CN109067800A - A kind of cross-platform association detection method of firmware loophole - Google Patents

A kind of cross-platform association detection method of firmware loophole Download PDF

Info

Publication number
CN109067800A
CN109067800A CN201811149507.8A CN201811149507A CN109067800A CN 109067800 A CN109067800 A CN 109067800A CN 201811149507 A CN201811149507 A CN 201811149507A CN 109067800 A CN109067800 A CN 109067800A
Authority
CN
China
Prior art keywords
function
firmware
feature
loophole
cross
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811149507.8A
Other languages
Chinese (zh)
Inventor
李超
林冠洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Mingbo Internet Security Innovation Research Institute Co Ltd
Original Assignee
Nanjing Mingbo Internet Security Innovation Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Mingbo Internet Security Innovation Research Institute Co Ltd filed Critical Nanjing Mingbo Internet Security Innovation Research Institute Co Ltd
Priority to CN201811149507.8A priority Critical patent/CN109067800A/en
Publication of CN109067800A publication Critical patent/CN109067800A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Abstract

The present invention provides a kind of cross-platform association detection method of firmware loophole, improves the accuracy rate and efficiency of existing cross-platform firmware loophole association detection method, kNN is used in combination with SVM, has reached accuracy rate and efficiency good trade-off;Bipartite graph matching algorithm is utilized on the basis of function property controlling stream graph, function matching problem is changed into graph structure Similarity measures problem, and joined penalty term on the basis of original algorithm, improves accurate matched accuracy rate;And make this programme that there is higher detection efficiency using weighted euclidean distance and weighted Mahalanobis distance method.

