Journal of Software:2020.31(7):2040-2061

(国防科技大学 计算机学院, 湖南 长沙 410073;中国人民解放军61302部队, 北京 100016)
Survey of Software Vulnerability Mining Methods Based on Machine Learning
LI Yun,HUANG Chen-Lin,WANG Zhong-Feng,YUAN Lu,WANG Xiao-Chuan
(College of Computer Science and Technology, National University of Defense Technology, Changsha 410073, China;PLA 61302 Troops, Beijing 100016, China)
Chart / table
Similar Articles
Article :Browse 778   Download 1694
Received:November 08, 2019    Revised:February 07, 2020
> 中文摘要: 软件复杂性的增加,给软件安全性带来极大的挑战.随着软件规模的不断增大以及漏洞形态多样化,传统漏洞挖掘方法由于存在高误报率和高漏报率的问题,已无法满足复杂软件的安全性分析需求.近年来,随着人工智能产业的兴起,大量机器学习方法被尝试用于解决软件漏洞挖掘问题.首先,通过梳理基于机器学习的软件漏洞挖掘的现有研究工作,归纳了其技术特征与工作流程;接着,从其中核心的原始数据特征提取切入,以代码表征形式作为分类依据,对现有研究工作进行分类阐述,并系统地进行了对比分析;最后,依据对现有研究工作的整理总结,探讨了基于机器学习的软件漏洞挖掘领域面临的挑战,并展望了该领域的发展趋势.
Abstract:The increasing complexity of software application brings great challenges to software security. Due to the increase of software scale and diversity of vulnerability forms, the high false positives and false negatives of traditional vulnerability mining methods cannot meet the requirements of software security analysis. In recent years, with the rise of artificial intelligence industry, a large number of machine learning methods have been tried to solve the problem of software vulnerability mining. Firstly, the latest research results of applying machine learning method to the research of vulnerability mining are summarized in recent years, and the technical characteristics and workflow are proposed. Then, starting from the core original data features extraction, the existing research is classified according to the code representation form, and the existing research is systematically compared. Finally, based on the summary of the existing research, the challenges in the field of software vulnerability mining based on machine learning are discussed, and the development trends of this field are proposed.
文章编号:     中图分类号:TP311    文献标志码:
基金项目:国家重点研发计划(2018YFB0803501) 国家重点研发计划(2018YFB0803501)
Foundation items:National Key Technologies Research and Development Program, China (2018YFB0803501)
Reference text:


LI Yun,HUANG Chen-Lin,WANG Zhong-Feng,YUAN Lu,WANG Xiao-Chuan.Survey of Software Vulnerability Mining Methods Based on Machine Learning.Journal of Software,2020,31(7):2040-2061