IET Information Security最新文献

筛选
英文 中文
Automated Differential-Linear Cryptanalysis for AND-RX Ciphers AND-RX 密码的自动差分线性密码分析
IF 1.4 4区 计算机科学
IET Information Security Pub Date : 2024-05-21 DOI: 10.1049/2024/6164262
Wenya Li, Kai Zhang, Bin Hu
{"title":"Automated Differential-Linear Cryptanalysis for AND-RX Ciphers","authors":"Wenya Li,&nbsp;Kai Zhang,&nbsp;Bin Hu","doi":"10.1049/2024/6164262","DOIUrl":"10.1049/2024/6164262","url":null,"abstract":"<div>\u0000 <p>Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. Building on these two methods, differential-linear (DL) cryptanalysis was introduced by Langford and Hellman in 1994. This cryptanalytic method has been not only extensively researched but also proven to be effective. In this paper, a security evaluation framework for AND-RX ciphers against DL cryptanalysis is proposed, which is denoted as <span></span><math></math>. In addition to modeling the structure of all the possible differential trails and linear trails at the bit level, we introduce a method to calculate this structure round by round. Based on this approach, an automatic algorithm is proposed to construct the DL distinguisher. Unlike previous methods, <span></span><math></math> uses a truncated differential and a linear hull instead of a differential characteristic and a linear approximation, which brings the bias of the DL distinguisher close to the experimental value. To validate the effectiveness of the framework, <span></span><math></math> is applied to Simon and Simeck, which are two typical AND-RX ciphers. With the automatic algorithm, we discover an 11-round DL distinguisher of Simon32 with bias 2<sup>−14.89</sup> and a 12-round DL distinguisher of Simeck32 with bias 2<sup>−14.89</sup>. Moreover, the 14-round DL distinguisher of Simon48 with bias 2<sup>−22.30</sup> is longer than the longest DL distinguisher currently known. In addition, the framework <span></span><math></math> shows advantages when analyzing ciphers with large block sizes. As far as we know, for Simon64/96/128 and Simeck48/64, the first DL distinguishers are obtained with our framework. The DL distinguishers are 16, 23, 32, 17, and 22 rounds of Simon64/96/128 and Simeck48/64 with bias 2<sup>−24.31</sup>, 2<sup>−47.57</sup>, 2<sup>−60.75</sup>, 2<sup>−22.54</sup>, and 2<sup>−31.41</sup>, respectively. To prove the correctness of distinguishers, experiments on Simon32 and Simeck32 have been performed. The experimental bias are 2<sup>−13.76</sup> and 2<sup>−14.82</sup>, respectively. Comparisons of the theoretical and experimental results show good agreement.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/6164262","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141118099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling the Neutral Difference and Its Automated Search 揭开中性差异及其自动搜索的神秘面纱
IF 1.4 4区 计算机科学
IET Information Security Pub Date : 2024-05-14 DOI: 10.1049/2024/2939486
Guangqiu Lv, Chenhui Jin, Zhen Shi, Ting Cui
{"title":"Unveiling the Neutral Difference and Its Automated Search","authors":"Guangqiu Lv,&nbsp;Chenhui Jin,&nbsp;Zhen Shi,&nbsp;Ting Cui","doi":"10.1049/2024/2939486","DOIUrl":"10.1049/2024/2939486","url":null,"abstract":"<div>\u0000 <p>Given a differential characteristic and an existing plaintext pair that satisfies it (referred to as a right pair), generating additional right pairs at a reduced cost is an appealing prospect. The neutral bit technique, referred to as neutral differences throughout this paper, provides a solution to this challenge. Traditionally, the search for neutral differences has heavily depended on experimental testing, leading to limitations in the search range. In this work, we propose the neutral difference table and establish a link between boomerang cryptanalysis and neutral differences. Furthermore, we propose an automated search for neutral differences to address the problem of a limited search range of neutral differences, as previous approaches relied on experimental testing. This approach provides a basis for the subspace spanned by the neutral differences, and we apply this technique to both SPECK32 and LEA, where the predicted results closely match the experimental ones. Consequently, we present the improved differential-linear distinguishers for SPECK32 and LEA, along with the 18-round attacks on LEA192 and LEA256 with the lowest time complexity up to date.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/2939486","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140979412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes MS-LW-TI:基于基元的 4 × 4 S-box 一阶阈值实现方法
IF 1.4 4区 计算机科学
IET Information Security Pub Date : 2024-05-11 DOI: 10.1049/2024/8851878
Botao Liu, Ming Tang