Description

A kind of cross-platform association detection method of firmware loophole
Technical field
The present invention relates to association detection technique field more particularly to a kind of cross-platform association detection methods of firmware loophole.
Background technique
With the deep development of Internet of Things, internet of things equipment gradually penetrates into the various aspects of people's work, life, in band Also to bring increasingly serious security risk while convenience.Tesla in 2014 is found security breaches, Haikang in 2015 Prestige depending on supervision equipment be detected severe compromise, hacker in 2016 meets with Dyn using a large amount of internet of things equipment Ddos attack the most serious in history.The importance for recognizing Internet of Things safety that these events make people deep.Wherein, firmware Safety is an importance of Internet of Things safety again.It is shown according to the survey report of OWASP in 2017, the loophole of firmware is attacked It hits and comes the 9th in the loophole attack of entire Internet of things system, and the major part of these loopholes is all issued mistake. As it can be seen that being an important ring for firmware safety to the detection of firmware loophole.Firmware Hole Detection is broadly divided into two aspects, a side Face is the detection to unknown loophole, is then the detection to known bugs on the other hand.Cross-platform firmware leakage of the present invention Hole association is to belong to the latter, it is primarily referred to as removing to search the homologous loophole of other platforms using the loophole in known platform firmware, right Firmware carries out loophole association and is equal to the binary file progress loophole association for including to firmware.However, existing cross-platform solid Accuracy rate, the efficiency of part loophole association detection method need to be improved.
It is existing that the execution sequence of code is detected into binary system execution file as feature In similar codes segment, the problem of being able to solve controlling stream graph isomery.But, this method is contacted with operation code and register name Closely, it can not be applied in cross-platform application scenarios.
A set of solution for carrying out loophole association detection to extensive firmware automatically that existing Costin et al. is proposed, Analysis is associated to firmware loophole using such as privately owned encryption key information obvious in firmware, but is lacked to more typically Loophole detectability.
The existing cross-platform loophole based on function value type feature and structure feature is associated with detection method discovRE, Sub-fraction function is quickly filtered out using kNN, and candidate functions are carried out using maximum public subgraph algorithm McGregor Further matching improves the efficiency of cross-platform loophole association detection to a certain extent, but in function screening stage There are some problems for accuracy rate.
Disclosed in patent " a kind of cross-platform association detection method of firmware loophole " a kind of firmware leak detection method and System, main flow include: that firmware crawls and loophole collection, facility information extraction, the decoding and dis-assembling of firmware, the finger of function Line is extracted and is matched and validating vulnerability etc..In the fingerprint matching stage of function, by calculating firmware function fingerprint and loophole letter The similarity and given threshold of number fingerprint, to judge whether firmware function is doubtful loophole.
Summary of the invention
The object of the invention is that providing a kind of cross-platform association detection of firmware loophole to solve the above-mentioned problems Method.
The present invention through the following technical solutions to achieve the above objectives:
The present invention the following steps are included:
S1: firmware obtains the stage, and firmware acquisition can be consolidated in such a way that manufacturer's image download or user upload by hand Part;
S2: firmware decompression and dis-assembling stage, binary file relevant to firmware is obtained using firmware decompression tool, by solid Part decompression and dis-assembling, obtain firmware dis-assembling function;
S3: firmware function feature is extracted;
S4: utilizing the kNN-SVM based on weighted euclidean distance, treats detection function and carries out quickly screening and accurate matching, judgement Function to be detected is associated with accuracy with known bugs function;
S5: confirm that function to be detected is doubtful loophole.
It is currently preferred, according to step S4: being broadly divided into two stages, numerical characteristics of the first stage based on function It treats detection function rapidly to be screened, second stage is then that the structure feature based on function carries out accurately candidate functions Matching.
Currently preferred, the feature of the extraction includes numerical characteristics and two kinds of structure feature, and numerical characteristics are mainly Refer to the numeralization feature of function rank;Structure feature is the feature of representative function property control flow graph structures, by atomic block level Feature and some structural informations composition.
It is currently preferred, it is described after feature extraction, it is thus necessary to determine that the corresponding weight of each dimensional feature, selection Relief algorithm determines weight.
Currently preferred, the Relief algorithm is by the source code of Busybox v1.21 respectively in ARM, MIPS and x86 Training dataset of three obtained function set A, M and the X as weight after process of compilation under these three platforms, to be associated with mould For formula " ARM → MIPS ", the feature vector of each function in collection of functions A and M is carried out min-max standardization first by us, So that every one-dimensional value in feature vector is all between 0 to 1;For each of A function, one can be found in M It is a with real matched function ' and one and unmatched function g, it is assumed that the feature vector after standardization is, ' standardization after feature vector be, g standardization after feature vector be, then we willIt is labeled as " 1 " as positive sample, it will The sample labeling that is negative is " 0 ";Wherein, the training sample ratio of positive and negative two class obtained is 1:1;Using training sample as Relief The input of algorithm, and iteration 10 times, seek its average characteristics weight.Since the calculating of distance has symmetry, so association The feature weight calculated under mode " ARM → MIPS " and " MIPS → ARM " be it is of equal value, similarly, association mode " ARM → x86 " The feature weight calculated under " x86 → ARM ", " MIPS → x86 " and " x86 → MIPS " is also of equal value respectively.
