Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey

Yuhao Lin, Ying Li, Mianxue Gu, Hongyu Sun, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The increasing number of security vulnerabilities has become an important problem that needs to be solved urgently in the field of software security, which means that the current vulnerability mining technology still has great potential for development. However, most of the existing AI-based vulnerability detection methods focus on designing different AI models to improve the accuracy of vulnerability detection, ignoring the fundamental problems of data-driven AI-based algorithms: first, there is a lack of sufficient high-quality vulnerability data; second, there is no unified standardized construction method to meet the standardized evaluation of different vulnerability detection models. This all greatly limits security personnel's in-depth research on vulnerabilities. In this survey, we review the current literature on building high-quality vulnerability datasets, aiming to investigate how state-of-the-art research has leveraged data mining and data processing techniques to generate vulnerability datasets to facilitate vulnerability discovery. We also identify the challenges of this new field and share our views on potential research directions.

Original languageEnglish
Title of host publicationProceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop Volume, DSN-W 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages141-146
Number of pages6
ISBN (Electronic)9781665402620
DOIs
Publication statusPublished - 2022
Event52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop, DSN-W 2022 - Baltimore, United States
Duration: 2022 Jun 272022 Jun 30

Publication series

NameProceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop Volume, DSN-W 2022

Conference

Conference52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop, DSN-W 2022
Country/TerritoryUnited States
CityBaltimore
Period22/6/2722/6/30

Keywords

  • datasets
  • deep learning
  • security vulnerabilities

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey'. Together they form a unique fingerprint.

Cite this