Loading…
Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis
Reverse engineering is the process of understanding the inner working of a software system without having the source code. It is critical for firmware security validation, software vulnerability research, and malware analysis. However, it often requires a significant amount of manual effort. Recentl...
Saved in:
Published in: | Digital threats (Print) 2024-03, Vol.5 (1), p.1-25, Article 6 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-a277t-bf666cef1d34ff2f7b1dea0fd1ff13db7f2f61873ff78a1107ab0a40ac2aa2683 |
---|---|
cites | cdi_FETCH-LOGICAL-a277t-bf666cef1d34ff2f7b1dea0fd1ff13db7f2f61873ff78a1107ab0a40ac2aa2683 |
container_end_page | 25 |
container_issue | 1 |
container_start_page | 1 |
container_title | Digital threats (Print) |
container_volume | 5 |
creator | Taviss, Scarlett Ding, Steven H. H. Zulkernine, Mohammad Charland, Philippe Acharya, Sudipta |
description | Reverse engineering is the process of understanding the inner working of a software system without having the source code. It is critical for firmware security validation, software vulnerability research, and malware analysis. However, it often requires a significant amount of manual effort. Recently, data-driven solutions were proposed to reduce manual effort by identifying the code clones on the assembly or the source level. However, security analysts still have to understand the matched assembly or source code to develop an understanding of the functionality, and it is assumed that such a matched candidate always exists. This research bridges the gap by introducing the problem of assembly code summarization. Given the assembly code as input, we propose a machine-learning-based system that can produce human-readable summarizations of the functionalities in the context of code vulnerability analysis. We generate the first assembly code to function summary dataset and propose to leverage the encoder-decoder architecture. With the attention mechanism, it is possible to understand what aspects of the assembly code had the largest impact on generating the summary. Our experiment shows that the proposed solution achieves high accuracy and the Bilingual Evaluation Understudy (BLEU) score. Finally, we have performed case studies on real-life CVE vulnerability cases to better understand the proposed method’s performance and practical implications. |
doi_str_mv | 10.1145/3592623 |
format | article |
fullrecord | <record><control><sourceid>acm_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3592623</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3592623</sourcerecordid><originalsourceid>FETCH-LOGICAL-a277t-bf666cef1d34ff2f7b1dea0fd1ff13db7f2f61873ff78a1107ab0a40ac2aa2683</originalsourceid><addsrcrecordid>eNo9kM1Lw0AUxBdRsNTi3dPePEX3I9lNvYXSVqEgWPUaXpK3ZWWzqbutmP_eBKunecz7MQxDyDVnd5yn2b3M5kIJeUYmItMqyaTU58Ot5iLhSqhLMovxgzEmJE_zbD4hsYit2OLnA11-7x1YD5VDWsSIbeV6uugapKujrw-28-Do9ti2EHq6Ro8BRpOaLtAX_MIQkS79znrEYP2Ogm_o-9GNXGWdPfS0GBL6aOMVuTDgIs5OOiVvq-Xr4jHZPK-fFsUmAaH1IamMUqpGwxuZGiOMrniDwEzDjeGyqfTgKZ5raYzOgXOmoWKQMqgFgFC5nJLb39w6dDEGNOU-2LF-yVk5zlWe5hrIm18S6vYf-nv-ANkSZy4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis</title><source>ACM Digital Library</source><creator>Taviss, Scarlett ; Ding, Steven H. H. ; Zulkernine, Mohammad ; Charland, Philippe ; Acharya, Sudipta</creator><creatorcontrib>Taviss, Scarlett ; Ding, Steven H. H. ; Zulkernine, Mohammad ; Charland, Philippe ; Acharya, Sudipta</creatorcontrib><description>Reverse engineering is the process of understanding the inner working of a software system without having the source code. It is critical for firmware security validation, software vulnerability research, and malware analysis. However, it often requires a significant amount of manual effort. Recently, data-driven solutions were proposed to reduce manual effort by identifying the code clones on the assembly or the source level. However, security analysts still have to understand the matched assembly or source code to develop an understanding of the functionality, and it is assumed that such a matched candidate always exists. This research bridges the gap by introducing the problem of assembly code summarization. Given the assembly code as input, we propose a machine-learning-based system that can produce human-readable summarizations of the functionalities in the context of code vulnerability analysis. We generate the first assembly code to function summary dataset and propose to leverage the encoder-decoder architecture. With the attention mechanism, it is possible to understand what aspects of the assembly code had the largest impact on generating the summary. Our experiment shows that the proposed solution achieves high accuracy and the Bilingual Evaluation Understudy (BLEU) score. Finally, we have performed case studies on real-life CVE vulnerability cases to better understand the proposed method’s performance and practical implications.