{"title":"MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes","authors":"Botao Liu,&nbsp;Ming Tang","doi":"10.1049/2024/8851878","DOIUrl":"10.1049/2024/8851878","url":null,"abstract":"<div>\u0000 <p>Threshold implementation (TI) is a lightweight countermeasure against side-channel attacks when glitches happen. As to masking schemes, an S-box is the key part to protection. In this paper, we propose a general first-order lightweight TI scheme for 4 × 4 S-boxes and name it as MiniSat-lightweight-threshold implementation (MS-LW-TI). First, we use MiniSat to optimally decompose an S-box into the least number of three different logic gate operations, AND, OR, and XOR. Among these operations, we define two primitives and the extension of two primitives for TI design. Furthermore, we prove that the primitives and their extensions strictly comply with the security properties. Finally, we implement MS-LW-TI on Xilinx Spartan-6 Field Programmable Gate Array (FPGA) to show that the S-boxes of PRESENT, GIFT, and PICCOLO consume only 17, 15, and 13 look-up-tables (LUTs), 16, 9, and 16 flip-flops (FFs), 6, 5, and 6 slices, respectively. Compared with the existing lightweight TI design, our TI for PRESENT S-box has a 22%, 38%, and 25% reduction of LUTs, FFs, and slices to the design by Shahmirzadi and Moradi at IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2021, and our TI for GIFT S-box has a 6%, 25%, and 28% reduction of LUTs, FFs, and slices to the design by Jati et al., which is the smallest.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/8851878","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140989800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting the Transferability of Ensemble Adversarial Attack via Stochastic Average Variance Descent 通过随机平均方差下降提高组合对抗攻击的可转移性
IF 1.4 4区 计算机科学
IET Information Security Pub Date : 2024-05-11 DOI: 10.1049/2024/7983842
Lei Zhao, Zhizhi Liu, Sixing Wu, Wei Chen, Liwen Wu, Bin Pu, Shaowen Yao
{"title":"Boosting the Transferability of Ensemble Adversarial Attack via Stochastic Average Variance Descent","authors":"Lei Zhao,&nbsp;Zhizhi Liu,&nbsp;Sixing Wu,&nbsp;Wei Chen,&nbsp;Liwen Wu,&nbsp;Bin Pu,&nbsp;Shaowen Yao","doi":"10.1049/2024/7983842","DOIUrl":"10.1049/2024/7983842","url":null,"abstract":"<div>\u0000 <p>Adversarial examples have the property of transferring across models, which has created a great threat for deep learning models. To reveal the shortcomings in the existing deep learning models, the method of the ensemble has been introduced to the generating of transferable adversarial examples. However, most of the model ensemble attacks directly combine the different models’ output but ignore the large differences in optimization direction of them, which severely limits the transfer attack ability. In this work, we propose a new kind of ensemble attack method called stochastic average ensemble attack. Unlike the existing approach of averaging the outputs of each model as an integrated output, we continuously optimize the ensemble gradient in an internal loop using the model history gradient and the average gradient of different models. In this way, the adversarial examples can be updated in a more appropriate direction and make the crafted adversarial examples more transferable. Experimental results on ImageNet show that our method generates highly transferable adversarial examples and outperforms existing methods.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/7983842","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140989001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes HA-Med:基于区块链的隐藏政策和属性医疗数据共享解决方案
IF 1.4 4区 计算机科学
IET Information Security Pub Date : 2024-04-26 DOI: 10.1049/2024/2498245
Xiaohui Yang, Jing Liu
{"title":"HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes","authors":"Xiaohui Yang,&nbsp;Jing Liu","doi":"10.1049/2024/2498245","DOIUrl":"https://doi.org/10.1049/2024/2498245","url":null,"abstract":"<div>\u0000 <p>Existing healthcare data-sharing solutions often combine attribute-based encryption techniques with blockchain technology to achieve fine-grained access control. However, the transparency of blockchain technology may introduce potential risks of exposing access structures and user attributes. To address these concerns, this paper proposes a novel healthcare data-sharing scheme called HA-Med. By leveraging blockchain technology, HA-Med ensures the concealment of access policies and attributes, providing a secure solution for fine-grained access control of medical data. Furthermore, the scheme supports attribute revocation and forward secrecy to enhance user privacy. The security of HA-Med is rigorously verified through theoretical analysis, and its feasibility is demonstrated through experiments conducted using the Java-based JPBC library.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/2498245","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141096476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer DHRCA:基于晶圆上系统动态异构冗余的安全架构设计
