Paper published in a book (Scientific congresses, symposiums and conference proceedings)
IntJect: Vulnerability Intent Bug Seeding
PETIT, Benjamin; Khanfir, Ahmed; Soremekun, Ezekiel et al.
2022In 22nd IEEE International Conference on Software Quality, Reliability, and Security
Peer reviewed
 

Files


Full Text
Vulnerability_Injection_QRS_2022_3.pdf
Publisher postprint (608.84 kB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Software Vulnerabilities; Vulnerability injection; Software Security
Abstract :
[en] Studying and exposing software vulnerabilities is important to ensure software security, safety, and reliability. Software engineers often inject vulnerabilities into their programs to test the reliability of their test suites, vulnerability detectors, and security measures. However, state-of-the-art vulnerability injection methods only capture code syntax/patterns, they do not learn the intent of the vulnerability and are limited to the syntax of the original dataset. To address this challenge, we propose the first intent-based vulnerability injection method that learns both the program syntax and vulnerability intent. Our approach applies a combination of NLP methods and semantic-preserving program mutations (at the bytecode level) to inject code vulnerabilities. Given a dataset of known vulnerabilities (containing benign and vulnerable code pairs), our approach proceeds by employing semantic-preserving program mutations to transform the existing dataset to semantically similar code. Then, it learns the intent of the vulnerability via neural machine translation (Seq2Seq) models. The key insight is to employ Seq2Seq to learn the intent (context) of the vulnerable code in a manner that is agnostic of the specific program instance. We evaluate the performance of our approach using 1275 vulnerabilities belonging to five (5) CWEs from the Juliet test suite. We examine the effectiveness of our approach in producing compilable and vulnerable code. Our results show that INTJECT is effective, almost all (99%) of the code produced by our approach is vulnerable and compilable. We also demonstrate that the vulnerable programs generated by INTJECT are semantically similar to the withheld original vulnerable code. Finally, we show that our mutation-based data transformation approach outperforms its alternatives, namely data obfuscation and using the original data.
Disciplines :
Computer science
Author, co-author :
PETIT, Benjamin;  University of Namur, Namur, Belgium
Khanfir, Ahmed ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SerVal
Soremekun, Ezekiel ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SerVal
Perrouin, Gilles;  University of Namur, Namur, Belgium
Papadakis, Michail;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Life Sciences and Medicine (DLSM)
External co-authors :
yes
Language :
English
Title :
IntJect: Vulnerability Intent Bug Seeding
Publication date :
2022
Event name :
22nd IEEE International Conference on Software Quality, Reliability, and Security
Event date :
2022
Main work title :
22nd IEEE International Conference on Software Quality, Reliability, and Security
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Available on ORBilu :
since 16 January 2023

Statistics


Number of views
36 (3 by Unilu)
Number of downloads
49 (1 by Unilu)

Scopus citations®
 
0
Scopus citations®
without self-citations
0

Bibliography


Similar publications



Contact ORBilu