Paper
19 December 2021 BLSTM-based source code vulnerability detection visualization system
Zhili Ma, Hongzhong Ma, Xiang Gao, Teli Cai, Xuejun Zhang
Author Affiliations +
Proceedings Volume 12128, Second International Conference on Industrial IoT, Big Data, and Supply Chain; 121280W (2021) https://doi.org/10.1117/12.2624204
Event: 2nd International Conference on Industrial IoT, Big Data, and Supply Chain, 2021, Macao, China
Abstract
A visualization system with source code vulnerability detection is constructed based on the deep learning BLSTM model. The system firstly has the static analysis and slicing capabilities of the vulnerability statement, and then based on the deep learning model of the recurrent neural network and the attention mechanism technology, it can learn from the vulnerability data set the characteristics of the vulnerability and the realization of vulnerability detection. Firstly, the system analyzes the source code through the deployed open-source static analysis tool Joern according to the code to be tested, and stores the generated code attribute graph in the Neo4J graph database, then slices the program code according to the API call. The sliced code is treated as a text, which is mapped into a vector using word embedding technology, and finally input into the BLSTM model to determine whether there is vulnerability in the code under test. Through the visual interface, the system can interact with the user, and the user can independently select and train the model. Through experimental analysis and testing, the system has achieved good results.
© (2021) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhili Ma, Hongzhong Ma, Xiang Gao, Teli Cai, and Xuejun Zhang "BLSTM-based source code vulnerability detection visualization system", Proc. SPIE 12128, Second International Conference on Industrial IoT, Big Data, and Supply Chain, 121280W (19 December 2021); https://doi.org/10.1117/12.2624204
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Visualization

Visual process modeling

Software development

Human-machine interfaces

Statistical modeling

Systems modeling

RELATED CONTENT

Reactive data visualizations
Proceedings of SPIE (February 08 2015)
Visual analysis of tropical cyclone trajectory prediction
Proceedings of SPIE (April 10 2018)
User interfaces for process modeling and detection systems
Proceedings of SPIE (September 15 2004)
Reservoir Model Information System: REMIS
Proceedings of SPIE (January 20 2009)
Visualization for enhancing the data mining process
Proceedings of SPIE (March 27 2001)

Back to Top