Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/173498
Title: Towards practical binary code similarity detection: vulnerability verification via patch semantic analysis
Authors: Yang, Shouguo
Xu, Zhengzi
Xiao, Yang
Lang, Zhe
Tang, Wei
Liu, Yang
Shi, Zhiqiang
Li, Hong
Sun, Limin
Keywords: Computer and Information Science
Issue Date: 2023
Source: Yang, S., Xu, Z., Xiao, Y., Lang, Z., Tang, W., Liu, Y., Shi, Z., Li, H. & Sun, L. (2023). Towards practical binary code similarity detection: vulnerability verification via patch semantic analysis. ACM Transactions On Software Engineering and Methodology, 32(6), 158:1-158:29. https://dx.doi.org/10.1145/3604608
Journal: ACM Transactions on Software Engineering and Methodology
Abstract: Vulnerability is a major threat to software security. It has been proven that binary code similarity detection approaches are efficient to search for recurring vulnerabilities introduced by code sharing in binary software. However, these approaches suffer from high false-positive rates (FPRs) since they usually take the patched functions as vulnerable, and they usually do not work well when binaries are compiled with different compilation settings. To this end, we propose an approach, named Robin, to confirm recurring vulnerabilities by filtering out patched functions. Robin is powered by a lightweight symbolic execution to solve the set of function inputs that can lead to the vulnerability-related code. It then executes the target functions with the same inputs to capture the vulnerable or patched behaviors for patched function filtration. Experimental results show that Robin achieves high accuracy for patch detection across different compilers and compiler optimization levels respectively on 287 real-world vulnerabilities of 10 different software. Based on accurate patch detection, Robin significantly reduces the false-positive rate of state-of-the-art vulnerability detection tools (by 94.3% on average), making them more practical. Robin additionally detects 12 new potentially vulnerable functions.
URI: https://hdl.handle.net/10356/173498
ISSN: 1049-331X
DOI: 10.1145/3604608
Schools: School of Computer Science and Engineering 
Rights: © 2023 the Owner/Author(s). Publication rights licensed to ACM. All rights reserved.
Fulltext Permission: none
Fulltext Availability: No Fulltext
Appears in Collections:SCSE Journal Articles

SCOPUSTM   
Citations 50

8
Updated on May 5, 2025

Page view(s)

121
Updated on May 6, 2025

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.