Visible to the public Combinatorial Code Classification Amp; Vulnerability Rating

TitleCombinatorial Code Classification Amp; Vulnerability Rating
Publication TypeConference Paper
Year of Publication2020
AuthorsBarr, Joseph R., Shaw, Peter, Abu-Khzam, Faisal N., Yu, Sheng, Yin, Heng, Thatcher, Tyler
Conference Name2020 Second International Conference on Transdisciplinary AI (TransAI)
KeywordsBluetooth, clique decomposition, cluster-editing, code2vec, Computational modeling, Computer crime, Computers, cybersecurity, Deep Learning, graph theory, Human Behavior, LSTM, Malware, malware analysis, Metrics, parametrized complexity, privacy, pubcrawl, random forests, resilience, Resiliency, static code analysis, SVE
AbstractEmpirical analysis of source code of Android Fluoride Bluetooth stack demonstrates a novel approach of classification of source code and rating for vulnerability. A workflow that combines deep learning and combinatorial techniques with a straightforward random forest regression is presented. Two kinds of embedding are used: code2vec and LSTM, resulting in a distance matrix that is interpreted as a (combinatorial) graph whose vertices represent code components, functions and methods. Cluster Editing is then applied to partition the vertex set of the graph into subsets representing nearly complete subgraphs. Finally, the vectors representing the components are used as features to model the components for vulnerability risk.
DOI10.1109/TransAI49837.2020.00017
Citation Keybarr_combinatorial_2020