{"title":"基于分片语义和节点顺序的二进制代码漏洞检测","authors":"Ningning Cui, Liwei Chen, Gang Shi","doi":"10.1109/ISCC58397.2023.10218114","DOIUrl":null,"url":null,"abstract":"The proliferation of code reuse and the prevalence of CPU architecture and compilation environment diversity inevitably lead to many similar cross-platform binary vulnerability codes. This paper designs a deep learning model based on slice semantic and node order to detect similarity vulnerabilities. Firstly, it traverses the program dependence graph (PDG) forward and backward from the library/API function node to generate the binary slice and then uses the bidirectional long short-term memory (BLSTM) network and attention mechanism to form the semantic feature vector of the binary slice. Secondly, it extracts the order information of the slice nodes in the PDG and forms the adjacency matrix, which is then fed into the convolutional neural network (CNN) to form the order feature vector. Finally, the semantic and order feature vector are fused and inputted into the siamese network for similarity vulnerability detection. The detection results show that our method can effectively detect vulnerability.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"BVSNO: Binary Code Vulnerability Detection Based on Slice Semantic and Node Order\",\"authors\":\"Ningning Cui, Liwei Chen, Gang Shi\",\"doi\":\"10.1109/ISCC58397.2023.10218114\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The proliferation of code reuse and the prevalence of CPU architecture and compilation environment diversity inevitably lead to many similar cross-platform binary vulnerability codes. This paper designs a deep learning model based on slice semantic and node order to detect similarity vulnerabilities. Firstly, it traverses the program dependence graph (PDG) forward and backward from the library/API function node to generate the binary slice and then uses the bidirectional long short-term memory (BLSTM) network and attention mechanism to form the semantic feature vector of the binary slice. Secondly, it extracts the order information of the slice nodes in the PDG and forms the adjacency matrix, which is then fed into the convolutional neural network (CNN) to form the order feature vector. Finally, the semantic and order feature vector are fused and inputted into the siamese network for similarity vulnerability detection. The detection results show that our method can effectively detect vulnerability.\",\"PeriodicalId\":265337,\"journal\":{\"name\":\"2023 IEEE Symposium on Computers and Communications (ISCC)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE Symposium on Computers and Communications (ISCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCC58397.2023.10218114\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE Symposium on Computers and Communications (ISCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC58397.2023.10218114","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
BVSNO: Binary Code Vulnerability Detection Based on Slice Semantic and Node Order
The proliferation of code reuse and the prevalence of CPU architecture and compilation environment diversity inevitably lead to many similar cross-platform binary vulnerability codes. This paper designs a deep learning model based on slice semantic and node order to detect similarity vulnerabilities. Firstly, it traverses the program dependence graph (PDG) forward and backward from the library/API function node to generate the binary slice and then uses the bidirectional long short-term memory (BLSTM) network and attention mechanism to form the semantic feature vector of the binary slice. Secondly, it extracts the order information of the slice nodes in the PDG and forms the adjacency matrix, which is then fed into the convolutional neural network (CNN) to form the order feature vector. Finally, the semantic and order feature vector are fused and inputted into the siamese network for similarity vulnerability detection. The detection results show that our method can effectively detect vulnerability.