Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

BugClone: Towards Finding Vulnerable Source Code Clones in Binary Executables

Full metadata record
DC Field Value Language
dc.contributor.author오희국-
dc.date.accessioned2025-04-01T06:01:25Z-
dc.date.available2025-04-01T06:01:25Z-
dc.date.issued2021-06-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/122425-
dc.description.abstractVulnerabilities are continuously discovered and common in all software platforms. When some vulnerability is explored at the source code level, there must be a technique to find a similar vulnerable code in binaries; for which source code is not available (firmware, server, etc. binaries). A typical solution would be to compile the vulnerable source code and compare the compiled binary with target binaries. Existing binary code similarity detection techniques are only efficient when both binaries are compiled with the same compilers, architecture, and optimization levels. Different compilers and configurations change with CFG (control flow graph) that eventually makes the comparison error-prone. The main challenge for source-binary similarity detection is that we don’t know the compiler used and its configurations for the target binary and hence the only way is to compile source code with all possible compilation options and compare all resultant binaries with the target binary; which is unrealistic. In this research, we propose a solution to eliminating the many-one comparison by one-one comparison for the source-binary comparison problem. First, we detect the compilation options for the target binary and compile the vulnerable source code using the same compilation configurations. Later, we employ the embedding model-based binary comparison, which is resilient to light compiler optimizations and outcome promising results.-
dc.language영어-
dc.language.isoENG-
dc.titleBugClone: Towards Finding Vulnerable Source Code Clones in Binary Executables-
dc.typeConference-
dc.citation.title한국정보보호학회 하계학술대회-
dc.citation.volume31-
dc.citation.number1-
dc.citation.startPage136-
dc.citation.endPage138-
Files in This Item
There are no files associated with this item.
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE