Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

被引:0
|
作者
Li, Xiaonan [1 ,2 ]
Zhang, Guimin [1 ]
Li, Qingbao [1 ]
Zhang, Ping [1 ]
Chen, Zhifeng [1 ]
Liu, Jinjin [2 ]
Yue, Shudan [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450001, Henan, Peoples R China
[2] Zhongyuan Univ Technol, Sch Comp Sci, Zhengzhou 450007, Henan, Peoples R China
关键词
Binary Similarity; Composite Feature Model; Cross-Architecture; Graph Embedding Network; Vulnerability Detection;
D O I
10.3837/tiis.2023.08.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.
引用
收藏
页码:2101 / 2123
页数:23
相关论文
共 50 条
  • [21] CFDVex: A Novel Feature Extraction Method for Detecting Cross-Architecture loT Malware
    Tran Nghi Phu
    Le Huy Hoang
    Nguyen Ngoc Toan
    Nguyen Dai Tho
    Nguyen Ngoc Binh
    SOICT 2019: PROCEEDINGS OF THE TENTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, : 248 - 254
  • [22] MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning
    Vasan, Danish
    Alazab, Mamoun
    Venkatraman, Sitalakshmi
    Akram, Junaid
    Qin, Zheng
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1654 - 1667
  • [23] A Semantics-Based Approach on Binary Function Similarity Detection
    Zhang, Yuntao
    Fang, Binxing
    Xiong, Zehui
    Wang, Yanhao
    Liu, Yuwei
    Zheng, Chao
    Zhang, Qinnan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25910 - 25924
  • [24] Binary Vulnerability Similarity Detection Based on Function Parameter Dependency
    Xia, Bing
    Liu, Wenbo
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2023, 19 (01)
  • [25] BERTDeep-Ware: A Cross-architecture Malware Detection Solution for IoT Systems
    Hamad, Salma Abdalla
    Dai Hoang Tran
    Sheng, Quan Z.
    Zhang, Wei Emma
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 927 - 934
  • [26] From physics model to results: An optimizing framework for cross-architecture code generation
    Blazewicz, Marek
    Hinder, Ian
    Koppelman, David M.
    Brandt, Steven R.
    Ciznicki, Milosz
    Kierzynka, Michal
    Loeffler, Frank
    Schnetter, Erik
    Tao, Jian
    SCIENTIFIC PROGRAMMING, 2013, 21 (1-2) : 1 - 16
  • [27] MDABP: A Novel Approach to Detect Cross-Architecture IoT Malware Based on PaaS
    Zhao, Yang
    Kuerban, Alifu
    SENSORS, 2023, 23 (06)
  • [28] Binary Jaya algorithm based on binary similarity measure for feature selection
    Abhilasha Chaudhuri
    Tirath Prasad Sahu
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 5627 - 5644
  • [29] A Lightweight Cross-Version Binary Code Similarity Detection Based on Similarity and Correlation Coefficient Features
    Guo, Hui
    Huang, Shuguang
    Huang, Cheng
    Zhang, Min
    Pan, Zulie
    Shi, Fan
    Huang, Hui
    Hu, Donghui
    Wang, Xiaoping
    IEEE ACCESS, 2020, 8 : 120501 - 120512
  • [30] Binary Jaya algorithm based on binary similarity measure for feature selection
    Chaudhuri, Abhilasha
    Sahu, Tirath Prasad
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (12) : 5627 - 5644