IF 1.4 4区 计算机科学
IET Information Security Pub Date : 2024-04-12 DOI: 10.1049/2024/2023349
Bo Mei, Zhengbin Zhu, Peijie Li, Bo Zhao
{"title":"DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer","authors":"Bo Mei,&nbsp;Zhengbin Zhu,&nbsp;Peijie Li,&nbsp;Bo Zhao","doi":"10.1049/2024/2023349","DOIUrl":"10.1049/2024/2023349","url":null,"abstract":"<div>\u0000 <p>System on Wafer (SoW) based on chiplets may be implanted with hardware Trojans (HTs) by untrustworthy third-party chiplet vendors. However, traditional HTs protection techniques cannot guarantee complete protection against HTs, which poses a great challenge to the hardware security of SoW. In this paper, we propose a computing architecture based on endogenous security theory—dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. The security of our approach is analyzed by building a generalized stochastic coloring petri net (GSCPN) model of DHRCA. The simulation results based on the GSCPN model show that our method can improve the system security probability to 0.8690 and the system availability probability to 0.9750 in the steady state compared with typical triple-mode redundancy and runtime monitoring methods. Furthermore, the impact of different attack and defense strategies on system security of different methods is simulated and analyzed in this paper.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/2023349","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140710592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection 网络安全中的深度学习:用于 SQL 注入攻击检测的混合 BERT-LSTM 网络
IF 1.4 4区 计算机科学
IET Information Security Pub Date : 2024-04-05 DOI: 10.1049/2024/5565950
Yixian Liu, Yupeng Dai
{"title":"Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection","authors":"Yixian Liu,&nbsp;Yupeng Dai","doi":"10.1049/2024/5565950","DOIUrl":"10.1049/2024/5565950","url":null,"abstract":"<div>\u0000 <p>In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack. Traditional methods for detecting these attacks mainly rely on manually defined features, making these detection outcomes highly dependent on the precision of feature extraction. Unfortunately, these approaches struggle to adapt to the increasingly sophisticated nature of these attack techniques, thereby necessitating the development of more robust detection strategies. This paper presents a novel deep learning framework that integrates Bidirectional Encoder Representations from Transformers (BERT) and Long Short-Term Memory (LSTM) networks, enhancing the detection of SQL injection attacks. Leveraging the advanced contextual encoding capabilities of BERT and the sequential data processing ability of LSTM networks, the proposed model dynamically extracts word and sentence-level features, subsequently generating embedding vectors that effectively identify malicious SQL query patterns. Experimental results indicate that our method achieves accuracy, precision, recall, and F1 scores of 0.973, 0.963, 0.962, and 0.958, respectively, while ensuring high computational efficiency.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/5565950","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140736257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA 对友好对称密钥原语隐私协议的差分故障攻击:RAIN 和 HERA
IF 1.4 4区 计算机科学
IET Information Security Pub Date : 2024-03-27 DOI: 10.1049/2024/7457517
Lin Jiao, Yongqiang Li, Yonglin Hao, Xinxin Gong
{"title":"Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA","authors":"Lin Jiao,&nbsp;Yongqiang Li,&nbsp;Yonglin Hao,&nbsp;Xinxin Gong","doi":"10.1049/2024/7457517","DOIUrl":"https://doi.org/10.1049/2024/7457517","url":null,"abstract":"<div>\u0000 <p>As the practical applications of fully homomorphic encryption (FHE), secure multi-party computation (MPC) and zero-knowledge (ZK) proof continue to increase, so does the need to design and analyze new symmetric-key primitives that can adapt to these privacy-preserving protocols. These designs typically have low multiplicative complexity and depth with the parameter domain adapted to their application protocols, aiming to minimize the cost associated with the number of nonlinear operations or the multiplicative depth of their representation as circuits. In this paper, we propose two differential fault attacks against a one-way function RAIN used for Rainier (CCS 2022), a signature scheme based on the MPC-in-the-head approach and an FHE-friendly cipher HERA used for the RtF framework (Eurocrypt 2022), respectively. We show that our attacks can recover the keys for both ciphers by only injecting a fault into the internal state and requiring only one normal and one faulty ciphertext blocks. Thus, we can use only the practical complexity of 2<sup>26.6</sup>/2<sup>28.8</sup>/2<sup>30.4</sup> bit operations to break the full-round RAIN with 128/192/256-bit keys. For full-round HERA with 80/128-bit key, our attack is practical with complexity the complexity of 2<sup>20</sup> encryptions with about 2<sup>16</sup> memory.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/7457517","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141096382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Second Preimage Attack on the XOR Hash Combiner 针对 XOR 哈希组合器的第二种前图像攻击
