• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xiao Ruiqing, Fei Jinlong, Zhu Yuefei, Cai Ruijie, Liu Shengli. Firmware Binary Comparison Technology Based on Community Detection Algorithm[J]. Journal of Computer Research and Development, 2022, 59(1): 209-235. DOI: 10.7544/issn1000-1239.20200778
Citation: Xiao Ruiqing, Fei Jinlong, Zhu Yuefei, Cai Ruijie, Liu Shengli. Firmware Binary Comparison Technology Based on Community Detection Algorithm[J]. Journal of Computer Research and Development, 2022, 59(1): 209-235. DOI: 10.7544/issn1000-1239.20200778

Firmware Binary Comparison Technology Based on Community Detection Algorithm

Funds: This work was supported by the National Key Research and Development Plan of China (2019QY1300) and the Foundation Enhancement Project of Science and Technology
More Information
  • Published Date: December 31, 2021
  • Firmware comparison is an important branch of binary comparison technology. However, the existing binary comparison technology is not ideal when applied to firmware comparison. Previous studies focused on the optimization of the function representation method, but neglected the design and improvement of filters, which led to mismatches caused by firmware containing isomorphic functions. For this reason, this paper proposes a firmware comparison technology based on community detection algorithms, and applies complex network related theories to the field of binary comparison for the first time. Divide the function in the firmware into several communities through the community detection algorithm, use community matching to realize the filter function, and then find the matching function according to the matching community; In addition, this paper optimizes the function similarity calculation method, and designs the operand similarity calculation method. After the prototype system is implemented, this paper uses 1382 firmware to construct two data sets for experiments to verify the feasibility, analyze the performance of the method in this paper, and determine the reasonable value of each parameter, design the credible matching rate as the evaluation index, and compare the method in this paper and Bindiff. Experiments show that this method can improve the accuracy of Bindiff comparison results by 5% to 11%.
  • Related Articles

    [1]Chen Kejia, Lu Hao, Zhang Jiajun. Conditional Variational Time-Series Graph Auto-Encoder[J]. Journal of Computer Research and Development, 2020, 57(8): 1663-1673. DOI: 10.7544/issn1000-1239.2020.20200202
    [2]Geng Pu, Zhu Yuefei. A Code Encrypt Technique Based on Branch Condition Obfuscation[J]. Journal of Computer Research and Development, 2019, 56(10): 2183-2192. DOI: 10.7544/issn1000-1239.2019.20190368
    [3]Shi Haihe, Zhou Weixing. Design and Implementation of Pairwise Sequence Alignment Algorithm Components Based on Dynamic Programming[J]. Journal of Computer Research and Development, 2019, 56(9): 1907-1917. DOI: 10.7544/issn1000-1239.2019.20180835
    [4]Zhou Yanhong, Zhang Xianyong, Mo Zhiwen. Conditional Neighborhood Entropy with Granulation Monotonicity and Its Relevant Attribute Reduction[J]. Journal of Computer Research and Development, 2018, 55(11): 2395-2405. DOI: 10.7544/issn1000-1239.2018.20170607
    [5]Guo Xi, Wang Pan. Variable Dependent Relation Analysis in Program State Condition Merging[J]. Journal of Computer Research and Development, 2018, 55(10): 2331-2342. DOI: 10.7544/issn1000-1239.2018.20170545
    [6]Zhao Liang, Wang Yongli, Du Zhongshu, Chen Guangsheng. HL-DAQ: A Dynamic Adaptive Quantization Coding for Hash Learning[J]. Journal of Computer Research and Development, 2018, 55(6): 1294-1307. DOI: 10.7544/issn1000-1239.2018.20170238
    [7]Liu Xianmin, Li Jianzhong. Discovering Extended Conditional Functional Dependencies[J]. Journal of Computer Research and Development, 2015, 52(1): 130-140. DOI: 10.7544/issn1000-1239.2015.20130691
    [8]Yang Wenguo, Guo Tiande, Zhao Tong. Routing Algorithms of the Wireless Sensor Network Based on Dynamic Programming[J]. Journal of Computer Research and Development, 2007, 44(5): 890-897.
    [9]Xia Yimin, Luo Jun, and Zhang Minxuan. Detecting Out-of-Bounds Accesses with Conditional Range Constraint[J]. Journal of Computer Research and Development, 2006, 43(10): 1760-1766.
    [10]Jiang Yuncheng, Shi Zhongzhi, Tang Yong, Wang Ju. A Distributed Dynamic Description Logic[J]. Journal of Computer Research and Development, 2006, 43(9): 1603-1608.
  • Cited by

    Periodical cited type(5)

    1. 蒋志荣,李亚男. 跨层安全访问多模态异构网络数据的数学建模. 计算机仿真. 2024(04): 475-479 .
    2. 褚治广,李俊燕,陈昊,张兴. 基于分布式多关联属性的高维数据差分隐私保护方法. 计算机工程与设计. 2024(04): 967-973 .
    3. 卢晓天,朴春慧,杨兴雨,白英杰. 基于贝叶斯网络的差分隐私高维数据发布技术研究. 计算机工程. 2024(05): 167-181 .
    4. 梁丹凝,梁坚. 基于Relief算法的不平衡数据分类分级算法仿真. 计算机仿真. 2024(06): 477-480+497 .
    5. 张小玉,沈国华,杨阳. 基于属性分割的差分隐私异构多属性数据发布. 计算机系统应用. 2022(10): 225-235 .

    Other cited types(12)

Catalog

    Article views (326) PDF downloads (189) Cited by(17)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return