Currently preferred, weighted Mahalanobis distance method is applied to by the kNN-SVM based on weighted euclidean distance first It on kNN, and selects suitable k value to treat detection function and carries out preliminary screening (k < 500), then recycle as before SVM algorithm does further screening to function to obtain candidate functions collection, wherein the horse between function and function g The calculation formula of family name's distance is as follows using formula:
Wherein, X and Y is respectively function and 9 dimensional feature vectors of g, the covariance matrix of ∑ test sample feature space, and A is After weight matrix, feature and weight all determine, start to screen function.
The beneficial effects of the present invention are:
The present invention provides a kind of cross-platform association detection method of firmware loophole, improves existing cross-platform firmware loophole association inspection KNN is used in combination with SVM, has reached accuracy rate and efficiency good trade-off by the accuracy rate and efficiency of survey method;In function category Property controlling stream graph on the basis of utilize bipartite graph matching algorithm, function matching problem is changed into graph structure Similarity measures and is asked Topic, and joined penalty term on the basis of original algorithm, improve accurate matched accuracy rate;And using weighted Euclidean away from Make this programme that there is higher detection efficiency from weighted Mahalanobis distance method.
Detailed description of the invention
Fig. 1 is the flowage structure schematic diagram of the cross-platform association detection method of firmware loophole of the present invention;
Fig. 2 is that the present invention is based on hybrid algorithm kNN-SVM to be associated with the firmware loophole cross-platform stage by stage of bipartite graph matching algorithm Detection method general frame figure;
Fig. 3 is the flowage structure schematic diagram of the firmware function screening technique the present invention is based on kNN-SVM;
Fig. 4 is the accurate matched bipartite graph of loophole function of the present invention and candidate functions;
Fig. 5 is basic block grade feature of the present invention;
Fig. 6 is calculated result of each weight of Function feature of the present invention in six kinds of association modes;
Fig. 7 is the weighted value of each dimensional feature of basic block eigenvector of the present invention.
Specific embodiment
The present invention will be further explained below with reference to the attached drawings:
It is as depicted in figs. 1 and 2: the present invention the following steps are included:
S1: firmware obtains the stage, and firmware acquisition can be consolidated in such a way that manufacturer's image download or user upload by hand Part;
S2: firmware decompression and dis-assembling stage, binary file relevant to firmware is obtained using firmware decompression tool, by solid Part decompression and dis-assembling, obtain firmware dis-assembling function;
S3: firmware function feature is extracted;
S4: utilizing the kNN-SVM based on weighted euclidean distance, treats detection function and carries out quickly screening and accurate matching, judgement Function to be detected is associated with accuracy with known bugs function;
S5: confirm that function to be detected is doubtful loophole.
According to step S4: being broadly divided into two stages, first stage treats detection function based on the numerical characteristics of function It is rapidly screened, second stage is then that the structure feature based on function accurately matches candidate functions.
As shown in figure 5, the feature of the extraction includes numerical characteristics and two kinds of structure feature, numerical characteristics are primarily referred to as letter The other numeralization feature of several levels;Structure feature is the feature of representative function property control flow graph structures, by the spy of atomic block level Sign and some structural informations composition.
It is described after feature extraction, it is thus necessary to determine that the corresponding weight of each dimensional feature selects Relief algorithm to determine Weight.
As shown in fig. 6, the Relief algorithm by the source code of Busybox v1.21 respectively ARM, MIPS and x86 this Training dataset of three obtained function set A, M and the X as weight after process of compilation under three platforms, with association mode For " ARM → MIPS ", the feature vector of each function in collection of functions A and M is carried out min-max standardization first by us, is made Every one-dimensional value in feature vector is obtained all between 0 to 1;For each of A function, one can be found in M With real matched function ' and one and unmatched function g, it is assumed that the feature vector after standardization is, ' standardization after feature vector be, g standardization after feature vector be , then we willIt is labeled as " 1 " as positive sample, it willFor negative sample Labeled as " 0 ";Wherein, the training sample ratio of positive and negative two class obtained is 1:1;Using training sample as the defeated of Relief algorithm Enter, and iteration 10 times, seeks its average characteristics weight.Since the calculating of distance has symmetry, so association mode " ARM The feature weight calculated under → MIPS " and " MIPS → ARM " be it is of equal value, similarly, association mode " ARM → x86 " and " x86 → The feature weight calculated under ARM ", " MIPS → x86 " and " x86 → MIPS " is also of equal value respectively.
As shown in figure 3, the kNN-SVM based on weighted euclidean distance, is applied to kNN for weighted Mahalanobis distance method first On, and select suitable k value to treat detection function and carry out preliminary screening (k < 500), then recycle SVM as before Algorithm does further screening to function to obtain candidate functions collection, wherein the geneva between function and function g The calculation formula of distance is as follows using formula:
Wherein, X and Y is respectively function and 9 dimensional feature vectors of g, the covariance matrix of ∑ test sample feature space, and A is After weight matrix, feature and weight all determine, start to screen function.
In the first phase, the kNN and SVM used is two kinds in the widely used machine learning method in classification field, base It is to come simply by calculating the Euclidean distance between function and loophole function to be detected to letter in the function screening technique of kNN Number is screened, and such mode causes the accuracy rate of screening stage cannot be guaranteed.If it is intended to if guaranteeing accuracy rate, just Biggish k value is chosen, but k value is larger and will increase the calculation amount of the accurate matching stage of candidate functions.Exactly because but The calculation of kNN is very simple, and the function screening efficiency of the firmware function screening technique based on kNN is very high.And it is based on SVM Firmware function screening technique, although due to the complexity of SVM, screening efficiency be significantly lower than the method based on kNN, its Accuracy rate ratio kNN high.Moreover, the obtained average candidate functions number ratio kNN of firmware function screening based on SVM is few very It is more, it can be more conducive to the calculating of next stage in this way.Therefore, by analyzing above, it can be appreciated that the letter based on kNN Number sieve selects efficiency with higher, and the function based on SVM screens then accuracy rate with higher, in order to reach accuracy rate and effect Rate good trade-off, present invention uses a kind of function screening techniques for being used in mixed way kNN and SVM, to screen rank in function Section can reach preferable accuracy rate and efficiency.
