Unleashing the power of pseudo-code for binary code similarity analysis

نویسندگان

چکیده

Abstract Code similarity analysis has become more popular due to its significant applicantions, including vulnerability detection, malware and patch analysis. Since the source code of software is difficult obtain under most circumstances, binary-level (BCSA) been paid much attention to. In recent years, many BCSA studies incorporating AI techniques focus on deriving semantic information from binary functions with representations such as assembly code, intermediate representations, control flow graphs measure similarity. However, impacts different compilers, architectures, obfuscations, binaries compiled same may vary considerably, which becomes major obstacle for these works robust features. this paper, we propose a solution, named UPPC (Unleashing Power Pseudo-code), leverages pseudo-code function input, address challenge, since higher abstraction platform-independent compared instructions. selectively inlines capture full semantics across compiler optimization levels uses deep pyramidal convolutional neural network embedding function. We evaluated data set containing vulnerabilities architectures (X86, ARM), options (O0-O3), compilers (GCC, Clang), four obfuscation strategies. The experimental results show that accuracy in search 33.2% than existing methods.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

analysis of power in the network society

اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...

15 صفحه اول

The BINCOA Framework for Binary Code Analysis

This paper presents the BINCOA framework, whose goal is to ease the development of binary code analysers by providing an open formal model for low-level programs (typically: executable files), an XML format for easy exchange of models and some basic tool support. The BINCOA framework already comes with three different analysers, including simulation, test generation and Control-Flow Graph recon...

متن کامل

Static Analysis on Binary Code

As the number and sophistication of attacks increase, static analysis gains attention. Since it is binary code that is executed directly on the bare-metal, binary-level static analysis offers root-cause approaches to security problems such as malware detection. In this survey, we start with the challenges to do binary-level static analysis and then transfer to the advantages of carrying out sta...

متن کامل

Temporal code versus rate code for binary Information Sources

Neuroscientists formulate very different hypotheses about the nature of neural code. At one extreme, it has been argued that neurons encode information in relatively slow changes of individual spikes arriving rates (rates codes) and the irregularity in the spike trains reflects noise in the system, while in the other extreme this irregularity is the code itself (temporal codes) thus the precise...

متن کامل

High Rate Binary Coset Code Used for Inner Code

High rate binary coset codes are investigated. The binary coset(BC) code is a binary convolutional code with parallel path. In our previous research of concatenated trelliscoded modulation(TCM) scheme, we have found that the e ective minimum distance of inner code is more important than the minimum free distance when TCM is used as inner code. In this paper, for inner code, we construct the hig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cybersecurity

سال: 2022

ISSN: ['2523-3246']

DOI: https://doi.org/10.1186/s42400-022-00121-0