Abstract
In this work, methods are presented that allow a comparison between control flow paths. The intended use cases for these methods are weak points and bug detection. In existing work, control flow graphs have always been compared with each other to achieve those goals. Nevertheless, vulnerabilities or bugs can be hidden in completely different contexts, i.e. in different parts of the program. Therefore, this work deals with the extraction, coding and comparison of control flow paths. This is because the path of a vulnerability or bug in which the instructions are executed is always similar.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alon, U., Brody, S., Levy, O., Yahav, E.: Code2seq: generating sequences from structured representations of code, p. 22 (2019)
Alon, U., Zilberstein, M., Levy, O., Yahav, E.: Code2vec: learning distributed representations of code. Proc. ACM Program. Lang. 3(POPL), 1–29 (2019)
Crelier, R.: OP2: A Portable Oberon–2 Compiler, p. 10
David, Y., Yahav, E.: Tracelet-based code search in executables. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation - PLDI 2014, Edinburgh, United Kingdom, pp. 349–360. ACM Press (2013)
DeFreez, D., Thakur, A.V., Rubio-González, C.: Path-based function embedding and its application to error-handling specification mining. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018, Lake Buena Vista, FL, USA, pp. 423–433. ACM Press (2018)
Le, L., Patterson, A., White, M.: Supervised autoencoders: improving generalization performance with unsupervised regularizers, p. 11
Pewny, J., Schuster, F., Bernhard, L., Holz, T., Rossow, C.: Leveraging semantic signatures for bug search in binary programs. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, Louisiana, pp. 406–415. ACM Press (2014)
Vallée-Rai, R., Co, P., Gagnon, E., Hendren, L., Lam, P., Sundaresan, V.: Soot: a Java bytecode optimization framework. In: CASCON First Decade High Impact Papers, CASCON 2010, Toronto, Ontario, Canada, pp. 214–224. ACM Press (2010)
Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., Song, D.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS 2017, pp. 363–376 (2017). arXiv: 1708.06525
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Schäfer, A., Amme, W. (2021). Detecting Control Flow Similarities Using Machine Learning Techniques. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Systems and Applications. IntelliSys 2020. Advances in Intelligent Systems and Computing, vol 1252. Springer, Cham. https://doi.org/10.1007/978-3-030-55190-2_48
Download citation
DOI: https://doi.org/10.1007/978-3-030-55190-2_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-55189-6
Online ISBN: 978-3-030-55190-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)