基于二进制相似性分析的重现型漏洞检测方法综述
作者:
作者单位:

1.国防科技大学电子对抗学院,安徽合肥 230037 ;2.安徽省网络空间安全态势感知与评估重点实验室,安徽合肥 230037

作者简介:

王泰彦男,1998年生,博士研究生,研究方向为二进制代码相似性检测E-mail:wangty@nudt.edu.cn
李彦霖女,2001年生,硕士研究生,研究方向为二进制代码相似性检测E-mail:liyanlin2023@nudt.edu.cn
于璐女,1985年生,博士,讲师,研究方向为软件安全分析E-mail:yulu@nudt.edu.cn
潘祖烈男,1976年生,博士,教授,研究方向为网络空间安全E-mail:panzulie17@nudt.edu.cn

通讯作者:

中图分类号:

基金项目:

国家重点研发计划项目(2021YFB3100500)


A survey of recurring vulnerability detection based on binary similarity analysis
Author:
Affiliation:

1.College of Electronic Engineering, National University of Defense Technology, Hefei 230037 , China ; 2.Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037 , China

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    在软件研发中,复用开源组件与代码模板已经成为主流,这大大降低了开发成本,但若对含有漏洞的代码进行复用,则会导致软件系统中出现重现型漏洞。随着代码复用愈发广泛,其带来的安全问题受到更多的关注,而现有商业软件如IoT固件程序等大多不公开源码与文档,因此需要在二进制层面进行安全研究与检测。近年来,研究人员将二进制相似性分析技术应用至漏洞检测领域,通过识别软件系统中是否存在已知漏洞的二进制代码,实现了对重现型漏洞的高效检测。为此,围绕重现型漏洞检测技术,首先梳理了现有基于二进制相似性分析的方法,并对相关技术进行系统分类与介绍,主要包括基于二进制本身信息进行分析的研究,以及结合相关源码/补丁辅助分析的研究;其次,对现有研究的实验评估数据集、可用工具与基线方法等进行分析总结;最后,在已有研究的基础上,对现存关键技术问题与未来研究方向进行总结与展望。

    Abstract:

    In the process of software development, the reuse of open-source components and code templates has become mainstream, significantly reducing development costs. However, reusing code with vulnerabilities can lead to the emergence of recurring vulnerabilities in software systems. As code reuse becomes increasingly widespread, the associated security issues it brings are receiving increased attention. Most of the existing commercial softwares, such as IoT firmware programs, often do not publicly disclose their source code or documentation, so security research and detection need to be carried out at the binary level. In recent years, researchers have applied binary code similarity detection technology to the field of vulnerability detection.By identifying whether there are binary codes of known vulnerabilities in software systems, they have achieved efficient detection of recurring vulnerabilities. To this end, this paper first reviewed existing methods based on binary similarity analysis and systematically categorized and introduced related technologies, mainly including research that analyzes binary information itself, as well as studies that combine related source code or patches assisted analysis.Next,it analyzed and summarized experimental evaluation datasets, available tools, and baseline methods from existing research. Finally, it summarized existing key technical issues and looked forward to future research directions.

    参考文献
    相似文献
    引证文献
引用本文

王泰彦,李彦霖,于璐,等.基于二进制相似性分析的重现型漏洞检测方法综述[J]. 信息对抗技术,2025, 4(2):18-43.

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2024-06-18
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2025-04-15
  • 出版日期:
文章二维码