A Survey on Binary Code Vulnerability Mining Technology
نویسندگان
چکیده
With the increase of software complexity, security threats faced by are also increasing day day. So people pay more and attention to mining vulnerabilities. Although source code has rich semantics strong comprehensibility, vulnerability been widely used achieved significant development. However, due protection commercial interests intellectual property rights, it is difficult obtain code. Therefore, research on technology binary practical value. Based investigation related technologies, this article firstly introduces current typical analysis framework, then briefly background significance intermediate language; with rise artificial intelligence, a large number machine learning methods have tried solve problem mining. This divides vulnerabilities into traditional technology, respectively its basic principles, status existing problems, summarizes them. Finally, based work, puts forward prospect future program
منابع مشابه
A Survey on Tools for Binary Code Analysis
Different strategies for binary analysis are widely used in systems dealing with software maintenance and system security. Binary code is self-contained; though it is easy to execute, it is not easy to read and understand. Binary analysis tools are useful in software maintenance because the binary of software has all the information necessary to recover the source code. It is also incredibly im...
متن کاملVulnerability Measure of a Network - a Survey
In this paper we discuss about tenacity and its properties in stability calculation. We indicate relationships between tenacity and connectivity, tenacity and binding number, tenacity and toughness. We also give good lower and upper bounds for tenacity. Since we are primarily interested in the case where disruption of the graph is caused by the removal of a vertex or vertices (and the resulting...
متن کاملSemHunt: Identifying Vulnerability Type with Double Validation in Binary Code
when manufacturers release patches, they are usually released as binary executable programs. Vendors generally do not disclose the exact location of the vulnerabilities, even they may conceal some of the vulnerabilities, which is not conducive to study the in-depth situation of security for the need of consumers. In this paper we introduce a vulnerability discover method using machine learning ...
متن کاملA Survey On the Vulnerability Parameters of Networks
The analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. One is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. In terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. When certain vert...
متن کاملA Survey of Automated Code-Level Aspect Mining Techniques
This paper offers a first, in-breadth survey and comparison of current aspect mining tools and techniques. It focuses mainly on automated techniques that mine a program’s static or dynamic structure for candidate aspects. We present an initial comparative framework for distinguishing aspect mining techniques, and assess known techniques against this framework. The results of this assessment may...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of information hiding and privacy protection
سال: 2021
ISSN: ['2637-4226', '2637-4234']
DOI: https://doi.org/10.32604/jihpp.2021.027280