Matches in SemOpenAlex for { <https://semopenalex.org/work/W2173013550> ?p ?o ?g. }
- W2173013550 abstract "With our increasing reliance on the correct functioning of computer systems, identifyingand eliminating vulnerabilities in program code is gaining in importance. To date, thevast majority of these flaws are found by tedious manual auditing of code conductedby experienced security analysts. Unfortunately, a single missed flaw can suffice for anattacker to fully compromise a system, and thus, the sheer amount of code plays into theattacker’s cards. On the defender’s side, this creates a persistent demand for methodsthat assist in the discovery of vulnerabilities at scale.This thesis introduces pattern-based vulnerability discovery, a novel approach for identifying vulnerabilities which combines techniques from static analysis, machine learning,and graph mining to augment the analyst’s abilities rather than trying to replace her.The main idea of this approach is to leverage patterns in the code to narrow in on potential vulnerabilities, where these patterns may be formulated manually, derived fromthe security history, or inferred from the code directly. We base our approach on a novelarchitecture for robust analysis of source code that enables large amounts of code to bemined for vulnerabilities via traversals in a code property graph, a joint representationof a program’s syntax, control flow, and data flow. While useful to identify occurrencesof manually defined patterns in its own right, we proceed to show that the platformoffers a rich data source for automatically discovering and exposing patterns in code. Tothis end, we develop different vectorial representations of source code based on symbols,trees, and graphs, allowing it to be processed with machine learning algorithms. Ultimately, this enables us to devise three unique pattern-based techniques for vulnerabilitydiscovery, each of which address a different task encountered in day-to-day auditing byexploiting a different of the three main capabilities of unsupervised learning methods.In particular, we present a method to identify vulnerabilities similar to a known vulnerability, a method to uncover missing checks linked to security critical objects, andfinally, a method that closes the loop by automatically generating traversals for our codeanalysis platform to explicitly express and store vulnerable programming patterns. We empirically evaluate our methods on the source code of popular and widely-used opensource projects, both in controlled settings and in real world code audits. In controlledsettings, we find that all methods considerably reduce the amount of code that needsto be inspected. In real world audits, our methods allow us to expose many previouslyunknown and often critical vulnerabilities, including vulnerabilities in the VLC mediaplayer, the instant messenger Pidgin, and the Linux kernel." @default.
- W2173013550 created "2016-06-24" @default.
- W2173013550 creator A5089184320 @default.
- W2173013550 date "2015-11-10" @default.
- W2173013550 modified "2023-09-26" @default.
- W2173013550 title "Pattern-Based Vulnerability Discovery" @default.
- W2173013550 cites W127238549 @default.
- W2173013550 cites W133470593 @default.
- W2173013550 cites W1463623766 @default.
- W2173013550 cites W1492810482 @default.
- W2173013550 cites W1505465226 @default.
- W2173013550 cites W1507845365 @default.
- W2173013550 cites W1511682410 @default.
- W2173013550 cites W1512221544 @default.
- W2173013550 cites W152196245 @default.
- W2173013550 cites W1532325895 @default.
- W2173013550 cites W1543344803 @default.
- W2173013550 cites W1563577331 @default.
- W2173013550 cites W1574901103 @default.
- W2173013550 cites W1581009051 @default.
- W2173013550 cites W1601356550 @default.
- W2173013550 cites W1607167266 @default.
- W2173013550 cites W1625255723 @default.
- W2173013550 cites W1654253310 @default.
- W2173013550 cites W1663973292 @default.
- W2173013550 cites W1710734607 @default.
- W2173013550 cites W1721908487 @default.
- W2173013550 cites W174339829 @default.
- W2173013550 cites W1771373694 @default.
- W2173013550 cites W1832277845 @default.
- W2173013550 cites W1850047186 @default.
- W2173013550 cites W1900874062 @default.
- W2173013550 cites W1942295288 @default.
- W2173013550 cites W1956559956 @default.
- W2173013550 cites W1964795700 @default.
- W2173013550 cites W1964962870 @default.
- W2173013550 cites W1966403183 @default.
- W2173013550 cites W1968027261 @default.
- W2173013550 cites W1970219979 @default.
- W2173013550 cites W1971784203 @default.
- W2173013550 cites W198638662 @default.
- W2173013550 cites W1988524530 @default.
- W2173013550 cites W1989485111 @default.
- W2173013550 cites W1990762361 @default.
- W2173013550 cites W1992114977 @default.
- W2173013550 cites W2001141328 @default.
- W2173013550 cites W2012604743 @default.
- W2173013550 cites W2016017569 @default.
- W2173013550 cites W2020391739 @default.
- W2173013550 cites W2025677988 @default.
- W2173013550 cites W2028806953 @default.
- W2173013550 cites W2028820179 @default.
- W2173013550 cites W2032698032 @default.
- W2173013550 cites W2034190452 @default.
- W2173013550 cites W2042033151 @default.
- W2173013550 cites W2043811931 @default.
- W2173013550 cites W2047352090 @default.
- W2173013550 cites W2047764386 @default.
- W2173013550 cites W2050516909 @default.
- W2173013550 cites W2053186076 @default.
- W2173013550 cites W2054520963 @default.
- W2173013550 cites W2056524697 @default.
- W2173013550 cites W2069268700 @default.
- W2173013550 cites W2071088932 @default.
- W2173013550 cites W2076090418 @default.
- W2173013550 cites W2079753286 @default.
- W2173013550 cites W2085925880 @default.
- W2173013550 cites W2090044595 @default.
- W2173013550 cites W2090554354 @default.
- W2173013550 cites W2092942461 @default.
- W2173013550 cites W2093080079 @default.
- W2173013550 cites W2097101478 @default.
- W2173013550 cites W2097444001 @default.
- W2173013550 cites W2098262260 @default.
- W2173013550 cites W2098629748 @default.
- W2173013550 cites W2100591395 @default.
- W2173013550 cites W2102851236 @default.
- W2173013550 cites W2102970979 @default.
- W2173013550 cites W2104301886 @default.
- W2173013550 cites W2105472238 @default.
- W2173013550 cites W2106972913 @default.
- W2173013550 cites W2112490010 @default.
- W2173013550 cites W2112736324 @default.
- W2173013550 cites W2113709047 @default.
- W2173013550 cites W2113864883 @default.
- W2173013550 cites W2114507260 @default.
- W2173013550 cites W2116065364 @default.
- W2173013550 cites W2116409384 @default.
- W2173013550 cites W2118587067 @default.
- W2173013550 cites W2122049982 @default.
- W2173013550 cites W2122222797 @default.
- W2173013550 cites W2122646361 @default.
- W2173013550 cites W2122672392 @default.
- W2173013550 cites W2123227336 @default.
- W2173013550 cites W2124666592 @default.
- W2173013550 cites W2128888088 @default.
- W2173013550 cites W2134429122 @default.
- W2173013550 cites W2137786570 @default.
- W2173013550 cites W2137952932 @default.
- W2173013550 cites W2138756793 @default.