</description><identifier>ISSN: 2692-1626</identifier><identifier>EISSN: 2576-5337</identifier><identifier>DOI: 10.1145/3592623</identifier><language>eng</language><publisher>New York, NY: ACM</publisher><subject>Malware and its mitigation ; Security and privacy</subject><ispartof>Digital threats (Print), 2024-03, Vol.5 (1), p.1-25, Article 6</ispartof><rights>Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-a277t-bf666cef1d34ff2f7b1dea0fd1ff13db7f2f61873ff78a1107ab0a40ac2aa2683</citedby><cites>FETCH-LOGICAL-a277t-bf666cef1d34ff2f7b1dea0fd1ff13db7f2f61873ff78a1107ab0a40ac2aa2683</cites><orcidid>0000-0003-4513-200X ; 0000-0001-7907-2426 ; 0000-0002-3014-0907 ; 0000-0003-0913-3638 ; 0000-0003-4051-9942</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3592623$$EPDF$$P50$$Gacm$$Hfree_for_read</linktopdf><link.rule.ids>314,780,784,2282,27924,27925,40196,76228</link.rule.ids></links><search><creatorcontrib>Taviss, Scarlett</creatorcontrib><creatorcontrib>Ding, Steven H. H.</creatorcontrib><creatorcontrib>Zulkernine, Mohammad</creatorcontrib><creatorcontrib>Charland, Philippe</creatorcontrib><creatorcontrib>Acharya, Sudipta</creatorcontrib><title>Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis</title><title>Digital threats (Print)</title><addtitle>ACM DTRAP</addtitle><description>Reverse engineering is the process of understanding the inner working of a software system without having the source code. It is critical for firmware security validation, software vulnerability research, and malware analysis. However, it often requires a significant amount of manual effort. Recently, data-driven solutions were proposed to reduce manual effort by identifying the code clones on the assembly or the source level. However, security analysts still have to understand the matched assembly or source code to develop an understanding of the functionality, and it is assumed that such a matched candidate always exists. This research bridges the gap by introducing the problem of assembly code summarization. Given the assembly code as input, we propose a machine-learning-based system that can produce human-readable summarizations of the functionalities in the context of code vulnerability analysis. We generate the first assembly code to function summary dataset and propose to leverage the encoder-decoder architecture. With the attention mechanism, it is possible to understand what aspects of the assembly code had the largest impact on generating the summary. Our experiment shows that the proposed solution achieves high accuracy and the Bilingual Evaluation Understudy (BLEU) score. Finally, we have performed case studies on real-life CVE vulnerability cases to better understand the proposed method’s performance and practical implications.</description><subject>Malware and its mitigation</subject><subject>Security and privacy</subject><issn>2692-1626</issn><issn>2576-5337</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNo9kM1Lw0AUxBdRsNTi3dPePEX3I9lNvYXSVqEgWPUaXpK3ZWWzqbutmP_eBKunecz7MQxDyDVnd5yn2b3M5kIJeUYmItMqyaTU58Ot5iLhSqhLMovxgzEmJE_zbD4hsYit2OLnA11-7x1YD5VDWsSIbeV6uugapKujrw-28-Do9ti2EHq6Ro8BRpOaLtAX_MIQkS79znrEYP2Ogm_o-9GNXGWdPfS0GBL6aOMVuTDgIs5OOiVvq-Xr4jHZPK-fFsUmAaH1IamMUqpGwxuZGiOMrniDwEzDjeGyqfTgKZ5raYzOgXOmoWKQMqgFgFC5nJLb39w6dDEGNOU-2LF-yVk5zlWe5hrIm18S6vYf-nv-ANkSZy4</recordid><startdate>20240321</startdate><enddate>20240321</enddate><creator>Taviss, Scarlett</creator><creator>Ding, Steven H. H.