Searching Open-Source Vulnerability Function Based on Software Modularization
-
Published:2023-01-04
Issue:2
Volume:13
Page:701
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Guo Xixi, Cai Ruijie, Yin XiaokangORCID, Shao Wenqiang, Liu Shengli
Abstract
Vulnerable open-source component reuse can lead to security problems. At present, open-source component detection for binary programs can only reveal whether open-source components with vulnerabilities are reused, which cannot determine the specific location of vulnerabilities. To address this problem, we propose BMVul, an open-source vulnerability function detection based on the software modularization method, which is oriented to binary programs. BMVul performs binary modularization by the overlapping clustering method DBM based on directed graph, then uses feature comparison technology to carry out modular software component analysis. After creating open-source component vulnerability function set through function signature, BMVul detects vulnerability function in the binary modules reusing open-source components. The experimental results show that compared with the component detection based on Louvain modularization and B2SFinder, BMVul improves the precision by 3.16% and 59.57%, respectively. Moreover, the precision of unique binary module matching is improved by 39.43% compared with the Louvain method. The F1 score is improved by 8.45% compared to B2SFinder. Module-level detection narrows the search space of vulnerability functions, thereby reducing the workload of open-source vulnerability detection, which is of great significance for software security analysis.
Funder
the Foundation Strengthening Key Project of the Science & Technology Commission
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference36 articles.
1. Ruian, D., Ashish, B., Meng, X., Taesoo, K., and Wenke, L. (November, January 30). Identifying open-source license violation and 1-day 421 security risk at large scale. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS’17, Dallas, TX, USA. 2. Yuan, Z., Xu, J., Piao, A., Xue, J., Huo, W., Feng, M., Li, F., Ban, G., Xiao, Y., and Wang, S. (2019, January 11–15). B2SFinder: Detecting open-source software reuse in COTS software. Proceedings of the 2019 34th IEEE/ACM International Conference on Automated Software Engineering, San Diego, CA, USA. 3. B2SMatcher: Fine-Grained version identification of open-Source software in binary files;Ban;Cybersecurity,2021 4. Hemel, A., Kalleberg, K.T., Vermaas, R., and Dolstra, E. (2011, January 21–22). BAT Finding software license violations through binary code clone detection. Proceedings of the 33rd International Conference on Software Engineering, Honolulu, HI, USA. 5. (2022, November 24). Heartbleed. Available online: https://en.wikipedia.org/wiki/Heartbleed.
|
|