2017
DOI: 10.18293/seke2017-117
|View full text |Cite
|
Sign up to set email alerts
|

SemHunt: Identifying Vulnerability Type with Double Validation in Binary Code

Abstract: Abstract-when manufacturers release patches, they are usually released as binary executable programs. Vendors generally do not disclose the exact location of the vulnerabilities, even they may conceal some of the vulnerabilities, which is not conducive to study the in-depth situation of security for the need of consumers. In this paper we introduce a vulnerability discover method using machine learning based on patch information -SemHunt. Firstly, we use it to compare two versions of the same program to get th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 10 publications
(7 reference statements)
0
5
0
Order By: Relevance
“…It not only presents precise, fine-grained and quantitative results about the differences at a whole binary scale but also explicitly reveals how code evolves across different versions or optimization levels. Because of the precision and fine-granularity, it has enabled many critical security usages in various scenarios when program-wide analysis is required, such as changed parts locating [1], malware analysis [28], [45], security patch analysis [55], [38], binary wide plagiarism detection [40] and patch-based exploit generation [11]. As a result, binary diffing has been an active research focus.…”
Section: Introductionmentioning
confidence: 99%
“…It not only presents precise, fine-grained and quantitative results about the differences at a whole binary scale but also explicitly reveals how code evolves across different versions or optimization levels. Because of the precision and fine-granularity, it has enabled many critical security usages in various scenarios when program-wide analysis is required, such as changed parts locating [1], malware analysis [28], [45], security patch analysis [55], [38], binary wide plagiarism detection [40] and patch-based exploit generation [11]. As a result, binary diffing has been an active research focus.…”
Section: Introductionmentioning
confidence: 99%
“…Binary code similarity comparison is used for detecting whether two given binary functions are similar. It plays an essential role in many computer security applications, including code clone detection [1][2][3][4], malware classification [5][6][7][8], security patch analysis [9,10], and vulnerability discovery [11][12][13]. However, with the increase of various options for compilation settings, the binary code similarity comparison faces some severe challenges.…”
Section: Introductionmentioning
confidence: 99%
“…Such applications are of pa interest to hackers, because finding vulnerabilities in them does not require special embedded systems background. There are many different file systems for embedded devices including SquashFS 26 , UBIFS 27 , YAFFS2 28 , and JFFS2 29 .…”
Section: Firmware Extractionmentioning
confidence: 99%
“…blocks of IR instructions [24] and conditional formulas [25]. Recently, machine learning algorithms have also been leveraged in order to quickly find code similar to a known vulnerable component [26], [27], [28].…”
Section: Finding Potentially Vulnerable Componentsmentioning
confidence: 99%
See 1 more Smart Citation