Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Binary vulnerability detection method and system based on executable program and storage medium

A technology for executing programs and vulnerability detection, applied in the field of vulnerability detection, can solve problems such as high false positive rate and false negative rate, inability to accurately locate vulnerabilities, etc., to achieve the effect of improving accuracy, improving representation level, and improving accuracy.

Pending Publication Date: 2020-07-31
张皓天
View PDF10 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] Purpose of the invention: In order to overcome the deficiencies of the prior art, the present invention provides a binary vulnerability detection method based on an executable program, which can solve the problem of high false positive and false negative rates in the prior art of vulnerability mining tools that rely on code auditing , the problem that the vulnerability cannot be precisely located

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary vulnerability detection method and system based on executable program and storage medium
  • Binary vulnerability detection method and system based on executable program and storage medium
  • Binary vulnerability detection method and system based on executable program and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0057] Such as figure 1 Shown, the vulnerability detection method based on executable program described in the present invention, this method comprises the following steps:

[0058] S1 collects binary executable programs with known vulnerabilities, and uses the angr framework that supports VEX intermediate language to traverse the execution flow of binary executable programs and translate them into VEX text;

[0059] VEX is not a new language, it is an intermediate expression transformed from machine code, VEX IR is an intermediate expression that isolates different architectures rather than a language, it is more like IR run by a compiler .

[0060] angr is a python framework for analyzing binary files. It combines static and dynamic symbolic ("concolic") analysis to maximize code coverage for a variety of tasks. By introducing angr to the VEX intermediate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a binary vulnerability detection method and system based on an executable program and a storage medium. The method comprises the following steps: collecting an executable program with a known vulnerability, employing an angr framework supporting a VEX intermediate language to traverse the execution flow of the executable program, and translating the executable program intoa VEX text; cutting the VEX text into a plurality of text fragments, extracting keywords of the text fragments, and serializing all the text fragments; converting the keywords of the serialized text fragment into a text vector with context semantics by using Word2Vec; and converting the text vector into a digital vector, storing a file as input of a Bi-LSTM network model, respectively setting a training data set and a verification data set to train and verify the Bi-LSTM network model, and returning error rates and related record dictionaries on the training set and the verification set. According to the method, the intermediate language VEX IR is introduced into vulnerability detection, so that the execution flow of the program is recovered to a certain extent, and understanding of logicsemantics and context information of the program and establishment of a corresponding vulnerability model by a subsequent algorithm are facilitated .

Description

technical field [0001] The invention relates to the field of loophole detection, in particular to a binary loophole detection method and system based on an executable program. Background technique [0002] Vulnerability detection technology is an important method and basic means to improve software quality and security and reduce software security vulnerabilities, and has attracted extensive attention and high attention from academia and industry. In order to realize the automation of vulnerability discovery, the vulnerability discovery technology based on machine learning (Machine Learning, ML) has attracted extensive attention. [0003] The research on exploiting vulnerability mining can be divided into source code level and binary level according to the different levels of vulnerability mining. [0004] Vulnerability mining technologies at the source code level mainly include control flow analysis and symbolic execution. [0005] Control flow analysis technology does no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06N3/04G06F40/30G06F40/151
CPCG06F21/577G06N3/044G06N3/045Y02D10/00
Inventor 沙乐天张皓天许泽遥王于叶
Owner 张皓天
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products