Binary Similarity Analysis for Vulnerability Detection

Zeming Tai, Hironori Washizaki, Yoshiaki Fukazawa, Yurie Fujimatsu, Jun Kanai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Binary similarity has been widely used in function recognition and vulnerability detection. How to define a proper similarity is the key element in implementing a fast detection method. We proposed a scalable method to detect binary vulnerabilities based on similarity. Procedures lifted from binaries are divided into several comparable strands by data dependency, and those strands are transformed into a normalized form by our tool named VulneraBin, so that similarity can be determined between two procedures through a hash value comparison. The low computational complexity allows semantically equivalent code to be identified in binaries compiled from million lines of source code in a fast and accurate way.

Original languageEnglish
Title of host publicationProceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020
EditorsW. K. Chan, Bill Claycomb, Hiroki Takakura, Ji-Jiang Yang, Yuuichi Teranishi, Dave Towey, Sergio Segura, Hossain Shahriar, Sorel Reisman, Sheikh Iqbal Ahamed
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1121-1122
Number of pages2
ISBN (Electronic)9781728173030
DOIs
Publication statusPublished - 2020 Jul
Event44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020 - Virtual, Madrid, Spain
Duration: 2020 Jul 132020 Jul 17

Publication series

NameProceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020

Conference

Conference44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020
Country/TerritorySpain
CityVirtual, Madrid
Period20/7/1320/7/17

Keywords

  • binary analysis
  • binary code search
  • binary similarity
  • static analysis

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Software
  • Education

Fingerprint

Dive into the research topics of 'Binary Similarity Analysis for Vulnerability Detection'. Together they form a unique fingerprint.

Cite this