Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering 2018
DOI: 10.1145/3238147.3240480
|View full text |Cite
|
Sign up to set email alerts
|

VulSeeker: a semantic learning based vulnerability seeker for cross-platform binary

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
136
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 118 publications
(137 citation statements)
references
References 9 publications
1
136
0
Order By: Relevance
“…However, the solution heavily relies on CFG features and block-level attributes. Gao et al [17] present VulSeeker, a semantic learning-based vulnerability seeker for cross-platform binary. By integrating the CFG and the DFG of the binary function, they capture more function semantics and acquires a higher accuracy and efficiency.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the solution heavily relies on CFG features and block-level attributes. Gao et al [17] present VulSeeker, a semantic learning-based vulnerability seeker for cross-platform binary. By integrating the CFG and the DFG of the binary function, they capture more function semantics and acquires a higher accuracy and efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…CABS [14], BinGo [15] and Esh [16] divide the CFG into different parts, and improve their robustness to CFG changes by computing the overall CFG and CFG fragments similarities. To minimize the cost of the computation, DiscovRE [8], Genius [9], Gemini [10] and VulSeeker [17] extract some numeric features from CFGs or basic blocks. DiscovRE [8] employs these features as a pre-filter on CFGs and uses the KNN algorithm to identify a small set of candidate functions.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Such applications are of pa interest to hackers, because finding vulnerabilities in them does not require special embedded systems background. There are many different file systems for embedded devices including SquashFS 26 , UBIFS 27 , YAFFS2 28 , and JFFS2 29 .…”
Section: Firmware Extractionmentioning
confidence: 99%
“…blocks of IR instructions [24] and conditional formulas [25]. Recently, machine learning algorithms have also been leveraged in order to quickly find code similar to a known vulnerable component [26], [27], [28].…”
Section: Finding Potentially Vulnerable Componentsmentioning
confidence: 99%