As shown in figure 3, the function based on kNN-SVM screens, we select a suitable k value (k > 128) first, utilize KNN algorithm quickly obtains the k to be detected functions nearest with loophole function distance, then to be detected to this k using SVM algorithm Function is further screened, to leave less more accurate function as candidate functions, reduces the calculating of follow-up phase It measures and improves accuracy rate.
Detailed process is as follows for firmware function screening technique based on kNN-SVM:
The preliminary screening of kNN the considerations of for time and space, is tentatively sieved treating detection function using kNN algorithm When choosing is quickly to obtain with loophole function apart from k nearest function, we realize that kNN is calculated by the way of k-d tree Method.9 dimensional feature vectors of loophole function and function to be detected are all standardized first, so that often one-dimensional is all 0 Then numerical value between to 1 constructs k-d tree with the feature vector after functional standard to be detected again, finally by retrieval k-d Tree quickly filters out the k functions nearest with loophole function.It is worth noting that, using kNN algorithm treat detection function into When row preliminary screening, the value of k is extremely important.K value is too small to will affect accuracy rate, excessive to will affect efficiency.By testing, We finally found that under six kinds of association modes, when k value is 500, accuracy rate is attained by 90% or more, then takes small k value Words, accuracy rate decline obvious.
The further screening of SVM.After treating detection function using kNN and carrying out preliminary screening, we continue with SVM The range of candidate functions is reduced, further to reduce the calculation amount of next stage.In this step, we first use Busybox The source code of v1.21 constructs the training sample under different mode, then with these training samples training SVM model, obtains every Optimal classification surface under kind association mode, finally recycling these optimal classifications to face, k function is further to be screened, and is obtained Final candidate functions collection.
In second stage, i.e. the accurate matching stage of candidate functions, the main task in this stage is controlled in function property On the basis of flow graph, candidate functions are accurately matched using the structure feature of function, to find real with loophole function Matched function.In order to improve efficiency, the present invention completes the essence of loophole function and candidate functions using bipartite graph matching algorithm Really matching.
As shown in figure 4, the property control flow graph of given two functionsWith, whereinWithIt is respectivelyWithNode Collect, each of node collection node, i.e. each basic block are indicated with the feature vector of one 8 dimension, feature of this 8 dimension Vector basic block grade feature described in table 1 forms.
Since the essence of bipartite graph matching algorithm is measured therebetween by calculating the matching weight between two figures Similarity degree, therefore, the two property control flow graphs are regarded as the bipartite graph of an entirety by the present invention, Wherein,,It indicates from nodeIt arrivesA cum rights matching, power Value is thenWithBetween 8 dimensional feature vectors distance.Although figure 4, it is seen that by node collectionWith node collectionOne To one matching, there is various situations, but we only need to find out wherein to make weight and the smallest set of matches Conjunction can.
In the present invention, bipartite graph matching while weight be by while both ends the distance between basic block determine, Formula is as follows:
Wherein,Indicate basic blockFeature vector in i-th dimension numerical value,Indicate basic blockFeature vector neutralizeThat corresponding one-dimensional numerical value,Then indicate the difference that we are distributed to every one-dimensional characteristic in the feature vector of basic block Weight.The specific weight of each dimensional feature is as shown in Figure 7.
The least weight match algorithm of bipartite graph is sought using Kuhn-Munkres algorithm, and the similar journey of two functions is measured with this Degree, specific formula is as follows:
Wherein,Represent the property control flow graph acquired by Kuhn-Munkres algorithmWithBetween MINIMUM WEIGHT Matched weight.Represent be withBasic block number is identical and the feature of basic block is to the property control flow graph for being all 0, equally Ground,Represent be withBasic block number is identical and the feature vector of basic block be also all 0 property control flow graph.It is me The penalty term that is added,It is penalty coefficient,It isWithBetween basic block number difference, in addition penalty term after can Scale difference between property control flow graph is taken into account, also more to the similarity calculation between property control flow graph Accurately.
In conclusion the present invention provides a kind of cross-platform association detection method of firmware loophole, improve existing cross-platform Firmware loophole is associated with the accuracy rate and efficiency of detection method, and kNN is used in combination with SVM, has reached accuracy rate and efficiency is preferable Compromise;Bipartite graph matching algorithm is utilized on the basis of function property controlling stream graph, and function matching problem is changed into figure knot Structure Similarity measures problem, and joined penalty term on the basis of original algorithm, improve accurate matched accuracy rate;And Make this programme that there is higher detection efficiency using weighted euclidean distance and weighted Mahalanobis distance method.
Those skilled in the art do not depart from essence and spirit of the invention, can there are many deformation scheme realize the present invention, The foregoing is merely preferably feasible embodiments of the invention, and not thereby limiting the scope of the invention, all with this The variation of equivalent structure made by description of the invention and accompanying drawing content, is intended to be included within the scope of the present invention.

Claims (6)

1. a kind of cross-platform association detection method of firmware loophole, which comprises the following steps:
S1: firmware obtains the stage, and firmware acquisition can be consolidated in such a way that manufacturer's image download or user upload by hand Part;
S2: firmware decompression and dis-assembling stage, binary file relevant to firmware is obtained using firmware decompression tool, by solid Part decompression and dis-assembling, obtain firmware dis-assembling function;
S3: firmware function feature is extracted;
S4: utilizing the kNN-SVM based on weighted euclidean distance, treats detection function and carries out quickly screening and accurate matching, judgement Function to be detected is associated with accuracy with known bugs function;
S5: confirm that function to be detected is doubtful loophole.
2. the cross-platform association detection method of firmware loophole according to claim 1, it is characterised in that: according to step S4: Two stages are broadly divided into, first stage is treated detection function based on the numerical characteristics of function and is rapidly screened, and second A stage is then that the structure feature based on function accurately matches candidate functions.
3. the cross-platform association detection method of firmware loophole according to claim 2, it is characterised in that: the spy of the extraction Sign includes numerical characteristics and two kinds of structure feature, and numerical characteristics are primarily referred to as the numeralization feature of function rank;Structure feature is The feature of representative function property control flow graph structures is made of the feature and some structural informations of atomic block level.
4. the cross-platform association detection method of firmware loophole according to claim 3, it is characterised in that: described to be mentioned in feature After taking, it is thus necessary to determine that the corresponding weight of each dimensional feature selects Relief algorithm to determine weight.
5. the cross-platform association detection method of firmware loophole according to claim 4, it is characterised in that: the Relief is calculated Method the source code of Busybox v1.21 is obtained after process of compilation under these three platforms of ARM, MIPS and x86 respectively three The training dataset of a function set A, M and X as weight, by taking association mode " ARM → MIPS " as an example, we are first by function The feature vector for collecting each function in A and M carries out min-max standardization, so that all arriving 0 in feature vector per one-dimensional value Between 1;One and real matched function can be found for each of A function, in M ' and one and Unmatched function g, it is assumed that the feature vector after standardization is, ' standardization after feature vector be, g standardization after feature vector be, then we willMake The sample labeling that is positive is " 1 ", willThe sample labeling that is negative is " 0 ";Wherein, positive and negative two class obtained Training sample ratio is 1:1;Using training sample as the input of Relief algorithm, and iteration 10 times, seek its average characteristics weight.
6. the cross-platform association detection method of firmware loophole according to claim 1, it is characterised in that: described based on weighting The kNN-SVM of Euclidean distance, first by weighted Mahalanobis distance method be applied to kNN on, and select suitable k value treat detection function into Then the preliminary screening of row recycles SVM algorithm as before to do further screening to function to obtain candidate Collection of functions, wherein the calculation formula of the mahalanobis distance between function and function g is as follows using formula:
Wherein, X and Y is respectively function and 9 dimensional feature vectors of g, the covariance matrix of ∑ test sample feature space, and A is After weight matrix, feature and weight all determine, start to screen function.
CN201811149507.8A 2018-09-29 2018-09-29 A kind of cross-platform association detection method of firmware loophole Withdrawn CN109067800A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811149507.8A CN109067800A (en) 2018-09-29 2018-09-29 A kind of cross-platform association detection method of firmware loophole

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811149507.8A CN109067800A (en) 2018-09-29 2018-09-29 A kind of cross-platform association detection method of firmware loophole

Publications (1)

Publication Number Publication Date
CN109067800A true CN109067800A (en) 2018-12-21

Family

ID=64767077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811149507.8A Withdrawn CN109067800A (en) 2018-09-29 2018-09-29 A kind of cross-platform association detection method of firmware loophole

