BinVuGAL: Binary vulnerability detection method based on graph neural network combined with assembly language model

被引:2
作者
Song, Zhihui [1 ]
Xu, Jinchen [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450000, Peoples R China
来源
PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024 | 2024年
关键词
Binary vulnerability detection; Enhanced PDG; Assembly language model; Graph neural network;
D O I
10.1145/3673277.3673305
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Binary vulnerability detection is an important research direction in the field of cyber security. In recent years, there have been studies applying deep learning to binary vulnerability detection to implement automated detection systems. However, these studies are often based on similarity analysis or treat binary codes as text, limiting the effectiveness of the analysis. There is still a lot of room for improvement in vulnerability detection levels. In this paper, we propose a Binary vulnerability detection method based on Graph neural network combined with Assembly Language model (BinVuGAL). It uses code generated from disassembly of binary files as a dataset to extract enhanced Program Dependency Graph (ePDG); nodes are embedded by pre-trained assembly language models and fed into a graph neural network model for classification. The experiments demonstrate that BinVuGAL can effectively function in the detection task of the 6 most exploitable vulnerability types. It benefits from ePDG-based pre-trained language models and graph neural networks, and outperforming other binary vulnerability detection method in terms of accuracy and F1 scores.
引用
收藏
页码:159 / 163
页数:5
相关论文
共 26 条
[1]  
Aghaei Ehsan, 2023, Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (462), P39, DOI 10.1007/978-3-031-25538-0_3
[2]  
[Anonymous], 2015, arXiv
[3]   WYSINWYX: What You See Is Not What You eXecute [J].
Balakrishnan, Gogul ;
Reps, Thomas .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2010, 32 (06)
[4]  
Binary Ninja, About us
[5]   ROMEO: A binary vulnerability detection dataset for exploring Juliet through the lens of assembly language [J].
Brust, Clemens-Alexander ;
Sonnekalb, Tim ;
Gruner, Bernd .
COMPUTERS & SECURITY, 2023, 128
[6]  
CWE, Common weakness enumeration
[7]  
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[8]   Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization [J].
Ding, Steven H. H. ;
Fung, Benjamin C. M. ;
Charland, Philippe .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :472-489
[9]  
Feng ZY, 2020, FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, EMNLP 2020, P1536
[10]   BinAIV: Semantic-enhanced vulnerability detection for Linux x86 binaries [J].
Gu, Yeming ;
Shu, Hui ;
Kang, Fei .
COMPUTERS & SECURITY, 2023, 135