Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge

被引:0
|
作者
Yang, Shouguo [1 ,2 ]
Dong, Chaopeng [1 ,2 ]
Xiao, Yang [1 ,2 ]
Cheng, Yiran [1 ,2 ]
Shi, Zhiqiang [1 ,2 ]
Li, Zhi [1 ,2 ]
Sun, Limin [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, 19 Shucun Rd, Beijing 100085, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, 1 Yanqihu East Rd, Beijing 101408, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Binary code similarity detection; pre-fitering; re-ranking; abstract syntactic tree; graph neural network; SEARCH;
D O I
10.1145/3604611
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Widespread code reuse allows vulnerabilities to proliferate among a vast variety of firmware. There is an urgent need to detect these vulnerable codes effectively and efficiently. By measuring code similarities, AI-based binary code similarity detection is applied to detecting vulnerable code at scale. Existing studies have proposed various function features to capture the commonality for similarity detection. Nevertheless, the significant code syntactic variability induced by the diversity of IoT hardware architectures diminishes the accuracy of binary code similarity detection. In our earlier study and the tool Asteria, we adopted a Tree-LSTM network to summarize function semantics as function commonality, and the evaluation result indicates an advanced performance. However, it still has utility concerns due to excessive time costs and inadequate precision while searching for large-scale firmware bugs. To this end, we propose a novel deep learning-enhancement architecture by incorporating domain knowledge-based pre-filtration and re-ranking modules, and we develop a prototype named ASTERIA-PRO based on Asteria. The pre-filtration module eliminates dissimilar functions, thus reducing the subsequent deep learning-model calculations. The re-ranking module boosts the rankings of vulnerable functions among candidates generated by the deep learning model. Our evaluation indicates that the pre-filtration module cuts the calculation time by 96.9%, and the re-ranking module improves MRR and Recall by 23.71% and 36.4%, respectively. By incorporating these modules, ASTERIA-PRO outperforms existing state-of-the-art approaches in the bug search task by a significant margin. Furthermore, our evaluation shows that embedding baseline methods with pre-filtration and re-ranking modules significantly improves their precision. We conduct a large-scale real-world firmware bug search, and ASTERIA-PRO manages to detect 1,482 vulnerable functions with a high precision 91.65%.
引用
收藏
页数:40
相关论文
共 50 条
  • [21] Deep Learning-based Domain Adaptation for a generalized detection of wear phenomena during blanking
    Kubik, Christian
    Molitor, Dirk Alexander
    Rojahn, Marvin
    Groche, Peter
    MANUFACTURING LETTERS, 2023, 35 : 904 - 914
  • [22] Similarity-based face image retrieval using sparsely embedded deep features and binary code learning
    Elboushaki, Abdessamad
    Hannane, Rachida
    Afdel, Karim
    INTERNATIONAL JOURNAL OF MULTIMEDIA INFORMATION RETRIEVAL, 2024, 13 (03)
  • [23] Deep Learning-Based Indoor Localization Using Adjacent Received Signal Strength and Domain Knowledge
    Zhang, Guangyi
    Hou, Zhanwei
    Li, Yonghui
    Vucetic, Branka
    2022 20th Mediterranean Communication and Computer Networking Conference, MedComNet 2022, 2022, : 25 - 30
  • [24] Improving Deep Reinforcement Learning-Based Perimeter Metering Control Methods With Domain Control Knowledge
    Zhou, Dongqin
    Gayah, Vikash V. V.
    TRANSPORTATION RESEARCH RECORD, 2023, 2677 (07) : 384 - 405
  • [25] Deep Learning-Based Indoor Localization Using Adjacent Received Signal Strength and Domain Knowledge
    Zhang, Guangyi
    Hou, Zhanwei
    Li, Yonghui
    Vucetic, Branka
    2022 20TH MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE (MEDCOMNET), 2022,
  • [26] Deep Learning-Based Detection for Moderate-Density Code Multiple Access in IoT Networks
    Han, Yu
    Wang, Zhenyong
    Guo, Qing
    Xiang, Wei
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (01) : 122 - 125
  • [27] An empirical evaluation of deep learning-based source code vulnerability detection: Representation versus models
    Semasaba, Abubakar Omari Abdallah
    Zheng, Wei
    Wu, Xiaoxue
    Agyemang, Samuel Akwasi
    Liu, Tao
    Ge, Yuan
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2023, 35 (11)
  • [28] Enhancing Sensitivity in Lung Nodule Malignancy Classification: Incorporating Cost Values into Deep Learning-Based CAD Systems
    Wang, Yiyang
    Patel, Charmi
    Ramaraj, Thiruvarangan
    Tchoua, Roselyne
    Furst, Jacob
    Raicu, Daniela
    COMPUTER-AIDED DIAGNOSIS, MEDICAL IMAGING 2024, 2024, 12927
  • [29] Using Domain Top-page Similarity Feature in Machine Learning-based Web Phishing Detection
    Sanglerdsinlapachai, Nuttapong
    Rungsawang, Arnon
    THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 187 - 190
  • [30] Enhancing Anomaly Detection of IoT using Knowledge-Based and Federated Deep Learning
    Simra, Tabassum
    Konatham, Bharath
    Amsaad, Fathi
    Ibrahem, Mohamed I.
    Jhanjhi, Noor Zaman
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,