2019
DOI: 10.3390/app9194086
|View full text |Cite
|
Sign up to set email alerts
|

Instruction2vec: Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN

Abstract: Potential software weakness, which can lead to exploitable security vulnerabilities, continues to pose a risk to computer systems. According to Common Vulnerability and Exposures, 14,714 vulnerabilities were reported in 2017, more than twice the number reported in 2016. Automated vulnerability detection was recommended to efficiently detect vulnerabilities. Among detection techniques, static binary analysis detects software weakness based on existing patterns. In addition, it is based on existing patterns or r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(23 citation statements)
references
References 12 publications
(19 reference statements)
0
23
0
Order By: Relevance
“…Instruction2Vec + Text-CNN This combination of methods [12,11] is evaluated on a small subset of the Juliet test suite, namely vulnerabilities of type CWE 121 (stack-based buffer overflows). It also relies on assembly language instructions instead of source code.…”
Section: Comparison With Other Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Instruction2Vec + Text-CNN This combination of methods [12,11] is evaluated on a small subset of the Juliet test suite, namely vulnerabilities of type CWE 121 (stack-based buffer overflows). It also relies on assembly language instructions instead of source code.…”
Section: Comparison With Other Methodsmentioning
confidence: 99%
“…Lee et al [12] combine a bespoke encoding of assembly language instructions called Instruction2vec [11] with a deep learning model "Text-CNN" to detect vulnerabilities in binary code. The encoding represents each instruction as a vector of a fixed length.…”
Section: Vulnerability Detection Using Assembly Language Representationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The work [ 39 ] is devoted to finding vulnerabilities in software using static analysis. ELF files are considered programs, and their templates are analyzed for vulnerability criteria.…”
Section: Analysis Of Existing Review Workmentioning
confidence: 99%
“…Some early works apply fully-connected neural networks (FCNs) to learn high-level discriminative features from the low-level features that are manually crafted [16]. Considering software code is sequentially dependent data, CNNs are proposed to learn representations from code context of small sizes [17]. RNNs are introduced to model dependencies in code sequences and learn code vulnerability patterns [18].…”
Section: Introductionmentioning
confidence: 99%