VulDet-BC: Binary Software Vulnerability Detection Based on BiGRU and CNN

被引:0
|
作者
Cai, Xinxin [1 ]
Chen, Xin [1 ]
Yu, Dongjing [1 ]
Ye, Xinjiang [2 ]
Lv, Fanrong [3 ]
机构
[1] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou, Peoples R China
[2] Zhejiang Merit Interact Network Technol Co Ltd, Hangzhou, Peoples R China
[3] Hangzhou Cloudglab Technol Co Ltd, Hangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
BiGRU-Attention; CNN; vulnerability detection; static binary analysis; binary vulnerability;
D O I
10.1109/COMPSAC61105.2024.00183
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Existing binary vulnerability detection methods are mainly divided into static analysis and dynamic analysis. Compared with dynamic analysis, static analysis has higher code coverage and detection efficiency but is limited by accuracy. Recently, deep learning has achieved a significant improvement in static analysis for binary vulnerability detection. However, static analysis still suffers from two limitations: (i) the identification of function vulnerabilities relies on their patches; (ii) feature extraction either loses contextual dependency or cannot effectively extract local features. In this paper, we propose a new binary vulnerability detection method named VulDet-BC by combining bidirectional gated recurrent units (BiGRU) and convolutional neural networks (CNN). First, VulDet-BC preprocesses binary code text to make each function have the same text structure. Then, for each instruction, we perform BiGRU with word-attention to generate the vector representation which contains contextual dependency between words. Finally, another BiGRU and CNN are combined to train the prediction model and the eventual model is adopted to forecast whether target binary functions contain vulnerabilities or not. VulDet-BC not only preserves long-distance information but also effectively extracts local features related to vulnerabilities. We have applied VulDet-BC to the dataset with 15,954 non-vulnerable functions and 16,327 vulnerable functions. The experimental results show that VulDet-BC achieves 86.7% in terms of accuracy, 97.6% in terms of recall, 80.8% in terms of precision, 88.3% in terms of F1-score, and 86.3% in terms of area under curve (AUC) on average, and outperforms the state-of-the-art baseline.
引用
收藏
页码:1388 / 1397
页数:10
相关论文
共 50 条
  • [21] Binary Vulnerability Similarity Detection Based on Function Parameter Dependency
    Xia, Bing
    Liu, Wenbo
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2023, 19 (01)
  • [22] Deep-Learning-Based Vulnerability Detection in Binary Executables
    Schaad, Andreas
    Binder, Dominik
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 453 - 460
  • [23] Ontology-based services for software vulnerability detection: a survey
    Wang, Bingquan
    Cui, Baojiang
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2019, 13 (04) : 333 - 339
  • [24] A New Framework for Software Vulnerability Detection Based on an Advanced Computing
    Cong, Bui Van
    Xuan, Cho Do
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (03): : 3699 - 3723
  • [25] Ontology-based services for software vulnerability detection: a survey
    Bingquan Wang
    Baojiang Cui
    Service Oriented Computing and Applications, 2019, 13 : 333 - 339
  • [26] A Software Vulnerability Detection Method Based on Complex Network Community
    Shan, Chun
    Gong, Yinghui
    Xiong, Ling
    Liao, Shuyan
    Wang, Yuyang
    Security and Communication Networks, 2022, 2022
  • [27] A novel approach for software vulnerability detection based on advanced computing
    Cho Do Xuan
    Huynh Nhat Anh
    Neural Computing and Applications, 2025, 37 (6) : 5121 - 5139
  • [28] Automatic Software Vulnerability Detection Based on Guided Deep Fuzzing
    Cai, Jun
    Yang, Shangfei
    Men, Jinquan
    He, Jun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 231 - 234
  • [29] Automated Software Vulnerability Detection Based on Hybrid Neural Network
    Li, Xin
    Wang, Lu
    Xin, Yang
    Yang, Yixian
    Tang, Qifeng
    Chen, Yuling
    APPLIED SCIENCES-BASEL, 2021, 11 (07):
  • [30] Transformer-Based Language Models for Software Vulnerability Detection
    Thapa, Chandra
    Jang, Seung Ick
    Ahmed, Muhammad Ejaz
    Camtepe, Seyit
    Pieprzyk, Josef
    Nepal, Surya
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 481 - 496