SROBR: Semantic Representation of Obfuscation-Resilient Binary Code

被引:1
|
作者
Tang K. [1 ]
Shan Z. [1 ]
Liu F. [1 ]
Huang Y. [1 ]
Sun R. [1 ]
Qiao M. [1 ]
Zhang C. [1 ]
Wang J. [1 ]
Gui H. [1 ]
机构
[1] State Key Laboratory of Mathematical Engineering and Advanced Computing, China
关键词
D O I
10.1155/2022/4095481
中图分类号
学科分类号
摘要
With the rapid development of information technology, the scale of software has increased exponentially. Binary code similarity detection technology plays an important role in many fields, such as detecting software plagiarism, vulnerabilities discovery, and copyright solution issues. Nevertheless, what cannot be ignored is that a variety of approaches to binary code semantic representation have been introduced recently, but few can catch up with existing code obfuscation techniques due to their maturing and extensive development. In order to solve this problem, we propose a new neural network model, named SROBR, which is a deep integration of natural language processing model and graph neural network. In SROBR, BERT is applied to capture sequence information of the binary code at the first place, and then GAT is utilized to capture the structural information. It combines natural language processing and graph neural network, which can capture the semantic information of binary programs while resisting obfuscation options in a more efficient way. Through binary code similarity detection task and obfuscated option classification task, the experimental results demonstrate that SROBR outperforms existing binary similarity detection methods in resisting obfuscation techniques. © 2022 Ke Tang et al.
引用
收藏
相关论文
共 50 条
  • [41] Binary Code for the Compact Palmprint Representation Using Texture Features
    Gielczyk, Agata
    Marcialis, Gian Luca
    Choras, Michal
    COMPUTER ANALYSIS OF IMAGES AND PATTERNS, CAIP 2019, PT II, 2019, 11679 : 132 - 142
  • [42] Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures
    Qasem, Abdullah
    Debbabi, Mourad
    Lebel, Bernard
    Kassouf, Marthe
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 443 - 456
  • [43] Random table and hash coding-based binary code obfuscation against stack trace analysis
    Xie, Xin
    Lu, Bin
    Gong, Daofu
    Luo, Xiangyang
    Liu, Fenlin
    IET INFORMATION SECURITY, 2016, 10 (01) : 18 - 27
  • [44] Automatic Detection of Architectural Bad Smells through Semantic Representation of Code
    Pigazzini, Ilaria
    13TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2019), VOL 2, 2019, : 59 - 62
  • [45] BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning
    He, Xu
    Wang, Shu
    Feng, Pengbin
    Wang, Xinda
    Sun, Shiyu
    Li, Qi
    Sun, Kun
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 838 - 851
  • [46] Progressive coding of binary voxel models based on pattern code representation
    Roh, BG
    Kim, CS
    Lee, SU
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (12): : 3334 - 3342
  • [47] 3D-curve representation by means of a binary chain code
    Bribiesca, E
    MATHEMATICAL AND COMPUTER MODELLING, 2004, 40 (3-4) : 285 - 295
  • [48] USE OF BINARY AND GRAY CODE SCHEMES FOR CONTINUOUS TONE PICTURE REPRESENTATION
    DEUTSCH, ES
    PATTERN RECOGNITION, 1973, 5 (02) : 121 - &
  • [49] BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)
    Alrabaee, Saed
    Wang, Lingyu
    Debbabi, Mourad
    DIGITAL INVESTIGATION, 2016, 18 : S11 - S22
  • [50] Semantic aware-based instruction embedding for binary code similarity detection
    Jia, Yuhao
    Yu, Zhicheng
    Hong, Zhen
    PLOS ONE, 2024, 19 (06):