Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

被引:0
|
作者
Li, Xiaonan [1 ,2 ]
Zhang, Guimin [1 ]
Li, Qingbao [1 ]
Zhang, Ping [1 ]
Chen, Zhifeng [1 ]
Liu, Jinjin [2 ]
Yue, Shudan [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450001, Henan, Peoples R China
[2] Zhongyuan Univ Technol, Sch Comp Sci, Zhengzhou 450007, Henan, Peoples R China
关键词
Binary Similarity; Composite Feature Model; Cross-Architecture; Graph Embedding Network; Vulnerability Detection;
D O I
10.3837/tiis.2023.08.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.
引用
收藏
页码:2101 / 2123
页数:23
相关论文
共 50 条
  • [1] CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index Table
    Deng, Longmin
    Zhao, Dongdong
    Zhou, Junwei
    Xia, Zhe
    Xiang, Jianwen
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 527 - 536
  • [2] CRABS-former: CRoss-Architecture Binary Code Similarity Detection based on Transformer
    Feng, Yuhong
    Li, Haoran
    Cao, Yixuan
    Wang, Yufeng
    Feng, Haiyue
    PROCEEDINGS OF THE 15TH ASIA-PACIFIC SYMPOSIUM ON INTERNETWARE, INTERNETWARE 2024, 2024, : 11 - 20
  • [3] Cross-Architecture Binary Function Fingerprinting
    Hartman, Corey M.
    Rimal, Bhaskar P.
    de Leon, Daniel Conte
    Budhathoki, Nirmal
    IEEE SECURITY & PRIVACY, 2024,
  • [4] Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized LLVM IR
    Yan, Yintong
    Yu, Lu
    Wang, Taiyan
    Li, Yuwei
    Pan, Zulie
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 95 - 113
  • [5] Multi-Level Cross-Architecture Binary Code Similarity Metric
    Meng Qiao
    Xiaochuan Zhang
    Huihui Sun
    Zheng Shan
    Fudong Liu
    Wenjie Sun
    Xingwei Li
    Arabian Journal for Science and Engineering, 2021, 46 : 8603 - 8615
  • [6] Multi-Level Cross-Architecture Binary Code Similarity Metric
    Qiao, Meng
    Zhang, Xiaochuan
    Sun, Huihui
    Shan, Zheng
    Liu, Fudong
    Sun, Wenjie
    Li, Xingwei
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) : 8603 - 8615
  • [7] CAIMP: Cross-Architecture IoT Malware Detection and Prediction Based On Static Feature
    Dung, Luong The
    Toan, Nguyen Ngoc
    Phu, Tran Nghi
    COMPUTER JOURNAL, 2024, 67 (09): : 2763 - 2776
  • [8] Inter-BIN: Interaction-Based Cross-Architecture IoT Binary Similarity Comparison
    Song, Qige
    Zhang, Yongzheng
    Wang, Binglai
    Chen, Yige
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (20): : 20018 - 20033
  • [9] Cross-Architecture Bug Search in Binary Executables
    Pewny, Jannik
    Garmany, Behrad
    Gawlik, Robert
    Rossow, Christian
    Holz, Thorsten
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 709 - 724
  • [10] Cross Architecture Function Similarity Detection with Binary Lifting and Neural Metric Learning
    Tian, Zhenzhou
    Li, Chen
    Qiu, Sihao
    ADVANCES IN NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, ICNC-FSKD 2022, 2023, 153 : 27 - 34