Yingchao Yu*, Shuitao Gan, Xiaojun Qin
Journal on Internet of Things, Vol.4, No.1, pp. 1-20, 2022, DOI:10.32604/jiot.2022.019469
- 16 May 2022
Abstract In recent years, with the development of the natural language processing (NLP) technologies, security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity, achieved great progress. However, we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of instructions. In this paper, we propose firmVulSeeker—a vulnerability search tool for embedded firmware images, based on BERT and Siamese network. It first builds a BERT MLM task to observe and learn the semantics of… More >