A simple function embedding approach for binary similarity detection

被引:3
作者
Li, Weilong [1 ]
Jin, Shuyuan [1 ,2 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou, Peoples R China
[2] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
来源
2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020) | 2020年
基金
中国国家自然科学基金;
关键词
Binary analysis; Function similarity; Deep learning;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00097
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Binary function similarity detection has been an important problem in binary analysis. Recently, several deep learning based techniques show promising results and achieve state of the art performance. In despite of effectiveness, some of them adopt complex network structures which result in slow convergence speed. To reduce the structure complexity, this paper proposes a simple neural network structure based on Bi-RNN(Bidirectional Recurrent Neural Network). To evaluate the effectiveness of proposed method, this paper conducts experiments on both single-architecture and cross-architecture function similarity detection over OpenSSL library. Experimental results show that our approach achieves higher AUC metric and faster convergence speed than GNN(Graph Neural Network)based techniques. To explore the effectiveness of GNN, another experiment is conducted to explore the impact of the number of GNN layers on performance and the result shows that when combined semantic information, existing GNN-based methods may reduce performance.
引用
收藏
页码:570 / 577
页数:8
相关论文
共 22 条
  • [1] Bromley J., 1993, International Journal of Pattern Recognition and Artificial Intelligence, V7, P669, DOI 10.1142/S0218001493000339
  • [2] Cho K, 2014, PREPRINT
  • [3] David Y, 2018, ACM SIGPLAN NOTICES, V53, P392, DOI [10.1145/3296957.3177157, 10.1145/3173162.3177157]
  • [4] David Y, 2016, ACM SIGPLAN NOTICES, V51, P266, DOI [10.1145/2908080.2908126, 10.1145/2980983.2908126]
  • [5] Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
  • [6] Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
    Ding, Steven H. H.
    Fung, Benjamin C. M.
    Charland, Philippe
    [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 472 - 489
  • [7] Feng Q., 2016, P ACM SIGSAC C COMP, P480
  • [8] αDiff: Cross-Version Binary Code Similarity Detection with DNN
    Liu, Bingchang
    Huo, Wei
    Zhang, Chao
    Li, Wenchao
    Li, Feng
    Piao, Aihua
    Zou, Wei
    [J]. PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, : 667 - 678
  • [9] FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition
    Luo, Mengxia
    Yang, Can
    Gong, Xiaorui
    Yu, Lei
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 319 - 337
  • [10] Semantic-Based Representation Binary Clone Detection for Cross-Architectures in the Internet of Things
    Luo, Zhenhao
    Wang, Baosheng
    Tang, Yong
    Xie, Wei
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (16):