SROBR: Semantic Representation of Obfuscation-Resilient Binary Code

被引:1
|
作者
Tang K. [1 ]
Shan Z. [1 ]
Liu F. [1 ]
Huang Y. [1 ]
Sun R. [1 ]
Qiao M. [1 ]
Zhang C. [1 ]
Wang J. [1 ]
Gui H. [1 ]
机构
[1] State Key Laboratory of Mathematical Engineering and Advanced Computing, China
关键词
D O I
10.1155/2022/4095481
中图分类号
学科分类号
摘要
With the rapid development of information technology, the scale of software has increased exponentially. Binary code similarity detection technology plays an important role in many fields, such as detecting software plagiarism, vulnerabilities discovery, and copyright solution issues. Nevertheless, what cannot be ignored is that a variety of approaches to binary code semantic representation have been introduced recently, but few can catch up with existing code obfuscation techniques due to their maturing and extensive development. In order to solve this problem, we propose a new neural network model, named SROBR, which is a deep integration of natural language processing model and graph neural network. In SROBR, BERT is applied to capture sequence information of the binary code at the first place, and then GAT is utilized to capture the structural information. It combines natural language processing and graph neural network, which can capture the semantic information of binary programs while resisting obfuscation options in a more efficient way. Through binary code similarity detection task and obfuscated option classification task, the experimental results demonstrate that SROBR outperforms existing binary similarity detection methods in resisting obfuscation techniques. © 2022 Ke Tang et al.
引用
收藏
相关论文
共 50 条
  • [21] Semantic-based code obfuscation by abstract interpretation
    Preda, MD
    Giacobazzi, R
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 1325 - 1336
  • [22] Research on deformation based binary code obfuscation technology
    Wang, Huai-Jun
    Fang, Ding-Yi
    Li, Guang-Hui
    Zhang, Cong
    Jiang, He
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (01): : 14 - 21
  • [23] Branch Obfuscation Using Binary Code Side Effects
    Lin, Hong
    Zhang, Xiaohua
    Yong, Ma
    Wang, Baohui
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER, NETWORKS AND COMMUNICATION ENGINEERING (ICCNCE 2013), 2013, 30 : 152 - 157
  • [24] A binary representation of the genetic code
    Nemzer, Louis R.
    BIOSYSTEMS, 2017, 155 : 10 - 19
  • [25] Fine-Grained Obfuscation Scheme Recognition on Binary Code
    Tian, Zhenzhou
    Mao, Hengchao
    Huang, Yaqian
    Tian, Jie
    Li, Jinrui
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2021, 2022, 441 : 215 - 228
  • [26] Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
    Ding, Steven H. H.
    Fung, Benjamin C. M.
    Charland, Philippe
    2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 472 - 489
  • [27] Multi-stage Binary Code Obfuscation Using Improved Virtual Machine
    Fang, Hui
    Wu, Yongdong
    Wang, Shuhong
    Huang, Yin
    INFORMATION SECURITY, 2011, 7001 : 168 - +
  • [28] Semantics-based binary code automated de-obfuscation approach
    Guo J.
    Wang L.
    Tang Z.
    Fang D.
    2016, Huazhong University of Science and Technology (44): : 55 - 59
  • [29] Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques
    Zhang, Peihua
    Wu, Chenggang
    Peng, Mingfan
    Zeng, Kai
    Yu, Ding
    Lai, Yuanming
    Kang, Yan
    Wang, Wei
    Wang, Zhe
    PROCEEDINGS OF THE 21ST ACM/IEEE INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, CGO 2023, 2023, : 55 - 67
  • [30] On the Representation of Results of Binary Code Reverse Engineering
    Padaryan, V. A.
    Ledovskikh, I. N.
    PROGRAMMING AND COMPUTER SOFTWARE, 2018, 44 (03) : 200 - 206