Recurrent Semantic Learning-Driven Fast Binary Vulnerability Detection in Healthcare Cyber Physical Systems

被引:13
作者
Yi, Xiaoyu [1 ,2 ]
Wu, Jun [3 ]
Li, Gaolei [1 ,2 ]
Bashir, Ali Kashif [4 ,5 ,6 ]
Li, Jianhua [1 ,2 ]
Alzubi, Ahmad Ali [7 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] Shanghai Key Lab Integrated Adm Technol Informat S, Shanghai 200240, Peoples R China
[3] Waseda Univ, Grad Sch Informat Prod & Syst, Fukuoka 8080135, Japan
[4] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, England
[5] Natl Univ Sci & Technol Islamabad NUST, Sch Elect Engn & Comp Sci, Islamabad 24090, Pakistan
[6] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
[7] King Saud Univ, Community Coll, Comp Sci Dept, Riyadh 11437, Saudi Arabia
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2023年 / 10卷 / 05期
基金
中国国家自然科学基金;
关键词
Index Terms-Healthcare cyber physical systems; Binary vulner-ability detection; Recurrent semantic learning; Cascaded LSTM; BLOCKCHAIN; EFFICIENT; PRIVACY; SCHEME;
D O I
10.1109/TNSE.2022.3199990
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Healthcare cyber physical systems (HCPS) always pursuing high availability allow software providers to adopt multiple kinds of development languages to reuse third-party program codes, while leading to the wide propagation of hidden software vulnerabilities. However, it is impossible to accurately trace execution paths and locate the key elements during the software execution process, which makes semantic features of vulnerabilities in the binary code can not bed extracted. This is the key support in automated vulnerability detection practices. To address these problems, a novel fast vulnerability detection mechanism based on recurrent semantic learning is proposed, which does not require high-level permissions to access the compiling process and traverse all execution paths. Firstly, a programframe is constructed to integrate software run-time logic and executing environment, detecting vulnerabilities from multi-programming language binary codes. Secondly, to achieve the powerful software execution context-awareness ability, a cascaded-LSTM recurrent neural network is designated to extract semantic features from binary files with vulnerabilities. Besides, we establish an experimental toolkit named an intelligent vulnerability detector (IntVD) to demonstrate the effectiveness of the proposed methods. Extensive and practical experiments validate that the vulnerability recognition accuracy on the HCPS software including VLC and LibTIFF can reach more than 95%.
引用
收藏
页码:2537 / 2550
页数:14
相关论文
共 36 条
[31]   To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Function with an Existing Exploit [J].
Younis, Awad ;
Malaiya, Yashwant K. ;
Anderson, Charles ;
Ray, Indrajit .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :97-104
[32]   SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks [J].
Zhang, Liping ;
Wei, Zhen ;
Ren, Wei ;
Zheng, Xianghan ;
Choo, Kim-Kwang Raymond ;
Xiong, Neal N. .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02) :1502-1516
[33]   Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment [J].
Zhao, Lingjun ;
Huang, Huakun ;
Su, Chunhua ;
Ding, Shuxue ;
Huang, Huawei ;
Tan, Zhiyuan ;
Li, Zhenni .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) :3211-3223
[34]   CBA-Detector: An Accurate Detector Against Cache-Based Attacks Using HPCs and Pintools [J].
Zheng, Beilei ;
Gu, Jianan ;
Weng, Chuliang .
ADVANCED PARALLEL PROCESSING TECHNOLOGIES (APPT 2019), 2019, 11719 :109-122
[35]   μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection [J].
Zou, Deqing ;
Wang, Sujuan ;
Xu, Shouhuai ;
Li, Zhen ;
Jin, Hai .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) :2224-2236
[36]   Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs [J].
Zuo, Fei ;
Li, Xiaopeng ;
Young, Patrick ;
Luo, Lannan ;
Zeng, Qiang ;
Zhang, Zhexin .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,