severity.
A Comparative Study of Deep Learning-Based Vulnerability Detection System
- Computer ScienceIEEE Access
- 2019
This paper collects two datasets from the programs involving 126 types of vulnerabilities and conducts the first comparative study to quantitatively evaluate the impact of different factors on the effectiveness of vulnerability detection.
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery
- Computer ScienceIEEE Transactions on Industrial Informatics
- 2018
Compared with the traditional code metrics, the transfer-learned representations are more effective for predicting vulnerable functions, both within a project and across multiple projects.
Large-Scale Empirical Studies on Effort-Aware Security Vulnerability Prediction Methods
- Computer ScienceIEEE Transactions on Reliability
- 2020
Empirical results show that two unsupervised methods [i.e., lines of code (LOC) and Halstead's volume (HV)] and four recently proposed state-of-the-art supervised methods can achieve better performance than the other methods in terms of effort-aware performance measures.
A Survey on Data-driven Software Vulnerability Assessment and Prioritization
- Computer ScienceACM Computing Surveys
- 2022
A survey provides a taxonomy of the past research efforts and highlights the best practices for data-driven SV assessment and prioritization and discusses the current limitations and propose potential solutions to address such issues.
Automated Software Vulnerability Assessment with Concept Drift
- Computer Science2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)
- 2019
The proposed systematic approach can effectively tackle the concept drift issue of the SVs' descriptions reported from 2000 to 2018 in NVD even without retraining the model and performs competitively compared to the existing word-only method.
VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes
- Computer ScienceGLOBECOM 2017 - 2017 IEEE Global Communications Conference
- 2017
A cost- aware vulnerability prediction model is focused on and a just-in-time change-level code review tool called VulDigger is presented to dig suspicious ones from a sea of code changes to assist as an early step of continuous security inspections.
DeepJIT: An End-to-End Deep Learning Framework for Just-in-Time Defect Prediction
- Computer Science2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)
- 2019
This paper proposes an end-to-end deep learning framework, named DeepJIT, that automatically extracts features from commit messages and code changes and use them to identify defects.
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data
- Computer ScienceIWSPA@CODASPY
- 2017
This study replicates key portions of the prior work, compares their approaches, and shows how selection of training and test data critically affect the estimated performance of predictive models.