Comparison of binary procedures: A set of techniques for evading compiler transformations

被引:0
|
作者
Radivojević, Zaharije [1 ]
Cvetanović, Miloš [1 ]
Stojanović, Saša [1 ]
机构
[1] School of Electrical Engineering, University of Belgrade, Bulevar Kralja Aleksandra 73, Belgrade,11000, Serbia
来源
Computer Journal | 2015年 / 59卷 / 01期
关键词
723.1 Computer Programming - 723.2 Data Processing and Image Processing - 902.3 Legal Aspects;
D O I
暂无
中图分类号
学科分类号
摘要
License violation analysis may require digital forensics in the performance of a time-consuming search in order to find out whether a binary code of a product contains a procedure that originates from a source code for which a license is required. The conducted experiment shows that the production of a binary code using an arbitrary compiler decreases results of the evaluated solutions up to 10 times. The best performing solution, among those evaluated, uses software metrics for assessing similarities between procedures and ranks procedures from the binary code according to their similarities with the target forensics procedure. This paper tries to improve the ranking by proposing five techniques for making similarities assessment more robust against compiler transformations. The proposed techniques filter stack instructions and transfer instructions, retain partial information about the instruction order, simulate inlining, and eliminate procedures that significantly differ from the searched procedure. The techniques are evaluated using a dataset based on the STAMP benchmark and re-evaluated using a dataset based on the BusyBox toolset. The evaluation shows that the use of the proposed techniques increases recall by 47 and 42% for the first and second datasets, respectively. © 2015 The British Computer Society 2015. All rights reserved.
引用
收藏
页码:106 / 118
相关论文
共 50 条
  • [1] Comparison of Binary Procedures: A Set of Techniques for Evading Compiler Transformations
    Radivojevic, Zaharije
    Cvetanovic, Milos
    Stojanovic, Sasa
    COMPUTER JOURNAL, 2016, 59 (01): : 106 - 118
  • [2] Evading Anti-debugging Techniques with Binary Substitution
    Lee, JaeKeun
    Kang, BooJoong
    Im, Eul Gyu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 183 - 192
  • [3] An Empirical Comparison of Compiler Testing Techniques
    Chen, Junjie
    Hu, Wenxiang
    Hao, Dan
    Xiong, Yingfei
    Zhang, Hongyu
    Zhang, Lu
    Xie, Bing
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, : 180 - 190
  • [4] Techniques for formal transformations of binary decision diagrams
    Kolotov, G
    Levin, I
    Ostrovsky, V
    ICECS 2004: 11th IEEE International Conference on Electronics, Circuits and Systems, 2004, : 511 - 514
  • [5] A comparison of discriminant procedures for binary variables
    Asparoukhov, OK
    Krzanowski, WJ
    COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2001, 38 (02) : 139 - 160
  • [6] A comparison of sample set restriction procedures
    Legg, Jason C.
    Yu, Cindy L.
    SURVEY METHODOLOGY, 2010, 36 (01) : 69 - 79
  • [7] A comparison of configuration techniques for model transformations
    Wagelaar, Dennis
    Van der Straeten, Ragnhild
    MODEL DRIVEN ARCHITECTURE - FOUNDATIONS AND APPLICATIONS, PROCEEDINGS, 2006, 4066 : 331 - 345
  • [8] Using binary operations to construct a transitive set of block transformations
    Cherednik, Igor, V
    DISCRETE MATHEMATICS AND APPLICATIONS, 2020, 30 (06): : 375 - 389
  • [9] A comparison of set redundancy compression techniques
    Ait-Aoudia, Samy
    Gabis, Abdelhalim
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2006, 2006 (1)
  • [10] A Comparison of Set Redundancy Compression Techniques
    Samy Ait-Aoudia
    Abdelhalim Gabis
    EURASIP Journal on Advances in Signal Processing, 2006