SROBR: Semantic Representation of Obfuscation-Resilient Binary Code

被引:1
|
作者
Tang K. [1 ]
Shan Z. [1 ]
Liu F. [1 ]
Huang Y. [1 ]
Sun R. [1 ]
Qiao M. [1 ]
Zhang C. [1 ]
Wang J. [1 ]
Gui H. [1 ]
机构
[1] State Key Laboratory of Mathematical Engineering and Advanced Computing, China
关键词
D O I
10.1155/2022/4095481
中图分类号
学科分类号
摘要
With the rapid development of information technology, the scale of software has increased exponentially. Binary code similarity detection technology plays an important role in many fields, such as detecting software plagiarism, vulnerabilities discovery, and copyright solution issues. Nevertheless, what cannot be ignored is that a variety of approaches to binary code semantic representation have been introduced recently, but few can catch up with existing code obfuscation techniques due to their maturing and extensive development. In order to solve this problem, we propose a new neural network model, named SROBR, which is a deep integration of natural language processing model and graph neural network. In SROBR, BERT is applied to capture sequence information of the binary code at the first place, and then GAT is utilized to capture the structural information. It combines natural language processing and graph neural network, which can capture the semantic information of binary programs while resisting obfuscation options in a more efficient way. Through binary code similarity detection task and obfuscated option classification task, the experimental results demonstrate that SROBR outperforms existing binary similarity detection methods in resisting obfuscation techniques. © 2022 Ke Tang et al.
引用
收藏
相关论文
共 50 条
  • [1] Obfuscation-Resilient Code Recognition in Android Apps
    Feichtner, Johannes
    Rabensteiner, Christof
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [2] Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation
    Schrittwieser, Sebastian
    Kochberger, Patrick
    Pucher, Michael
    Lawitschka, Caroline
    Koenig, Philip
    Weippl, Edgar R.
    SECURE IT SYSTEMS, NORDSEC 2022, 2022, 13700 : 273 - 291
  • [3] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection
    Luo, Lannan
    Ming, Jiang
    Wu, Dinghao
    Liu, Peng
    Zhu, Sencun
    22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, : 389 - 400
  • [4] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection
    Luo, Lannan
    Ming, Jiang
    Wu, Dinghao
    Liu, Peng
    Zhu, Sencun
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2017, 43 (12) : 1157 - 1177
  • [5] ORLIS: Obfuscation-Resilient Library Detection for Android
    Wang, Yan
    Wu, Haowei
    Zhang, Hailong
    Rountev, Atanas
    2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT), 2018, : 13 - 23
  • [6] Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications
    Titze, Dennis
    Lux, Michael
    Schuette, Julian
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 618 - 625
  • [7] Lightweight versus obfuscation-resilient malware detection in android applications
    Aghamohammadi, Ali
    Faghih, Fathiyeh
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (02) : 125 - 139
  • [8] Obfuscation-Resilient Executable Payload Extraction From Packed Malware
    Cheng, Binlin
    Ming, Jiang
    Leal, Erika A.
    Zhang, Haotian
    Fu, Jianming
    Peng, Guojun
    Marion, Jean-Yves
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 3451 - 3468
  • [9] Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware
    Garcia, Joshua
    Hammad, Mahmoud
    Malek, Sam
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2018, 26 (03)
  • [10] Lightweight versus obfuscation-resilient malware detection in android applications
    Ali Aghamohammadi
    Fathiyeh Faghih
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 125 - 139