</creator><creator>Zulkernine, Mohammad</creator><creator>Charland, Philippe</creator><creator>Acharya, Sudipta</creator><general>ACM</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-4513-200X</orcidid><orcidid>https://orcid.org/0000-0001-7907-2426</orcidid><orcidid>https://orcid.org/0000-0002-3014-0907</orcidid><orcidid>https://orcid.org/0000-0003-0913-3638</orcidid><orcidid>https://orcid.org/0000-0003-4051-9942</orcidid></search><sort><creationdate>20240321</creationdate><title>Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis</title><author>Taviss, Scarlett ; Ding, Steven H. H. ; Zulkernine, Mohammad ; Charland, Philippe ; Acharya, Sudipta</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a277t-bf666cef1d34ff2f7b1dea0fd1ff13db7f2f61873ff78a1107ab0a40ac2aa2683</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Malware and its mitigation</topic><topic>Security and privacy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Taviss, Scarlett</creatorcontrib><creatorcontrib>Ding, Steven H. H.</creatorcontrib><creatorcontrib>Zulkernine, Mohammad</creatorcontrib><creatorcontrib>Charland, Philippe</creatorcontrib><creatorcontrib>Acharya, Sudipta</creatorcontrib><collection>CrossRef</collection><jtitle>Digital threats (Print)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Taviss, Scarlett</au><au>Ding, Steven H. H.</au><au>Zulkernine, Mohammad</au><au>Charland, Philippe</au><au>Acharya, Sudipta</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis</atitle><jtitle>Digital threats (Print)</jtitle><stitle>ACM DTRAP</stitle><date>2024-03-21</date><risdate>2024</risdate><volume>5</volume><issue>1</issue><spage>1</spage><epage>25</epage><pages>1-25</pages><artnum>6</artnum><issn>2692-1626</issn><eissn>2576-5337</eissn><abstract>Reverse engineering is the process of understanding the inner working of a software system without having the source code. It is critical for firmware security validation, software vulnerability research, and malware analysis. However, it often requires a significant amount of manual effort. Recently, data-driven solutions were proposed to reduce manual effort by identifying the code clones on the assembly or the source level. However, security analysts still have to understand the matched assembly or source code to develop an understanding of the functionality, and it is assumed that such a matched candidate always exists. This research bridges the gap by introducing the problem of assembly code summarization. Given the assembly code as input, we propose a machine-learning-based system that can produce human-readable summarizations of the functionalities in the context of code vulnerability analysis. We generate the first assembly code to function summary dataset and propose to leverage the encoder-decoder architecture. With the attention mechanism, it is possible to understand what aspects of the assembly code had the largest impact on generating the summary. Our experiment shows that the proposed solution achieves high accuracy and the Bilingual Evaluation Understudy (BLEU) score. Finally, we have performed case studies on real-life CVE vulnerability cases to better understand the proposed method’s performance and practical implications.</abstract><cop>New York, NY</cop><pub>ACM</pub><doi>10.1145/3592623</doi><tpages>25</tpages><orcidid>https://orcid.org/0000-0003-4513-200X</orcidid><orcidid>https://orcid.org/0000-0001-7907-2426</orcidid><orcidid>https://orcid.org/0000-0002-3014-0907</orcidid><orcidid>https://orcid.org/0000-0003-0913-3638</orcidid><orcidid>https://orcid.org/0000-0003-4051-9942</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2692-1626 |
ispartof | Digital threats (Print), 2024-03, Vol.5 (1), p.1-25, Article 6 |
issn | 2692-1626 2576-5337 |
language | eng |
recordid | cdi_crossref_primary_10_1145_3592623 |
source | ACM Digital Library |
subjects | Malware and its mitigation Security and privacy |
title | Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T20%3A08%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Asm2Seq:%20Explainable%20Assembly%20Code%20Functional%20Summary%20Generation%20for%20Reverse%20Engineering%20and%20Vulnerability%20Analysis&rft.jtitle=Digital%20threats%20(Print)&rft.au=Taviss,%20Scarlett&rft.date=2024-03-21&rft.volume=5&rft.issue=1&rft.spage=1&rft.epage=25&rft.pages=1-25&rft.artnum=6&rft.issn=2692-1626&rft.eissn=2576-5337&rft_id=info:doi/10.1145/3592623&rft_dat=%3Cacm_cross%3E3592623%3C/acm_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-a277t-bf666cef1d34ff2f7b1dea0fd1ff13db7f2f61873ff78a1107ab0a40ac2aa2683%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |