Deep-Learning-Based Vulnerability Detection in Binary Executables

被引:0
|
作者
Schaad, Andreas [1 ]
Binder, Dominik [1 ]
机构
[1] Offenburg Univ Appl Sci, Offenburg, Germany
关键词
D O I
10.1007/978-3-031-30122-3_28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The identification of vulnerabilities is an important element in the software development life cycle to ensure the security of software. While vulnerability identification based on the source code is a well studied field, the identification of vulnerabilities on basis of a binary executable without the corresponding source code is more challenging. Recent research [1] has shown how such detection can generally be enabled by deep learning methods, but appears to be very limited regarding the overall amount of detected vulnerabilities. We analyse to what extent we could cover the identification of a larger variety of vulnerabilities. Therefore, a supervised deep learning approach using recurrent neural networks for the application of vulnerability detection based on binary executables is used. The underlying basis is a dataset with 50,651 samples of vulnerable code in the form of a standardised LLVM Intermediate Representation. Te vectorised features of a Word2Vec model are used to train different variations of three basic architectures of recurrent neural networks (GRU, LSTM, SRNN). A binary classification was established for detecting the presence of an arbitrary vulnerability, and a multi-class model was trained for the identification of the exact vulnerability, which achieved an out-of-sample accuracy of 88% and 77%, respectively. Differences in the detection of different vulnerabilities were also observed, with non-vulnerable samples being detected with a particularly high precision of over 98%. Thus, our proposed technical approach and methodology enables an accurate detection of 23 (compared to 4 [1]) vulnerabilities.
引用
收藏
页码:453 / 460
页数:8
相关论文
共 50 条
  • [1] Deep-learning-based binary hologram
    Goi, Hiroaki
    Komuro, Koshi
    Nomura, Takanori
    [J]. APPLIED OPTICS, 2020, 59 (23) : 7103 - 7108
  • [2] The Study on Integer Overflow Vulnerability Detection in Binary Executables Based Upon Genetic Algorithm
    Cui, Baojiang
    Liang, Xiaobing
    Wang, Jianxin
    [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2011), 2011, 122 : 259 - +
  • [3] A Review on Deep-Learning-Based Cyberbullying Detection
    Hasan, Md. Tarek
    Hossain, Md. Al Emran
    Mukta, Md. Saddam Hossain
    Akter, Arifa
    Ahmed, Mohiuddin
    Islam, Salekul
    [J]. FUTURE INTERNET, 2023, 15 (05)
  • [4] Deep-Learning-Based Research on Refractive Detection
    Ding, Shangshang
    Zheng, Tianli
    Yao, Kang
    Zhang, Hetong
    Pei, Ronghao
    Fu, Weiwei
    [J]. Computer Engineering and Applications, 2024, 59 (03) : 193 - 201
  • [5] Deep-learning-based sequential phishing detection
    Ogawa, Yuji
    Kimura, Tomotaka
    Cheng, Jun
    [J]. IEICE COMMUNICATIONS EXPRESS, 2022, 11 (04): : 171 - 175
  • [6] Deep-Learning-Based Detection of Segregations for Ultrasonic Testing
    Elischberger, Frederik
    Bamberg, Joachim
    Jiang, Xiaoyi
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2022, 71
  • [7] Deep-learning-based Intrusion Detection with Enhanced Preprocesses
    Lin, Chia-Ju
    Huang, Yueh-Min
    Chen, Ruey-Maw
    [J]. SENSORS AND MATERIALS, 2022, 34 (06) : 2391 - 2401
  • [8] Deep-Learning-Based Detection of Transmission Line Insulators
    Zhang, Jian
    Xiao, Tian
    Li, Minhang
    Zhou, Yucai
    [J]. ENERGIES, 2023, 16 (14)
  • [9] Literature Review of Deep-Learning-Based Detection of Violence in Video
    Negre, Pablo
    Alonso, Ricardo S.
    Gonzalez-Briones, Alfonso
    Prieto, Javier
    Rodriguez-Gonzalez, Sara
    [J]. SENSORS, 2024, 24 (12)
  • [10] A Deep-Learning-Based Model for the Detection of Diseased Tomato Leaves
    Abdullah, Akram
    Amran, Gehad Abdullah
    Tahmid, S. M. Ahanaf
    Alabrah, Amerah
    AL-Bakhrani, Ali A.
    Ali, Abdulaziz
    [J]. AGRONOMY-BASEL, 2024, 14 (07):