Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of 2018
DOI: 10.1145/3236024.3275524
|View full text |Cite
|
Sign up to set email alerts
|

VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(25 citation statements)
references
References 12 publications
0
25
0
Order By: Relevance
“…It extracts three semantic features, including function, inter-function, and inter-module features, to detect based on the Deep Neural Networks (DNN) model. Gao et al also proposed VulSeeker [95] and VulSeeker-Pro [96], those vulnerability search methods combined with a deep learning model to improve the accuracy of vulnerability detection. These two methods were verified to be more accurate than existing methods such as Gemini [93].…”
Section: Technical Requirementsmentioning
confidence: 99%
See 1 more Smart Citation
“…It extracts three semantic features, including function, inter-function, and inter-module features, to detect based on the Deep Neural Networks (DNN) model. Gao et al also proposed VulSeeker [95] and VulSeeker-Pro [96], those vulnerability search methods combined with a deep learning model to improve the accuracy of vulnerability detection. These two methods were verified to be more accurate than existing methods such as Gemini [93].…”
Section: Technical Requirementsmentioning
confidence: 99%
“…We find that arm-based Linux devices such as routers are selected as research targets mostly at this stage. The research on similarity detection expands cross-architecture scenarios [88][89][90][91][93][94][95][96]; others do not challenge this issue.…”
Section: Challengesmentioning
confidence: 99%
“…Such applications are of pa interest to hackers, because finding vulnerabilities in them does not require special embedded systems background. There are many different file systems for embedded devices including SquashFS 26 , UBIFS 27 , YAFFS2 28 , and JFFS2 29 .…”
Section: Firmware Extractionmentioning
confidence: 99%
“…blocks of IR instructions [24] and conditional formulas [25]. Recently, machine learning algorithms have also been leveraged in order to quickly find code similar to a known vulnerable component [26], [27], [28].…”
Section: Finding Potentially Vulnerable Componentsmentioning
confidence: 99%
See 1 more Smart Citation