2019
DOI: 10.1109/tse.2018.2827379
|View full text |Cite
|
Sign up to set email alerts
|

Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
39
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 47 publications
(39 citation statements)
references
References 35 publications
0
39
0
Order By: Relevance
“…Flake et al proposed a method to compare CFGs to cope with compiler optimizations [46]. Xue [47] used user-defined functions and an inlining relevant library to capture the fully function semantics based on a selective inlining technique from high-level semantic features and structural features. These solutions rely on expensive graph matching, and are not scalable for searching in large codebases.…”
Section: Related Workmentioning
confidence: 99%
“…Flake et al proposed a method to compare CFGs to cope with compiler optimizations [46]. Xue [47] used user-defined functions and an inlining relevant library to capture the fully function semantics based on a selective inlining technique from high-level semantic features and structural features. These solutions rely on expensive graph matching, and are not scalable for searching in large codebases.…”
Section: Related Workmentioning
confidence: 99%
“…To alleviate the aforementioned problems in static malware analysis, in the recent years, researchers have proposed behaviour-based malware analysis, where the malware is executed to understand its malicious behaviour. There exists a significant literature on behaviour-based malware analysis techniques for malware detection [3][4][5][6][7] and triaging [8][9][10][11][12][13][14]. Unfortunately, one of the key issues in existing behaviour-based malware analysis techniques is that they are not scalable.…”
Section: Motivation and Goalsmentioning
confidence: 99%
“…Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation 115score is calculated and if it is below some threshold value t, the callee is inlined (lines[13][14][15][16][17][18][19][20][21][22][23][24]. This recursive procedure is continued until all the related functions are analysed.In our preliminary study on BusyBox compiled for x86 32bit, we identify that 14 UD…”
mentioning
confidence: 99%
“…BLEX [81] uses program execution to extract the semantic features to improve the matching accuracy. BinGo [82] and BinGo-E [83] combine syntactic, structural and semantic features to produce more accurate matching results. However, it is difficult for the current function matching solutions to differentiate vulnerable and patched functions, since patches usually introduce subtle changes to fix vulnerabilities [4].…”
Section: Introductionmentioning
confidence: 99%
“…It can precisely differentiate patched functions from vulnerable functions in the binaries. It reduces the error rate by more than 30% compared to the state-of-the-art function matching tool, Bingo-E [83], with less time consumed. It is more accurate than the patch identification tool FIBER [85], without source code.…”
Section: Introductionmentioning
confidence: 99%