Binary oriented vulnerability analyzer based on Hidden Markov Model

Hao Bai*, Chang Zhen Hu, Gang Zhang, Xiao Chuan Jing, Ning Li

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

The letter proposes a novel binary vulnerability analyzer for executable programs that is based on the Hidden Markov Model. A vulnerability instruction library (VIL) is primarily constructed by collecting binary frames located by double precision analysis. Executable programs are then converted into structurized code sequences with the VIL. The code sequences are essentially context-sensitive, which can be modeled by Hidden Markov Model (HMM). Finally, the HMM based vulnerability analyzer is built to recognize potential vulnerabilities of executable programs. Experimental results show the proposed approach achieves lower false positive/negative rate than latest static analyzers.

Original languageEnglish
Pages (from-to)3410-3413
Number of pages4
JournalIEICE Transactions on Information and Systems
VolumeE93-D
Issue number12
DOIs
Publication statusPublished - Dec 2010

Keywords

  • Binary
  • Double precision analysis
  • Executable program
  • Hidden Markov Model
  • Vulnerability instruction library

Fingerprint

Dive into the research topics of 'Binary oriented vulnerability analyzer based on Hidden Markov Model'. Together they form a unique fingerprint.

Cite this