Similar vulnerability detection method and device for binary program

A binary program, vulnerability detection technology, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve problems such as insufficient scale capability and low accuracy, and achieve improved efficiency and effectiveness, improved accuracy, and improved detection. The effect of efficiency

Active Publication Date: 2021-10-01
INST OF INFORMATION ENG CAS
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention aims at the problems of low accuracy and insufficient scale capability existing in the existing similar loophole detection methods, and provides a similar loophole detection method and device for binary programs. Compilation options and binary programs in the case of code customization and reuse can improve the accuracy of detection, and at the same time, when the data scale is large, it can improve the efficiency of detection and solve the above-mentioned limitations and deficiencies of existing similar vulnerability detection methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Similar vulnerability detection method and device for binary program
  • Similar vulnerability detection method and device for binary program
  • Similar vulnerability detection method and device for binary program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0050] The overall idea of ​​the present invention is to use known vulnerabilities as input, manually provide known vulnerability functions and corresponding binary files, and known vulnerability points, after the feature extraction of the function code to be tested, the extraction of known vulnerability features and the two-stage similarity Vulnerability function identification and other steps, and finally output similar vulnerability functions similar to known vulnerabilities.

[0051] The overall flow diagram disclosed in the embodiment of the present invention is as follows: f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a similar vulnerability detection method and device for a binary program, and the method comprises the steps: carrying out the coarse-grained similar vulnerability function screening and the fine-grained similar vulnerability function recognition of each to-be-detected function in a to-be-detected binary file according to a known vulnerability function, a corresponding binary file and a known vulnerability point; and a similar vulnerability function similar to the known vulnerability is acquired. By introducing known vulnerability points and combining information of functions and vulnerabilities, coarse-grained screening can be carried out on a to-be-detected function set through the lightweight feature distance, the extraction of the lightweight features does not depend on a specific instruction set, meanwhile, the features are less affected by compiling options and code customization reuse. And the execution semantics of the binary codes can be accurately captured, so that the detection efficiency and accuracy are effectively improved.

Description

technical field [0001] The invention relates to the field of binary program loophole mining and binary code similarity detection, in particular to a similar loophole detection method and device for binary programs, belonging to the technical field of computer program detection. Background technique [0002] With the vigorous development of the global Internet market and Internet technology, computer software has been gradually applied to all aspects of people's daily life, while supporting the normal operation of society. While the quantity of these computer softwares is growing rapidly, security problems are also becoming more and more serious. For computer software, in order to facilitate development, developers usually use code reuse to develop software. That is, developers use the same or similar source code on different series of products or devices. While computer software provides functions, it is also likely to have several vulnerabilities, such as buffer overflow ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/563G06F21/577Y02D10/00
Inventor 邹燕燕刘龙权肖扬许家欢霍玮邹维
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products