BVDetector: A program slice-based binary code vulnerability intelligent detection system

被引:38
|
作者
Tian, Junfeng [1 ,2 ]
Xing, Wenjing [1 ,2 ]
Li, Zhen [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding, Hebei, Peoples R China
[2] Hebei Univ, Prov Key Lab High Reliabil Informat Syst, Baoding, Hebei, Peoples R China
基金
中国国家自然科学基金;
关键词
Binary program; Vulnerability detection; Deep learning; Program slice; Library/API function call;
D O I
10.1016/j.infsof.2020.106289
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Software vulnerability detection is essential to ensure cybersecurity. Currently, most software is published in binary form, thus researchers can only detect vulnerabilities in these software by analysing binary programs. Although existing research approaches have made a substantial contribution to binary vulnerability detection, there are still many deficiencies, such as high false positive rate, detection with coarse granularly, and dependence on expert experience. Objective: The goal of this study is to perform fine-grained intelligent detection on the vulnerabilities in binary programs. This leads us to propose a fine-grained representation of binary programs and introduce deep learning techniques to intelligently detect the vulnerabilities. Method: We use program slices of library/API function calls to represent binary programs. Additionally, we design and construct a Binary Gated Recurrent Unit (BGRU) network model to intelligently learn vulnerability patterns and automatically detect vulnerabilities in binary programs. Results: This approach yields the design and implementation of a program slice-based binary code vulnerability intelligent detection system called BVDetector. We show that BVDetector can effectively detect vulnerabilities related to library/API function calls in binary programs, which reduces the false positive rate and false negative rate of vulnerability detection. Conclusion: This paper proposes a program slice-based binary code vulnerability intelligent detection system called BVDetector. The experimental results show that BVDetector can effectively reduce the false negative rate and false positive rate of binary vulnerability detection.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] VulPecker: An Automated Vulnerability Detection System Based on Code Similarity Analysis
    Li, Zhen
    Zou, Deqing
    Xu, Shouhuai
    Jin, Hai
    Qi, Hanchao
    Hu, Jie
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 201 - 213
  • [22] VFDETECT: A Vulnerable Code Clone Detection System Based on Vulnerability Fingerprint
    Liu, Zhen
    Wei, Qiang
    Cao, Yan
    2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 548 - 553
  • [23] Evaluating volumetric and slice-based approaches for COVID-19 detection in chest CTs
    Miron, Radu
    Moisii, Cosmin
    Dinu, Sergiu
    Breaban, Mihaela Elena
    2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW 2021), 2021, : 529 - 536
  • [24] MalOSDF: An Opcode Slice-Based Malware Detection Framework Using Active and Ensemble Learning
    Guo, Wenjie
    Xue, Jingfeng
    Meng, Wenheng
    Han, Weijie
    Liu, Zishu
    Wang, Yong
    Li, Zhongjun
    ELECTRONICS, 2024, 13 (02)
  • [25] On the effects of program slicing for vulnerability detection during code inspection
    Papotti, Aurora
    Tuma, Katja
    Massacci, Fabio
    EMPIRICAL SOFTWARE ENGINEERING, 2025, 30 (03)
  • [26] Binary Program Vulnerability Mining Based on Neural Network
    Li, Zhenhui
    Xing, Shuangping
    Yu, Lin
    Li, Huiping
    Zhou, Fan
    Yin, Guangqiang
    Tang, Xikai
    Wang, Zhiguo
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (02): : 1861 - 1879
  • [27] Characterization of Radiologists' Search Strategies for Lung Nodule Detection: Slice-Based Versus Volumetric Displays
    Wang, Xiao Hui
    Durick, Janet E.
    Lu, Amy
    Herbert, David L.
    Golla, Saraswathi K.
    Foley, Kristin
    Piracha, C. Samia
    Shinde, Dilip D.
    Shindel, Betty E.
    Fuhrman, Carl R.
    Britton, Cynthia A.
    Strollo, Diane C.
    Shang, Sherry S.
    Lacomis, Joan M.
    Good, Walter F.
    JOURNAL OF DIGITAL IMAGING, 2008, 21 (Suppl 1) : S39 - S49
  • [28] Characterization of Radiologists’ Search Strategies for Lung Nodule Detection: Slice-Based Versus Volumetric Displays
    Xiao Hui Wang
    Janet E. Durick
    Amy Lu
    David L. Herbert
    Saraswathi K. Golla
    Kristin Foley
    C. Samia Piracha
    Dilip D. Shinde
    Betty E. Shindel
    Carl R. Fuhrman
    Cynthia A. Britton
    Diane C. Strollo
    Sherry S. Shang
    Joan M. Lacomis
    Walter F. Good
    Journal of Digital Imaging, 2008, 21 : 39 - 49
  • [29] A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks
    Lai, Ji
    Li, Shuo
    Yao, Qigui
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 639 - 650
  • [30] Vulnerability based on Component Binary Code For Third-Party Component
    Xie, Wanggen
    Hu, Jinchang
    Kudjo, Patrick Kwaku
    Yu, Lei
    Zeng, Zhifeng
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 1255 - 1259