BVDetector: A program slice-based binary code vulnerability intelligent detection system

被引:38
|
作者
Tian, Junfeng [1 ,2 ]
Xing, Wenjing [1 ,2 ]
Li, Zhen [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding, Hebei, Peoples R China
[2] Hebei Univ, Prov Key Lab High Reliabil Informat Syst, Baoding, Hebei, Peoples R China
基金
中国国家自然科学基金;
关键词
Binary program; Vulnerability detection; Deep learning; Program slice; Library/API function call;
D O I
10.1016/j.infsof.2020.106289
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Software vulnerability detection is essential to ensure cybersecurity. Currently, most software is published in binary form, thus researchers can only detect vulnerabilities in these software by analysing binary programs. Although existing research approaches have made a substantial contribution to binary vulnerability detection, there are still many deficiencies, such as high false positive rate, detection with coarse granularly, and dependence on expert experience. Objective: The goal of this study is to perform fine-grained intelligent detection on the vulnerabilities in binary programs. This leads us to propose a fine-grained representation of binary programs and introduce deep learning techniques to intelligently detect the vulnerabilities. Method: We use program slices of library/API function calls to represent binary programs. Additionally, we design and construct a Binary Gated Recurrent Unit (BGRU) network model to intelligently learn vulnerability patterns and automatically detect vulnerabilities in binary programs. Results: This approach yields the design and implementation of a program slice-based binary code vulnerability intelligent detection system called BVDetector. We show that BVDetector can effectively detect vulnerabilities related to library/API function calls in binary programs, which reduces the false positive rate and false negative rate of vulnerability detection. Conclusion: This paper proposes a program slice-based binary code vulnerability intelligent detection system called BVDetector. The experimental results show that BVDetector can effectively reduce the false negative rate and false positive rate of binary vulnerability detection.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Code vulnerability static detection method based on graphrepresentation and MHGAT
    Cheng J.
    Wang B.
    Luo P.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2023, 45 (05): : 1535 - 1543
  • [42] Example-Based Vulnerability Detection and Repair in Java Code
    Zhang, Ying
    Xiao, Ya
    Kabir, Md Mahir Asef
    Yao, Danfeng Daphne
    Meng, Na
    arXiv, 2022,
  • [43] Smart Contract Timestamp Vulnerability Detection Based on Code Homogeneity
    Wang, Weizhi
    Xia, Lei
    Zhang, Zhuo
    Meng, Xiankai
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2024, E107D (10) : 1362 - 1366
  • [44] Example-Based Vulnerability Detection and Repair in Java Code
    Zhang, Ying
    Xiao, Ya
    Kabir, Md Mahir Asef
    Yao, Danfeng
    Meng, Na
    IEEE International Conference on Program Comprehension, 2022, 2022-March : 190 - 201
  • [45] VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches
    Sun, Hao
    Cui, Lei
    Li, Lun
    Ding, Zhenquan
    Hao, Zhiyu
    Cui, Jiancong
    Liu, Peng
    COMPUTERS & SECURITY, 2021, 110
  • [46] Software Vulnerability Detection Based on Code Coverage and Test Cost
    Shuai, Bo
    Li, Haifeng
    Zhang, Lei
    Zhang, Quan
    Tang, Chaojing
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 317 - 321
  • [47] On the Code Vulnerability Detection Based on Deep Learning: A Comparative Study
    Li, Guiping
    Yang, Yege
    IEEE ACCESS, 2024, 12 : 152377 - 152391
  • [48] Vulnerability Detection Method Based on Structured Text and Code Metrics
    Yang H.
    Ying L.
    Zhang L.
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2022, 49 (04): : 58 - 68
  • [49] Slice-level vulnerability detection model based on graph neural network
    Ren, Jiadong
    Zhang, Jiao
    Li, Jiazheng
    Yang, Shuailin
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 52 - 57
  • [50] Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models
    Senanayake, Janaka
    Kalutarage, Harsha
    Al-Kadri, Mhd Omar
    Piras, Luca
    Petrovski, Andrei
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 659 - 666