Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Binary vulnerability code cloning detection method and system

A binary code and detection method technology, applied in the field of computer program detection, can solve problems such as high complexity, low accuracy, incomplete clone type detection, etc., to ensure comprehensiveness, universal applicability, and solve clone type detection incomplete effect

Active Publication Date: 2018-09-04
TSINGHUA UNIV
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In order to overcome the problems of incomplete detection of clone types, low accuracy, high complexity and difficult implementation in the existing detection methods of code cloning, the present invention provides a binary vulnerability code cloning detection method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary vulnerability code cloning detection method and system
  • Binary vulnerability code cloning detection method and system
  • Binary vulnerability code cloning detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0048] It should be noted that most of the existing research on clone code analysis technology is based on source code, and less research is based on binary code. But in some cases, we cannot get the source code, such as most commercial software will not release the source code, then it is particularly important to use binary files for similarity detection. In view of this, the present invention provides a binary vulnerability code clone detection method, comprising: extracting the function characteristics of the first function in the binary code to be detected and the function characteristics of the second function in the binary vulnerability code, the function characteri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a binary vulnerability code cloning detection method and system. The method comprises the steps of extracting a function characteristic of a first function in a to-be-detected binary code and a function characteristic of a second function in a binary vulnerability code, wherein the function characteristic comprises basic block information, control flow information and function call information; inputting the function characteristic of the first function and the function characteristic of the second function to a preset neural network, and calculating the similarity between the first function and the second function by utilizing the preset neural network; and when the similarity reaches a preset threshold, determining that a cloned code of the binary vulnerability code exists in the to-be-detected binary code. According to the method and the system, the problems of incomprehensive clone type detection, low accuracy, high complexity, difficult realization and the like in an existing code cloning detection method are solved; the comprehensiveness of clone type detection and the accuracy of a detection result are ensured; and the detection efficiency is effectively improved.

Description

technical field [0001] The present invention relates to the technical field of computer program detection, and more specifically, to a binary vulnerability code clone detection method and system. Background technique [0002] From the birth of the software industry to the present, with the rapid increase in the number of computer users, the software industry has developed rapidly and has penetrated into all aspects of people's work and life. Many software source codes are open on the Internet, and it has become a fast and effective production method for developers to query the relevant codes they need on the Internet. Copying a piece of code, after simple modification or direct copy and paste, and then applying it to a new scene is a common phenomenon in the software development process. This way of code reuse is called code cloning. A large number of cloned code segments exist in large-scale software development. There are still 19% code clones of high-quality systems re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F8/75
CPCG06F8/751
Inventor 姜宇杨鑫高健顾明孙家广
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products