首页> 外文会议>2018 17th IEEE International Conference on Trust, Security and Privacy In Computing and Communications, 12th IEEE International Conference on Big Data Science and Engineering >VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS
【24h】

VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS

机译:VMPBL:基于机器学习的易受攻击功能识别(结合补丁信息和LCS的二进制比较技术)

获取原文
获取原文并翻译 | 示例

摘要

Nowadays, most vendors apply the same open source code to their products, which is dangerous. In addition, when manufacturers release patches, they generally hide the exact location of the vulnerabilities. So, identifying vulnerabilities in binaries is crucial. However, just searching source program has a lower identifying accuracy of vulnerability, which requires operators further to differentiate searched results. Under this context, we propose VMPBL to enhance identifying the accuracy of vulnerability with the help of patch files. VMPBL, compared with other proposed schemes, uses patched functions according to its vulnerable functions in patch file to further distinguish results. We establish a prototype of VMPBL, which can effectively identify vulnerable function types and get rid of safe functions from results. Firstly, we get the potential vulnerable-patched functions by binary comparison technique based on K-Trace algorithm. Then we combine the functions with vulnerability and patch knowledge database to classify these function pairs and identify the possible vulnerable functions and the vulnerability types. Finally, we test some programs containing real-world CWE vulnerabilities, and one of the experimental results about CWE415 shows that the results returned from only searching source program are about twice as much as the results from VMPBL. We can see that using VMPBL can significantly reduce the false positive rate of discovering vulnerabilities compared with analyzing source files alone.
机译:如今,大多数供应商都将相同的开源代码应用于其产品,这很危险。此外,制造商发布补丁程序时,通常会隐藏漏洞的确切位置。因此,识别二进制文件中的漏洞至关重要。但是,仅搜索源程序对漏洞的识别准确性较低,这要求操作员进一步区分搜索结果。在这种情况下,我们建议使用VMPBL来借助补丁文件来增强识别漏洞的准确性。与其他提议的方案相比,VMPBL根据补丁文件中易受攻击的功能使用补丁功能来进一步区分结果。我们建立了VMPBL的原型,该原型可以有效地识别易受攻击的功能类型并从结果中删除安全功能。首先,通过基于K-Trace算法的二进制比较技术,获得了潜在的弱势修补函数。然后,我们将功能与漏洞和补丁知识数据库结合起来,对这些功能对进行分类,并确定可能的漏洞功能和漏洞类型。最后,我们测试了一些包含真实CWE漏洞的程序,关于CWE415的实验结果之一表明,仅搜索源程序返回的结果大约是VMPBL的结果的两倍。我们可以看到,与单独分析源文件相比,使用VMPBL可以显着降低发现漏洞的误报率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号