Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching

Author:

Zou Deqing1,Zhu Yawei1,Xu Shouhuai2,Li Zhen3,Jin Hai1,Ye Hengkai1

Affiliation:

1. Huazhong University of Science and Technology, P.R. China

2. University of Texas at San Antonio, USA

3. Hebei University, P.R. China

Abstract

Detecting software vulnerabilities is an important problem and a recent development in tackling the problem is the use of deep learning models to detect software vulnerabilities. While effective, it is hard to explain why a deep learning model predicts a piece of code as vulnerable or not because of the black-box nature of deep learning models. Indeed, the interpretability of deep learning models is a daunting open problem. In this article, we make a significant step toward tackling the interpretability of deep learning model in vulnerability detection. Specifically, we introduce a high-fidelity explanation framework, which aims to identify a small number of tokens that make significant contributions to a detector’s prediction with respect to an example. Systematic experiments show that the framework indeed has a higher fidelity than existing methods, especially when features are not independent of each other (which often occurs in the real world). In particular, the framework can produce some vulnerability rules that can be understood by domain experts for accepting a detector’s outputs (i.e., true positives) or rejecting a detector’s outputs (i.e., false-positives and false-negatives). We also discuss limitations of the present study, which indicate interesting open problems for future research.

Funder

Natural Science Foundation of Hebei Province

Shenzhen Fundamental Research Program

National Natural Science Foundation of China

National Key Research and Development Plan of China

National Science Foundation

Publisher

Association for Computing Machinery (ACM)

Subject

Software

Reference54 articles.

1. Checkmarx. 2020. Checkmarx—Application Security Testing and Static Code Analysis. Checkmarx Israel. Retrieved from https://www.checkmarx.com/. Checkmarx. 2020. Checkmarx—Application Security Testing and Static Code Analysis. Checkmarx Israel. Retrieved from https://www.checkmarx.com/.

2. Reza Abbasi-Asl and Bin Yu. 2017. Interpreting convolutional neural networks through compression. CoRR abs/1711.02329. Reza Abbasi-Asl and Bin Yu. 2017. Interpreting convolutional neural networks through compression. CoRR abs/1711.02329.

3. American Information Technology Laboratory 2020. National Vulnerability Database. American Information Technology Laboratory. Retrieved from https://nvd.nist.gov/. American Information Technology Laboratory 2020. National Vulnerability Database. American Information Technology Laboratory. Retrieved from https://nvd.nist.gov/.

4. American Information Technology Laboratory 2020. Software Assurance Reference Dataset. American Information Technology Laboratory. Retrieved from https://samate.nist.gov/SRD/. American Information Technology Laboratory 2020. Software Assurance Reference Dataset. American Information Technology Laboratory. Retrieved from https://samate.nist.gov/SRD/.

Cited by 19 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. An Interpretable Vulnerability Detection Framework Based on Multi-task Learning;Communications in Computer and Information Science;2023-11-30

2. Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery;Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security;2023-11-26

3. Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15

4. An Empirical Study on Model-Agnostic Techniques for Source Code-Based Defect Prediction;International Journal of Software Engineering and Knowledge Engineering;2023-11-04

5. SlicedLocator: Code vulnerability locator based on sliced dependence graph;Computers & Security;2023-11

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3