A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks

被引:0
|
作者
Lai, Ji [1 ]
Li, Shuo [1 ]
Yao, Qigui [2 ]
机构
[1] Informat & Telecomnunicat Co, Platform Operat & Secur Dept, Beijing 100000, Peoples R China
[2] Global Energy Interconnect Res Inst Co Ltd, State Grid Key Lab Informat & Network Secur, Nanjing 210000, Peoples R China
关键词
Vulnerability discovery; Generative adversarial networks; Fuzzing; Symbolic execution; Automatic code generation technology;
D O I
10.1007/978-3-031-06791-4_50
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Generative adversarial networks (GAN) is one of the most promising methods of unsupervised learning in complex distribution in recent years. Gan is widely used to generate data sets for data enhancement. However, the existing binary vulnerability mining methods can be divided into three ways: static analysis, dynamic analysis and dynamic static analysis. The research on the method of fundamentally expanding the data set to achieve vulnerability mining also has strong application value. Therefore, aiming at the problem of too few binary code vulnerability data sets, this paper proposes a binary code vulnerability mining model based on generation countermeasure network. In particular, the proposed system also combines automatic code generation technology, fuzzy testing and symbol execution technology to further optimize and train the generator and discriminator in the generation countermeasure network model to generate high-quality data sets. The experimental results show that, The binary code vulnerability mining model based on generative countermeasure network proposed in this paper can effectively solve the problem of too few data sets.
引用
收藏
页码:639 / 650
页数:12
相关论文
共 50 条
  • [1] A Novel Seed Generation Approach for Vulnerability Mining Based on Generative Adversarial Networks and Attention Mechanisms
    Du, Chunlai
    Xu, Guizhi
    Guo, Yanhui
    Wang, Zhongru
    Yu, Weiqiang
    [J]. MATHEMATICS, 2024, 12 (05)
  • [2] Binary Generative Adversarial Networks for Image Retrieval
    Song, Jingkuan
    He, Tao
    Gao, Lianli
    Xu, Xing
    Hanjalic, Alan
    Shen, Heng Tao
    [J]. THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 394 - 401
  • [3] Image registration method based on Generative Adversarial Networks
    Sun, Yujie
    Qi, Heping
    Wang, Chuanyou
    Tao, Lei
    [J]. 2020 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD 2020), 2020, : 183 - 188
  • [4] Age Estimation Method Based on Generative Adversarial Networks
    Ning, Xin
    Li, Weijun
    Sun, Linjun
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 333 - 340
  • [5] Texture synthesis method based on generative adversarial networks
    Yu, Siquan
    Han, Zhi
    Tang, Yandong
    Wu, Chengdong
    [J]. Hongwai yu Jiguang Gongcheng/Infrared and Laser Engineering, 2018, 47 (02):
  • [6] A New Steganography Method Based on Generative Adversarial Networks
    Naito, Hiroshi
    Zhao, Qiangfu
    [J]. 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST 2019), 2019, : 495 - 500
  • [7] An Iootfuzzer Method for Vulnerability Mining of Internet of Things Devices based on Binary Source Code and Feedback Fuzzing
    Guo, Guangxin
    Wang, Chao
    Dong, Jiahan
    Li, Bowen
    Wang, Xiaohu
    [J]. International Journal of Advanced Computer Science and Applications, 2022, 13 (07): : 692 - 697
  • [8] An Iootfuzzer Method for Vulnerability Mining of Internet of Things Devices based on Binary Source Code and Feedback Fuzzing
    Guo, Guangxin
    Wang, Chao
    Dong, Jiahan
    Li, Bowen
    Wang, Xiaohu
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (07) : 692 - 697
  • [9] Rectified Binary Convolutional Networks with Generative Adversarial Learning
    Liu, Chunlei
    Ding, Wenrui
    Hu, Yuan
    Zhang, Baochang
    Liu, Jianzhuang
    Guo, Guodong
    Doermann, David
    [J]. INTERNATIONAL JOURNAL OF COMPUTER VISION, 2021, 129 (04) : 998 - 1012
  • [10] Seismic inverse modeling method based on generative adversarial networks
    Xie, Pengfei
    Hou, Jiagen
    Yin, Yanshu
    Chen, Zhangxin
    Chen, Mei
    Wang, Lixin
    [J]. JOURNAL OF PETROLEUM SCIENCE AND ENGINEERING, 2022, 215