Proceedings of the 30th Annual Computer Security Applications Conference 2014
DOI: 10.1145/2664243.2664269
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging semantic signatures for bug search in binary programs

Abstract: Software vulnerabilities still constitute a high security risk and there is an ongoing race to patch known bugs. However, especially in closed-source software, there is no straightforward way (in contrast to source code analysis) to find buggy code parts, even if the bug was publicly disclosed.To tackle this problem, we propose a method called Tree Edit Distance based Equational Matching (TEDEM) to automatically identify binary code regions that are "similar" to code regions containing a reference bug. We aim … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
72
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 120 publications
(73 citation statements)
references
References 24 publications
(27 reference statements)
0
72
0
1
Order By: Relevance
“…Modern approaches for binaries follow strategies to compare the semantics of code. Examples are TEDEM [23], Exposé [22], BinHunt [8], its follow-up project, iBinHunt [21], and BinJuice [17], which uses syntactic equations similar to our formulas and hashes those to measure similarity. BinHash [14] inspired our sampling, which is also used by Blanket Execution (Blex) [6]).…”
Section: Related Workmentioning
confidence: 99%
“…Modern approaches for binaries follow strategies to compare the semantics of code. Examples are TEDEM [23], Exposé [22], BinHunt [8], its follow-up project, iBinHunt [21], and BinJuice [17], which uses syntactic equations similar to our formulas and hashes those to measure similarity. BinHash [14] inspired our sampling, which is also used by Blanket Execution (Blex) [6]).…”
Section: Related Workmentioning
confidence: 99%
“…Bernardi et al introduced an approach to detect design patterns in object oriented systems by graph matching, while the detection range is limited to the patterns specifications repository. 16 They also designed tree-based edit distances to measure code similarity. 10 Jonischkeit and Kirsch enhanced graph-based similar function identification by leveraging instruction level information of basic blocks.…”
Section: Related Workmentioning
confidence: 99%
“…Before the experiments, 16 pairs of active open-source programs are collected from their homepages. Also, the instruction sequences and FCGs are extracted from binary codes through the usage of Python APIs provided by IDA Pro (Interactive Disassembler Professional).…”
Section: Applications Of Fcg Matchingmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast to both Merlin and Chucky, sources, sanitizers, and sinks are expressed as regular expressions as part of traversals, making it easy for the analyst to adapt them to further improve the specification. Finally, several authors employ similarity measures to determine vulnerabilities similar to a known vulnerability [17,24,42,61].…”
Section: Related Workmentioning
confidence: 99%