2019
DOI: 10.3390/app9163283
|View full text |Cite
|
Sign up to set email alerts
|

Semantic-Based Representation Binary Clone Detection for Cross-Architectures in the Internet of Things

Abstract: Code reuse is widespread in software development as well as internet of things (IoT) devices. However, code reuse introduces many problems, e.g., software plagiarism and known vulnerabilities. Solving these problems requires extensive manual reverse analysis. Fortunately, binary clone detection can help analysts mitigate manual work by matching reusable code and known parts. However, many binary clone detection methods are not robust to various compiler optimization options and different architectures. While s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…This limits the benefit of NSP. Some recent methods also adopted PTT, predicting the similarities between two instructions [11,25]. However, they still treat the individual instruction as the unit to mine semantic information, which may also be less effective.…”
Section: Extraction Of Textual Semantic Informationmentioning
confidence: 99%
“…This limits the benefit of NSP. Some recent methods also adopted PTT, predicting the similarities between two instructions [11,25]. However, they still treat the individual instruction as the unit to mine semantic information, which may also be less effective.…”
Section: Extraction Of Textual Semantic Informationmentioning
confidence: 99%
“…The consequent clone attacks need more efficient corresponding detection approaches. To detect code clones in IoT applications, Tekchandani et al [53], and Luo et al [54] provided good results based on semanticlevel source code analysis; however, their studies were not primarily on cloned vulnerability detection. Sachidananda et al [55] proposed a framework to detect various vulnerabilities located in IoT devices using the static analysis method.…”
Section: A: Sensor Networkmentioning
confidence: 99%
“…The Hex-Rays Decompiler, which is one of its well-known plug-ins for automatic decompilation, was used to decompile the assembly instructions into C files. More importantly, it supports the compiler-generated code for the x86, x64, ARM32, ARM64 and PowerPC processors, satisfying the needs of most airborne software decompilations [62]. The Hex-Rays Decompiler was used to decompile the object code of the ADC software to acquire the decompiled source code, as displayed in Figure 10.…”
Section: Traceability From Executable Object Code To Source Codementioning
confidence: 99%