喵ID:3NA8Bh免责声明

BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking

基本信息

DOI:
--
发表时间:
2017
期刊:
影响因子:
--
通讯作者:
Jiang Ming;Dongpeng Xu;Yufei Jiang;Dinghao Wu
中科院分区:
其他
文献类型:
--
作者: Jiang Ming;Dongpeng Xu;Yufei Jiang;Dinghao Wu研究方向: -- MeSH主题词: --
关键词: --
来源链接:pubmed详情页地址

文献摘要

Detecting differences between two binary executables (binary diffing), first derived from patch analysis, have been widely employed in various software security analysis tasks, such as software plagiarism detection and malware lineage inference. Especially when analyzing malware variants, pervasive code obfuscation techniques have driven recent work towards determining semantic similarity in spite of ostensible difference in syntax. Existing ways rely on either comparing runtime behaviors or modeling code snippet semantics with symbolic execution. However, neither approach delivers the expected precision. In this paper, we propose system call sliced segment equivalence checking, a hybrid method to identify fine-grained semantic similarities or differences between two execution traces. We perform enhanced dynamic slicing and symbolic execution to compare the logic of instructions that impact on the observable behaviors. Our approach improves existing semantics-based binary diffing by 1) inferring whether two executable binaries’ behaviors are conditionally equivalent; 2) detecting the similarities or differences, whose effects spread across multiple basic blocks. We have developed a prototype, called BinSim, and performed empirical evaluations against sophisticated obfuscation combinations and more than 1,000 recent malware samples, including now-infamous crypto ransomware. Our experimental results show that BinSim can successfully identify finegrained relations between obfuscated binaries, and outperform existing binary diffing tools in terms of better resilience and accuracy.
检测两个二进制可执行文件(二进制差异),首先是从补丁分析中得出的,已广泛用于各种软件安全分析任务,例如软件pla窃检测和恶意软件谱系推理。尽管语法上有可能的差异,但在确定语义相似性方面的最新工作依赖于任何一种。但是,将运行时行为或建模代码代码段语义与符号执行。但是,我们在本文中都提供了预期的精度执行轨迹方法通过1​​)提出两个可执行的二进制行为是否有条件地等于2)检测相似之处或差异对复杂的混淆组合和1,000多个恶意软件样本的评估,包括现在的crypto勒索软件实验结果表明,BINSIM可以成功地识别混淆的二进制文件之间的良好关系,并且在更好的弹性和准确性方面优于现有的二进制扩散工具。
参考文献
被引文献

数据更新时间:{{ references.updateTime }}

Jiang Ming;Dongpeng Xu;Yufei Jiang;Dinghao Wu
通讯地址:
--
所属机构:
--
电子邮件地址:
--
免责声明免责声明
1、猫眼课题宝专注于为科研工作者提供省时、高效的文献资源检索和预览服务;
2、网站中的文献信息均来自公开、合规、透明的互联网文献查询网站,可以通过页面中的“来源链接”跳转数据网站。
3、在猫眼课题宝点击“求助全文”按钮,发布文献应助需求时求助者需要支付50喵币作为应助成功后的答谢给应助者,发送到用助者账户中。若文献求助失败支付的50喵币将退还至求助者账户中。所支付的喵币仅作为答谢,而不是作为文献的“购买”费用,平台也不从中收取任何费用,
4、特别提醒用户通过求助获得的文献原文仅用户个人学习使用,不得用于商业用途,否则一切风险由用户本人承担;
5、本平台尊重知识产权,如果权利所有者认为平台内容侵犯了其合法权益,可以通过本平台提供的版权投诉渠道提出投诉。一经核实,我们将立即采取措施删除/下架/断链等措施。
我已知晓