Recurrent Semantic Learning-Driven Fast Binary Vulnerability Detection in Healthcare Cyber Physical Systems

被引:13
作者
Yi, Xiaoyu [1 ,2 ]
Wu, Jun [3 ]
Li, Gaolei [1 ,2 ]
Bashir, Ali Kashif [4 ,5 ,6 ]
Li, Jianhua [1 ,2 ]
Alzubi, Ahmad Ali [7 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] Shanghai Key Lab Integrated Adm Technol Informat S, Shanghai 200240, Peoples R China
[3] Waseda Univ, Grad Sch Informat Prod & Syst, Fukuoka 8080135, Japan
[4] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, England
[5] Natl Univ Sci & Technol Islamabad NUST, Sch Elect Engn & Comp Sci, Islamabad 24090, Pakistan
[6] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
[7] King Saud Univ, Community Coll, Comp Sci Dept, Riyadh 11437, Saudi Arabia
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2023年 / 10卷 / 05期
基金
中国国家自然科学基金;
关键词
Index Terms-Healthcare cyber physical systems; Binary vulner-ability detection; Recurrent semantic learning; Cascaded LSTM; BLOCKCHAIN; EFFICIENT; PRIVACY; SCHEME;
D O I
10.1109/TNSE.2022.3199990
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Healthcare cyber physical systems (HCPS) always pursuing high availability allow software providers to adopt multiple kinds of development languages to reuse third-party program codes, while leading to the wide propagation of hidden software vulnerabilities. However, it is impossible to accurately trace execution paths and locate the key elements during the software execution process, which makes semantic features of vulnerabilities in the binary code can not bed extracted. This is the key support in automated vulnerability detection practices. To address these problems, a novel fast vulnerability detection mechanism based on recurrent semantic learning is proposed, which does not require high-level permissions to access the compiling process and traverse all execution paths. Firstly, a programframe is constructed to integrate software run-time logic and executing environment, detecting vulnerabilities from multi-programming language binary codes. Secondly, to achieve the powerful software execution context-awareness ability, a cascaded-LSTM recurrent neural network is designated to extract semantic features from binary files with vulnerabilities. Besides, we establish an experimental toolkit named an intelligent vulnerability detector (IntVD) to demonstrate the effectiveness of the proposed methods. Extensive and practical experiments validate that the vulnerability recognition accuracy on the HCPS software including VLC and LibTIFF can reach more than 95%.
引用
收藏
页码:2537 / 2550
页数:14
相关论文
共 36 条
[1]  
Amin Sara, 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), P302, DOI 10.1109/ICIoT48696.2020.9089638
[2]  
Baesens B, 2000, KES'2000: FOURTH INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED INTELLIGENT ENGINEERING SYSTEMS & ALLIED TECHNOLOGIES, VOLS 1 AND 2, PROCEEDINGS, P313, DOI 10.1109/KES.2000.885819
[3]  
Caselden Dan, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P164, DOI 10.1007/978-3-642-40203-6_10
[4]   Unleashing MAYHEM on Binary Code [J].
Cha, Sang Kil ;
Avgerinos, Thanassis ;
Rebert, Alexandre ;
Brumley, David .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :380-394
[5]  
Chabbi Milind., 2014, P ANN IEEEACM INT S, P76
[6]   Deep Learning Based Vulnerability Detection: Are We There Yet? [J].
Chakraborty, Saikat ;
Krishna, Rahul ;
Ding, Yangruibo ;
Ray, Baishakhi .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (09) :3280-3296
[7]   Efficient vulnerability detection based on an optimized rule-checking static analysis technique [J].
Chen, Deng ;
Zhang, Yan-duo ;
Wei, Wei ;
Wang, Shi-xun ;
Huang, Ru-bing ;
Li, Xiao-lin ;
Qu, Bin-bin ;
Jiang, Sheng .
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (03) :332-345
[8]  
Chi Zhang, 2021, International Journal of Simulation and Process Modelling, V16, P1, DOI 10.1504/IJSPM.2021.113070
[9]  
Clause James, 2007, P 2007 INT S SOFTW T, P196
[10]   Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization [J].
Ding, Steven H. H. ;
Fung, Benjamin C. M. ;
Charland, Philippe .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :472-489