BinVuGAL: Binary vulnerability detection method based on graph neural network combined with assembly language model

被引:2
作者
Song, Zhihui [1 ]
Xu, Jinchen [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450000, Peoples R China
来源
PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024 | 2024年
关键词
Binary vulnerability detection; Enhanced PDG; Assembly language model; Graph neural network;
D O I
10.1145/3673277.3673305
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Binary vulnerability detection is an important research direction in the field of cyber security. In recent years, there have been studies applying deep learning to binary vulnerability detection to implement automated detection systems. However, these studies are often based on similarity analysis or treat binary codes as text, limiting the effectiveness of the analysis. There is still a lot of room for improvement in vulnerability detection levels. In this paper, we propose a Binary vulnerability detection method based on Graph neural network combined with Assembly Language model (BinVuGAL). It uses code generated from disassembly of binary files as a dataset to extract enhanced Program Dependency Graph (ePDG); nodes are embedded by pre-trained assembly language models and fed into a graph neural network model for classification. The experiments demonstrate that BinVuGAL can effectively function in the detection task of the 6 most exploitable vulnerability types. It benefits from ePDG-based pre-trained language models and graph neural networks, and outperforming other binary vulnerability detection method in terms of accuracy and F1 scores.
引用
收藏
页码:159 / 163
页数:5
相关论文
共 26 条
[11]  
Jiang X, 2021, PR MACH LEARN RES, V161, P54
[12]  
Le Tue, 2019, 7 INT C LEARN REPR I
[13]   A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code [J].
Li, Xingzheng ;
Feng, Bingwen ;
Li, Guofeng ;
Li, Tong ;
He, Mingjin .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[14]   PALMTREE: Learning an Assembly Language Model for Instruction Embedding [J].
Li, Xuezixiang ;
Qu, Yu ;
Yin, Heng .
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, :3236-3251
[15]   SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities [J].
Li, Zhen ;
Zou, Deqing ;
Xu, Shouhuai ;
Jin, Hai ;
Zhu, Yawei ;
Chen, Zhaoxuan .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) :2244-2258
[16]   VulDeePecker: A Deep Learning-Based System for Vulnerability Detection [J].
Li, Zhen ;
Zou, Deqing ;
Xu, Shouhuai ;
Ou, Xinyu ;
Jin, Hai ;
Wang, Sujuan ;
Deng, Zhijun ;
Zhong, Yuyi .
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
[17]   αDiff: Cross-Version Binary Code Similarity Detection with DNN [J].
Liu, Bingchang ;
Huo, Wei ;
Zhang, Chao ;
Li, Wenchao ;
Li, Feng ;
Piao, Aihua ;
Zou, Wei .
PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, :667-678
[18]   SAFE: Self-Attentive Function Embeddings for Binary Similarity [J].
Massarelli, Luca ;
Di Luna, Giuseppe Antonio ;
Petroni, Fabio ;
Baldoni, Roberto ;
Querzoni, Leonardo .
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019), 2019, 11543 :309-329
[19]  
nist, Juliet C/C++ 1.2
[20]  
Shaw Peter, 2018, Short Papers, V2