Guru Prasad Bhandari, Gebremariam Assres, Nikola Gavric, Andrii Shalaginov, Tor-Morten Grønli
{"title":"IoTvulCode:在为物联网应用设计的软件产品中进行人工智能漏洞检测","authors":"Guru Prasad Bhandari, Gebremariam Assres, Nikola Gavric, Andrii Shalaginov, Tor-Morten Grønli","doi":"10.1007/s10207-024-00848-6","DOIUrl":null,"url":null,"abstract":"<p>The proliferation of the Internet of Things (IoT) paradigm has ushered in a new era of connectivity and convenience. Consequently, rapid IoT expansion has introduced unprecedented security challenges , among which source code vulnerabilities present a significant risk. Recently, machine learning (ML) has been increasingly used to detect source code vulnerabilities. However, there has been a lack of attention to IoT-specific frameworks regarding both tools and datasets. This paper addresses potential source code vulnerabilities in some of the most commonly used IoT frameworks. Hence, we introduce <i>IoTvulCode </i>- a novel framework consisting of a dataset-generating tool and ML-enabled methods for detecting source code vulnerabilities and weaknesses as well as the initial release of an IoT vulnerability dataset. Our framework contributes to improving the existing coding practices, leading to a more secure IoT infrastructure. Additionally, <i>IoTvulCode </i>provides a solid basis for the IoT research community to further explore the topic.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"16 1","pages":""},"PeriodicalIF":2.4000,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications\",\"authors\":\"Guru Prasad Bhandari, Gebremariam Assres, Nikola Gavric, Andrii Shalaginov, Tor-Morten Grønli\",\"doi\":\"10.1007/s10207-024-00848-6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The proliferation of the Internet of Things (IoT) paradigm has ushered in a new era of connectivity and convenience. Consequently, rapid IoT expansion has introduced unprecedented security challenges , among which source code vulnerabilities present a significant risk. Recently, machine learning (ML) has been increasingly used to detect source code vulnerabilities. However, there has been a lack of attention to IoT-specific frameworks regarding both tools and datasets. This paper addresses potential source code vulnerabilities in some of the most commonly used IoT frameworks. Hence, we introduce <i>IoTvulCode </i>- a novel framework consisting of a dataset-generating tool and ML-enabled methods for detecting source code vulnerabilities and weaknesses as well as the initial release of an IoT vulnerability dataset. Our framework contributes to improving the existing coding practices, leading to a more secure IoT infrastructure. Additionally, <i>IoTvulCode </i>provides a solid basis for the IoT research community to further explore the topic.</p>\",\"PeriodicalId\":50316,\"journal\":{\"name\":\"International Journal of Information Security\",\"volume\":\"16 1\",\"pages\":\"\"},\"PeriodicalIF\":2.4000,\"publicationDate\":\"2024-05-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Information Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s10207-024-00848-6\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s10207-024-00848-6","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
物联网(IoT)模式的普及开创了一个连接和便利的新时代。因此,物联网的快速发展带来了前所未有的安全挑战,其中源代码漏洞是一个重大风险。最近,机器学习(ML)被越来越多地用于检测源代码漏洞。然而,在工具和数据集方面,物联网特定框架一直缺乏关注。本文探讨了一些最常用的物联网框架中潜在的源代码漏洞。因此,我们介绍了 IoTvulCode--一个由数据集生成工具和支持 ML 的方法组成的新型框架,用于检测源代码漏洞和弱点,并首次发布了一个物联网漏洞数据集。我们的框架有助于改进现有的编码实践,从而建立更安全的物联网基础设施。此外,IoTvulCode 还为物联网研究界进一步探索该主题奠定了坚实的基础。
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications
The proliferation of the Internet of Things (IoT) paradigm has ushered in a new era of connectivity and convenience. Consequently, rapid IoT expansion has introduced unprecedented security challenges , among which source code vulnerabilities present a significant risk. Recently, machine learning (ML) has been increasingly used to detect source code vulnerabilities. However, there has been a lack of attention to IoT-specific frameworks regarding both tools and datasets. This paper addresses potential source code vulnerabilities in some of the most commonly used IoT frameworks. Hence, we introduce IoTvulCode - a novel framework consisting of a dataset-generating tool and ML-enabled methods for detecting source code vulnerabilities and weaknesses as well as the initial release of an IoT vulnerability dataset. Our framework contributes to improving the existing coding practices, leading to a more secure IoT infrastructure. Additionally, IoTvulCode provides a solid basis for the IoT research community to further explore the topic.
期刊介绍:
The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation.
Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: watermarking, software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility.