Binary Vulnerability Similarity Detection Based on Function Parameter Dependency
Many existing works compute the binary vulnerability similarity based on binary procedure, which has coarse detection granularity and cannot locate the vulnerability trigger position accurately, and have a higher false positive rate, so a new binary vulnerability similarity detection method based on...
Saved in:
Published in | International journal on semantic web and information systems Vol. 19; no. 1; pp. 1 - 16 |
---|---|
Main Authors | , , , , , , , |
Format | Journal Article |
Language | English |
Published |
Hershey
IGI Global
01.01.2023
|
Subjects | |
Online Access | Get full text |
ISSN | 1552-6283 1552-6291 |
DOI | 10.4018/IJSWIS.322392 |
Cover
Summary: | Many existing works compute the binary vulnerability similarity based on binary procedure, which has coarse detection granularity and cannot locate the vulnerability trigger position accurately, and have a higher false positive rate, so a new binary vulnerability similarity detection method based on function parameter dependency in hazard API is proposed. First, convert the instructions of different architectures into an intermediate language, and use the compiler with a back-end optimizer to optimize and normalize the binary procedure. Then, locate the hazard API that appears in the binary procedure, and perform the function parameters dependency analysis to generate a set of parameter slices on the hazard API. Experiments show that the method has a higher recall rate (up to 14.3% better than the baseline model) in real-world scenarios, and not only locates the triggering position of the vulnerability but also identifies the fixed vulnerability. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 1552-6283 1552-6291 |
DOI: | 10.4018/IJSWIS.322392 |