Syntactic-Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices

被引:0
|
作者
Kalinin, Maxim [1 ]
Gribkov, Nikita [1 ]
机构
[1] Peter Great St Petersburg Polytech Univ, Inst Comp Sci & Cybersecur, 29 Polytek Skaya ul, St Petersburg 195251, Russia
关键词
attributed abstract syntax tree; code clone; detection; graph neural network; IoT software; semantic analysis; Siamese network; similarity; syntactic analysis; vulnerability;
D O I
10.3390/s24227251
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper addresses the problem of IoT security caused by code cloning when developing a massive variety of different smart devices. A clone detection method is proposed to identify clone-caused vulnerabilities in IoT software. A hybrid solution combines syntactic and semantic analyses of the code. Based on the recovered code, an attributed abstract syntax tree is constructed for each code fragment. All nodes of the commonly used abstract syntax tree are proposed to be weighted with semantic attribute vectors. Each attributed tree is then encoded as a semantic vector using a Deep Graph Neural Network. Two graph networks are combined into a Siamese neural model, allowing training to generate semantic vectors and compare vector pairs within each training epoch. Semantic analysis is also applied to clones with low similarity metric values. This allows one to correct the similarity decision in the case of incorrect matching of functions at the syntactic level. To automate the search for clones, the BinDiff algorithm is added in the first stage to accurately select clone candidates. This has a positive impact on the ability to apply the proposed method to large sets of binary code. In an experimental study, the developed method-compared to BinDiff, Gemini, and Asteria tools-has demonstrated the highest efficiency.
引用
收藏
页数:24
相关论文
共 7 条
  • [1] IoTCID: A Dynamic Detection Technology for Command Injection Vulnerabilities in IoT Devices
    Chen, Hao
    Ma, Jinxin
    Cui, Baojiang
    Fu, Junsong
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (10) : 7 - 14
  • [2] Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices
    He, Daojing
    Yu, Xiaohu
    Li, Tinghui
    Chan, Sammy
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (17): : 16438 - 16445
  • [3] Compromised IoT Devices Detection in Smart Home via Semantic Information
    Li, Ke
    Li, Zhi
    Gu, Zhimin
    Guo, Jing
    Wang, Ziying
    Sun, Limin
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 4986 - 4992
  • [4] IMEO: Anomaly Detection for IoT Devices using Semantic-based Correlations
    Oh, Seungmin
    Hong, Jihye
    Kim, Daeho
    Lee, Eun-Kyu
    Jo, Junghee
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (02) : 885 - 894
  • [5] A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms
    Polychronou, Nikolaos-Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    ACM Transactions on Design Automation of Electronic Systems, 2021, 27 (01):
  • [6] A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms
    Polychronou, Nikolaos-Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2022, 27 (01)
  • [7] Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices: Fuzzing With Dynamic Data Flow Analysis
    Yu, Lei
    Wang, Haoyu
    Li, Linyu
    He, Houhua
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (06)