Design and Implementation of Binary Function Similarity Analysis System Based on Deep Learning

  • Borui Sun
  • , Yong Xu*
  • , Jinyi Song
  • , Xiao Tan
  • , Xuan Wen
  • , Yifei Zhao
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Binary function similarity analysis is vital for tasks like malware detection, vulnerability identification, and software maintenance. Traditional methods - relying on handcrafted features or rigid structures - often fail to handle diverse architectures, compiler optimizations, and obfuscation. This paper presents a deep learning-based approach that learns semantic vector representations of binary functions directly from assembly instructions. A two-phase embedding model transforms instructions into context-aware vectors, and a self-attention network highlights key instructions and structural patterns. Using a Siamese architecture and contrastive learning, the system maps similar functions closer together, improving accuracy and scalability. Experimental results on a large, varied dataset show consistently high performance under diverse conditions, demonstrating the method's robustness and potential for practical applications. The method's robustness against code variations makes it applicable to aerospace systems, such as verifying avionics firmware integrity or detecting tampered flight control modules.

Original languageEnglish
Title of host publicationProceedings of the 44th Chinese Control Conference, CCC 2025
EditorsJian Sun, Hongpeng Yin
PublisherIEEE Computer Society
Pages8513-8517
Number of pages5
ISBN (Electronic)9789887581611
DOIs
Publication statusPublished - 2025
Event44th Chinese Control Conference, CCC 2025 - Chongqing, China
Duration: 28 Jul 202530 Jul 2025

Publication series

NameChinese Control Conference, CCC
ISSN (Print)1934-1768
ISSN (Electronic)2161-2927

Conference

Conference44th Chinese Control Conference, CCC 2025
Country/TerritoryChina
CityChongqing
Period28/07/2530/07/25

Keywords

  • Aerospace engineering
  • Binary function similarity
  • Malicious software
  • Network security
  • Self-attention neural network

Fingerprint

Dive into the research topics of 'Design and Implementation of Binary Function Similarity Analysis System Based on Deep Learning'. Together they form a unique fingerprint.

Cite this