IF 1.4 4区 计算机科学
IET Information Security Pub Date : 2024-03-22 DOI: 10.1049/2024/1230891
Shiwei Chen, Ting Cui, Chenhui Jin, Congjun Wang
{"title":"A Second Preimage Attack on the XOR Hash Combiner","authors":"Shiwei Chen,&nbsp;Ting Cui,&nbsp;Chenhui Jin,&nbsp;Congjun Wang","doi":"10.1049/2024/1230891","DOIUrl":"https://doi.org/10.1049/2024/1230891","url":null,"abstract":"<div>\u0000 <p>The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1. In this work, we analyze the second preimage resistance of the XOR combiner underlying two different narrow-pipe hash functions with weak ideal compression functions. To control simultaneously the behavior of the two different hash functions, we develop a new structure called multicollision-and-double-diamond. Multicollision-and-double-diamond structure is constructed using the idea of meet-in-the-middle technique, combined with Joux’s multicollision and Chen’s inverse-diamond structure. Then based on the multicollision-and-double-diamond structure, we present a second preimage attack on the XOR hash combiner with the time complexity of about <i>O</i>((2<i>n</i> + 1)2<sup><i>n</i>/2</sup> + (<i>n</i> − <i>l</i>)2<sup><i>n</i>−<i>l</i></sup> + (<i>n</i> − <i>k</i>)2<sup><i>n</i>−<i>k</i></sup> + 2<sup><i>l</i>+1</sup> + 2<sup><i>k</i>+1</sup>) (<i>n</i> is the size of the XOR hash combiner and <i>l</i> and <i>k</i> are respectively the depths of the two inverse-diamond structures), less than the ideal time complexity <i>O</i>(2<sup><i>n</i></sup>), and memory of about <i>O</i>(2<sup><i>k</i></sup> + 2<sup><i>l</i></sup>).</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/1230891","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141096263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives VulMPFF:多角度融合代码特征的漏洞检测方法
IF 1.4 4区 计算机科学
IET Information Security Pub Date : 2024-03-22 DOI: 10.1049/2024/4313185
Xiansheng Cao, Junfeng Wang, Peng Wu, Zhiyang Fang
{"title":"VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives","authors":"Xiansheng Cao,&nbsp;Junfeng Wang,&nbsp;Peng Wu,&nbsp;Zhiyang Fang","doi":"10.1049/2024/4313185","DOIUrl":"10.1049/2024/4313185","url":null,"abstract":"<div>\u0000 <p>Source code vulnerabilities are one of the significant threats to software security. Existing deep learning-based detection methods have proven their effectiveness. However, most of them extract code information on a single intermediate representation of code (IRC), which often fails to extract multiple information hidden in the code fully, significantly limiting their performance. To address this problem, we propose VulMPFF, a vulnerability detection method that fuses code features under multiple perspectives. It extracts IRC from three perspectives: code sequence, lexical and syntactic relations, and graph structure to capture the vulnerability information in the code, which effectively realizes the complementary information of multiple IRCs and improves vulnerability detection performance. Specifically, VulMPFF extracts serialized abstract syntax tree as IRC from code sequence, lexical and syntactic relation perspective, and code property graph as IRC from graph structure perspective, and uses Bi-LSTM model with attention mechanism and graph neural network with attention mechanism to learn the code features from multiple perspectives and fuse them to detect the vulnerabilities in the code, respectively. We design a dual-attention mechanism to highlight critical code information for vulnerability triggering and better accomplish the vulnerability detection task. We evaluate our approach on three datasets. Experiments show that VulMPFF outperforms existing state-of-the-art vulnerability detection methods (i.e., Rats, FlawFinder, VulDeePecker, SySeVR, Devign, and Reveal) in Acc and F1 score, with improvements ranging from 14.71% to 145.78% and 152.08% to 344.77%, respectively. Meanwhile, experiments in the open-source project demonstrate that VulMPFF has the potential to detect vulnerabilities in real-world environments.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/4313185","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140211821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信