Treffer: Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction.

Title:
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction.
Authors:
Hussain S; Department of Computer Science, Sardar Bahadur Khan Women's University, Quetta, Pakistan. shumaila.hussain@sbkwu.edu.pk.; Department of Computer Science and IT, University of Balochistan, Quetta, Pakistan. shumaila.hussain@sbkwu.edu.pk., Nadeem M; Higher Colleges of Technology, Abu Dhabi, United Arab Emirates., Baber J; Department of Computer Science and IT, University of Balochistan, Quetta, Pakistan.; GIPSA-Lab, University Grenoble Alpes, 38000, Grenoble, France., Hamdi M; Department of Computer Science, College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia., Rajab A; Department of Computer Science, College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia., Al Reshan MS; Department of Information Systems, College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia., Shaikh A; Department of Information Systems, College of Computer Science and Information Systems, Najran University, 61441, Najran, Saudi Arabia.
Source:
Scientific reports [Sci Rep] 2024 Mar 28; Vol. 14 (1), pp. 7406. Date of Electronic Publication: 2024 Mar 28.
Publication Type:
Journal Article
Language:
English
Journal Info:
Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: PubMed not MEDLINE; MEDLINE
Imprint Name(s):
Original Publication: London : Nature Publishing Group, copyright 2011-
References:
IEEE Trans Neural Netw. 2009 Jan;20(1):61-80. (PMID: 19068426)
Front Comput Neurosci. 2022 Aug 29;16:981739. (PMID: 36105945)
Sci Rep. 2022 Oct 12;12(1):17086. (PMID: 36224208)
Grant Information:
NU/RG/SERC/12/34 The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding Program grant code
Contributed Indexing:
Keywords: CodeBERT; Feature extraction; Hybrid GCN; Self-attentive QCNN; Software security; Vulnerability detection
Entry Date(s):
Date Created: 20240329 Latest Revision: 20240331
Update Code:
20250114
PubMed Central ID:
PMC10978945
DOI:
10.1038/s41598-024-56871-z
PMID:
38548726
Database:
MEDLINE

Weitere Informationen

Software vulnerabilities pose a significant threat to system security, necessitating effective automatic detection methods. Current techniques face challenges such as dependency issues, language bias, and coarse detection granularity. This study presents a novel deep learning-based vulnerability detection system for Java code. Leveraging hybrid feature extraction through graph and sequence-based techniques enhances semantic and syntactic understanding. The system utilizes control flow graphs (CFG), abstract syntax trees (AST), program dependencies (PD), and greedy longest-match first vectorization for graph representation. A hybrid neural network (GCN-RFEMLP) and the pre-trained CodeBERT model extract features, feeding them into a quantum convolutional neural network with self-attentive pooling. The system addresses issues like long-term information dependency and coarse detection granularity, employing intermediate code representation and inter-procedural slice code. To mitigate language bias, a benchmark software assurance reference dataset is employed. Evaluations demonstrate the system's superiority, achieving 99.2% accuracy in detecting vulnerabilities, outperforming benchmark methods. The proposed approach comprehensively addresses vulnerabilities, including improper input validation, missing authorizations, buffer overflow, cross-site scripting, and SQL injection attacks listed by common weakness enumeration (CWE).
(© 2024. The Author(s).)