Country Status (1)

Country Link
CN (1) CN109067800A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111026012A (en) * 2019-11-29 2020-04-17 哈尔滨安天科技集团股份有限公司 Method and device for detecting PLC firmware level bugs, electronic equipment and storage medium
CN111310178A (en) * 2020-01-20 2020-06-19 武汉理工大学 Firmware vulnerability detection method and system under cross-platform scene
CN113191582A (en) * 2021-03-15 2021-07-30 西南石油大学 Road torrential flood vulnerability evaluation method based on GIS and machine learning
CN113254934A (en) * 2021-06-29 2021-08-13 湖南大学 Binary code similarity detection method and system based on graph matching network
CN114626071A (en) * 2022-03-21 2022-06-14 中国人民解放军国防科技大学 Vulnerability-oriented fuzzy test method, system and medium
CN116032654A (en) * 2023-02-13 2023-04-28 山东省计算中心(国家超级计算济南中心) Firmware vulnerability detection and data security management method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111026012A (en) * 2019-11-29 2020-04-17 哈尔滨安天科技集团股份有限公司 Method and device for detecting PLC firmware level bugs, electronic equipment and storage medium
CN111310178A (en) * 2020-01-20 2020-06-19 武汉理工大学 Firmware vulnerability detection method and system under cross-platform scene
CN111310178B (en) * 2020-01-20 2024-01-23 武汉理工大学 Firmware vulnerability detection method and system in cross-platform scene
CN113191582A (en) * 2021-03-15 2021-07-30 西南石油大学 Road torrential flood vulnerability evaluation method based on GIS and machine learning
CN113191582B (en) * 2021-03-15 2022-09-06 西南石油大学 Road torrential flood vulnerability evaluation method based on GIS and machine learning
CN113254934A (en) * 2021-06-29 2021-08-13 湖南大学 Binary code similarity detection method and system based on graph matching network
CN114626071A (en) * 2022-03-21 2022-06-14 中国人民解放军国防科技大学 Vulnerability-oriented fuzzy test method, system and medium
CN116032654A (en) * 2023-02-13 2023-04-28 山东省计算中心(国家超级计算济南中心) Firmware vulnerability detection and data security management method and system

Similar Documents

Publication Publication Date Title
CN109067800A (en) A kind of cross-platform association detection method of firmware loophole
CN109241740B (en) Malicious software benchmark test set generation method and device
US20170063893A1 (en) Learning detector of malicious network traffic from weak labels
CN109657473A (en) A kind of fine granularity leak detection method based on depth characteristic
CN112910859B (en) Internet of things equipment monitoring and early warning method based on C5.0 decision tree and time sequence analysis
CN106991325B (en) Protection method and device for software bugs
CN106096413B (en) A kind of malicious code detecting method based on multi-feature fusion and system
CN110198319A (en) Security protocol bug excavation method based on more counter-examples
CN111047173B (en) Community credibility evaluation method based on improved D-S evidence theory
CN111460250A (en) Image data cleaning method, image data cleaning device, image data cleaning medium, and electronic apparatus
CN107368526A (en) A kind of data processing method and device
CN113221960B (en) Construction method and collection method of high-quality vulnerability data collection model
CN108446559A (en) A kind of recognition methods of APT tissue and device
CN109740347A (en) A kind of identification of the fragile hash function for smart machine firmware and crack method
CN115017511A (en) Source code vulnerability detection method and device and storage medium
CN110825642B (en) Software code line-level defect detection method based on deep learning
CN115168856A (en) Binary code similarity detection method and Internet of things firmware vulnerability detection method
CN113297580B (en) Code semantic analysis-based electric power information system safety protection method and device
CN110808947B (en) Automatic vulnerability quantitative evaluation method and system
CN112016088A (en) Method and device for generating file detection model and method and device for detecting file
CN112200862A (en) Training method of target detection model, target detection method and device
CN117195220A (en) Intelligent contract vulnerability detection method and system based on Tree-LSTM and BiLSTM
CN116467720A (en) Intelligent contract vulnerability detection method based on graph neural network and electronic equipment
CN115455407A (en) Machine learning-based GitHub sensitive information leakage monitoring method
CN108647497A (en) A kind of API key automatic recognition systems of feature based extraction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181221

WW01 Invention patent application withdrawn after publication