ESEIW 2022
Sun 18 - Fri 23 September 2022 Helsinki, Finland
Fri 23 Sep 2022 14:00 - 14:15 at Sonck - Session 5B - Development & Testing & Behavioral 2 Chair(s): Sheila Reinehr

Background: With the boosting development of IoT technology, the supply chains of IoT devices become more powerful and sophisticated, and the security issues introduced by code reuse are becoming more prominent. Therefore, the detection and management of vulnerabilities through code similarity detection technology is of great significance for protecting the security of IoT devices.
Aim: We aim to propose a more accurate, parallel-friendly, and realistic software supply chain vulnerability detection solution for IoT devices.
Method: This paper presents PG-VulNet, standing for Vulnerability-detection Network based on Pseudo-code Graphs. It is a “multi-model” cross-architecture vulnerability detection solution based on pseudo-code and Graph Matching Network (GMN). PG-VulNet extracts both behavioral and structural features of pseudo-code to build customized feature graphs and then uses GMN to detect supply chain vulnerabilities based on these graphs.
Results: The experiments show that PG-VulNet achieves an average detection accuracy of 99.14%, significantly higher than existing approaches like Gemini, VulSeeker, FIT, and Asteria. In addition to this, PG-VulNet also excels in detection overhead and false alarms. In the real-world evaluation, PG-VulNet detected 690 known vulnerabilities in 1,611 firmwares.
Conclusions: PG-VulNet can effectively detect the vulnerabilities introduced by software supply chain in IoT firmwares and is well suited for large-scale detection. Compared with existing approaches, PG-VulNet has significant advantages.

Fri 23 Sep

Displayed time zone: Athens change

13:30 - 15:00
Session 5B - Development & Testing & Behavioral 2ESEM Technical Papers at Sonck
Chair(s): Sheila Reinehr Pontifícia Universidade Católica do Paraná (PUCPR)
13:30
15m
Full-paper
Potential Technical Debt and Its Resolution in Code Reviews: An Exploratory Study of the OpenStack and Qt Communities
ESEM Technical Papers
Liming Fu Wuhan University, Peng Liang Wuhan University, China, Zeeshan Rasheed Wuhan University, Zengyang Li Central China Normal University, Amjed Tahir Massey University, Xiaofeng Han Wuhan University, China
Link to publication DOI Pre-print
13:45
15m
Full-paper
MMF3: Neural Code Summarization Based on Multi-Modal Fine-Grained Feature Fusion
ESEM Technical Papers
Zheng Ma Shandong Normal University, Yuexiu Gao Shandong Normal University, Lei Lyu Shandong Normal University, Chen Lyu Shandong Normal University
14:00
15m
Full-paper
PG-VulNet: Detect Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs
ESEM Technical Papers
Xin Liu Lanzhou University, Yixiong Wu Institute for Network Science and Cyberspace of Tsinghua University, Qingchen Yu Zhejiang University, Shangru Song Beijing Institute of Technology, Yue Liu Southeast University; Qi An Xin Group Corp., Qingguo Zhou Lanzhou University, Jianwei Zhuge Tsinghua University
14:15
15m
Full-paper
Heterogeneous Graph Neural Networks for Software Effort Estimation
ESEM Technical Papers
Hung Phan Iowa State University, Ali Jannesari Iowa State University
Pre-print
14:30
15m
Full-paper
Meetings and Mood - Related or Not? Insights from Student Software Projects
ESEM Technical Papers
Jil Klünder Leibniz Universität Hannover, Oliver Karras TIB - Leibniz Information Centre for Science and Technology
Pre-print
14:45
15m
Full-paper
A Tale of Two Tasks: Automated Issue Priority Prediction with Deep Multi-task Learning
ESEM Technical Papers
Yingling Li , Xing Che , Yuekai Huang Institute of Software, Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences, Song Wang York University, Yawen Wang Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences