Visible to the public Automated Extraction of Software Names from Vulnerability Reports using LSTM and Expert System

TitleAutomated Extraction of Software Names from Vulnerability Reports using LSTM and Expert System
Publication TypeConference Paper
Year of Publication2022
AuthorsKhokhlov, Igor, Okutan, Ahmet, Bryla, Ryan, Simmons, Steven, Mirakhorli, Mehdi
Conference Name2022 IEEE 29th Annual Software Technology Conference (STC)
KeywordsAnalytical models, Common Product Enumeration, Common Vulnerability and Exposures, delays, expert systems, Human Behavior, natural language processing, privacy, pubcrawl, Publishing, resilience, Resiliency, Scalability, security, Software, Software Product Name Extraction, Software systems, Software Vulnerability
AbstractSoftware vulnerabilities are closely monitored by the security community to timely address the security and privacy issues in software systems. Before a vulnerability is published by vulnerability management systems, it needs to be characterized to highlight its unique attributes, including affected software products and versions, to help security professionals prioritize their patches. Associating product names and versions with disclosed vulnerabilities may require a labor-intensive process that may delay their publication and fix, and thereby give attackers more time to exploit them. This work proposes a machine learning method to extract software product names and versions from unstructured CVE descriptions automatically. It uses Word2Vec and Char2Vec models to create context-aware features from CVE descriptions and uses these features to train a Named Entity Recognition (NER) model using bidirectional Long short-term memory (LSTM) networks. Based on the attributes of the product names and versions in previously published CVE descriptions, we created a set of Expert System (ES) rules to refine the predictions of the NER model and improve the performance of the developed method. Experiment results on real-life CVE examples indicate that using the trained NER model and the set of ES rules, software names and versions in unstructured CVE descriptions could be identified with F-Measure values above 0.95.
DOI10.1109/STC55697.2022.00024
Citation Keykhokhlov_automated_2022