HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs

Cited 3 time in webofscience Cited 0 time in scopus
  • Hit : 141
  • Download : 0
DC FieldValueLanguage
dc.contributor.author위성일ko
dc.contributor.authorWoo, Sijaeko
dc.contributor.authorWhang, Joyce Jiyoungko
dc.contributor.authorSon, Sooelko
dc.date.accessioned2022-09-27T13:00:50Z-
dc.date.available2022-09-27T13:00:50Z-
dc.date.created2022-09-26-
dc.date.created2022-09-26-
dc.date.created2022-09-26-
dc.date.created2022-09-26-
dc.date.created2022-09-26-
dc.date.issued2022-04-26-
dc.identifier.citation31st ACM World Wide Web Conference, WWW 2022, pp.755 - 766-
dc.identifier.urihttp://hdl.handle.net/10203/298734-
dc.description.abstractA code property graph (CPG) is a joint representation of syntax, control flows, and data flows of a target application. Recent studies have demonstrated the promising efficacy of leveraging CPGs for the identification of vulnerabilities. It recasts the problem of implementing a specific static analysis for a target vulnerability as a graph query composition problem. It requires devising coarse-grained graph queries that model vulnerable code patterns. Unfortunately, such coarse-grained queries often leave vulnerabilities due to faulty input sanitization undetected. In this paper, we propose, a scalable system designed to identify various web vulnerabilities, including bugs that stem from incorrect sanitization. We designed to find a subgraph in a target CPG that matches a given CPG query having a known vulnerability, which is known as the subgraph isomorphism problem. To address the scalability challenge that stems from the NP-complete nature of this problem, leverages optimization techniques designed to boost the efficiency of matching vulnerable subgraphs. found confirmed vulnerabilities including CVEs among 2,464 potential vulnerabilities in real-world CPGs having a combined total of 1 billion nodes and 1.2 billion edges.-
dc.languageEnglish-
dc.publisherAssociation for Computing Machinery, Inc-
dc.titleHiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs-
dc.typeConference-
dc.identifier.wosid000852713000076-
dc.identifier.scopusid2-s2.0-85129819591-
dc.type.rimsCONF-
dc.citation.beginningpage755-
dc.citation.endingpage766-
dc.citation.publicationname31st ACM World Wide Web Conference, WWW 2022-
dc.identifier.conferencecountryFR-
dc.identifier.conferencelocationVirtual-
dc.identifier.doi10.1145/3485447.3512235-
dc.contributor.localauthorWhang, Joyce Jiyoung-
dc.contributor.localauthorSon, Sooel-
dc.contributor.nonIdAuthorWoo, Sijae-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 3 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0