On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

03/16/2022
by   Triet H. M. Le, et al.
0

Many studies have developed Machine Learning (ML) approaches to detect Software Vulnerabilities (SVs) in functions and fine-grained code statements that cause such SVs. However, there is little work on leveraging such detection outputs for data-driven SV assessment to give information about exploitability, impact, and severity of SVs. The information is important to understand SVs and prioritize their fixing. Using large-scale data from 1,782 functions of 429 SVs in 200 real-world projects, we investigate ML models for automating function-level SV assessment tasks, i.e., predicting seven Common Vulnerability Scoring System (CVSS) metrics. We particularly study the value and use of vulnerable statements as inputs for developing the assessment models because SVs in functions are originated in these statements. We show that vulnerable statements are 5.8 times smaller in size, yet exhibit 7.5-114.5 assessment performance (Matthews Correlation Coefficient (MCC)) than non-vulnerable statements. Incorporating context of vulnerable statements further increases the performance by up to 8.9 Overall, we provide the initial yet promising ML-based baselines for function-level SV assessment, paving the way for further research in this direction.

READ FULL TEXT

page 8

page 9

research
06/19/2021

Vulnerability Detection with Fine-grained Interpretations

Despite the successes of machine learning (ML) and deep learning (DL) ba...
research
08/18/2021

DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning

It is increasingly suggested to identify Software Vulnerabilities (SVs) ...
research
12/20/2021

VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements

Automatically locating vulnerable statements in source code is crucial t...
research
07/04/2022

Meetings and Mood – Related or Not? Insights from Student Software Projects

Background: Teamwork, coordination, and communication are a prerequisite...
research
09/20/2022

An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability

Software vulnerabilities existing in a program or function of computer s...
research
01/07/2022

Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach

This paper presents an approach for identification of vulnerable IoT app...
research
11/02/2021

AI Ethics Statements – Analysis and lessons learnt from NeurIPS Broader Impact Statements

Ethics statements have been proposed as a mechanism to increase transpar...

Please sign up or login with your details

Forgot password? Click here to reset