Paper
3 April 2024 Research on buffer overflow vulnerability detection model based on Bi-GRU and attention mechanism
Jiali Luo, Deguo Yang, Zhaoyong Yang
Author Affiliations +
Proceedings Volume 13078, Second International Conference on Informatics, Networking, and Computing (ICINC 2023); 1307815 (2024) https://doi.org/10.1117/12.3024683
Event: Second International Conference on Informatics, Networking, and Computing (ICINC 2023), 2023, Wuhan, China
Abstract
With the increasing complexity of computer programs, the number of reports of security vulnerabilities has also skyrocketed, making vulnerability detection a hot topic in the field of software security. Traditional security vulnerability research is based on manual processes or predefined rules. This kind of big data is underutilized. To solve the problems in the design of the above network model, in this paper, the Bi-GRU model is combined with the Attention mechanism to build a Bi-GRU-attention classification model. Bidirectional GRU model It contains two directional loop layers, each containing a gated loop unit, which allows the model to model the information in the sequence from both forward and reverse directions to better capture the dependencies in the sequence. However, for some long series data, the model will face a lot of interference and redundant information, attention mechanism can help the model to pay special attention to important information about certain elements in the sequence, therefore, adding attention mechanism can help the Bi-GRU model to extract and process key information more efficiently. Finally, the full connection layer and Softmax function are used to convert the results of attention weighting sum into probability output to complete the detection.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Jiali Luo, Deguo Yang, and Zhaoyong Yang "Research on buffer overflow vulnerability detection model based on Bi-GRU and attention mechanism", Proc. SPIE 13078, Second International Conference on Informatics, Networking, and Computing (ICINC 2023), 1307815 (3 April 2024); https://doi.org/10.1117/12.3024683
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Feature extraction

Education and training

Data hiding

Neural networks

Analytical research

Computer security

Back to Top