• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

相似文献

1
Syntactic-Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices.物联网设备中克隆导致的漏洞的句法-语义检测
Sensors (Basel). 2024 Nov 13;24(22):7251. doi: 10.3390/s24227251.
2
A systematic literature review on the applications of recurrent neural networks in code clone research.基于循环神经网络在代码克隆研究中的应用的系统性文献回顾。
PLoS One. 2024 Feb 2;19(2):e0296858. doi: 10.1371/journal.pone.0296858. eCollection 2024.
3
A novel code representation for detecting Java code clones using high-level and abstract compiled code representations.一种使用高级和抽象的编译代码表示来检测 Java 代码克隆的新代码表示方法。
PLoS One. 2024 May 10;19(5):e0302333. doi: 10.1371/journal.pone.0302333. eCollection 2024.
4
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction.使用具有自注意力池化、深度序列和基于图的混合特征提取的量子卷积神经网络在Java源代码中进行漏洞检测。
Sci Rep. 2024 Mar 28;14(1):7406. doi: 10.1038/s41598-024-56871-z.
5
iDetect for vulnerability detection in internet of things operating systems using machine learning.使用机器学习进行物联网操作系统漏洞检测的 iDetect。
Sci Rep. 2022 Oct 12;12(1):17086. doi: 10.1038/s41598-022-21325-x.
6
PBDiff: Neural network based program-wide diffing method for binaries.PBDiff:一种基于神经网络的二进制文件全程序差异检测方法。
Math Biosci Eng. 2022 Jan 13;19(3):2774-2799. doi: 10.3934/mbe.2022127.
7
Implementing a high-efficiency similarity analysis approach for firmware code.实现一种高效的固件代码相似性分析方法。
PLoS One. 2021 Jan 12;16(1):e0245098. doi: 10.1371/journal.pone.0245098. eCollection 2021.
8
Ex2Vec: Enhancing assembly code semantics with end-to-end execution-aware embeddings.Ex2Vec:通过端到端执行感知嵌入增强汇编代码语义。
Neural Netw. 2025 Sep;189:107506. doi: 10.1016/j.neunet.2025.107506. Epub 2025 May 1.
9
Aggregating the syntactic and semantic similarity of healthcare data towards their transformation to HL7 FHIR through ontology matching.通过本体匹配,聚合医疗保健数据的语法和语义相似性,以将其转换为 HL7 FHIR。
Int J Med Inform. 2019 Dec;132:104002. doi: 10.1016/j.ijmedinf.2019.104002. Epub 2019 Oct 5.
10
MSSA: multi-stage semantic-aware neural network for binary code similarity detection.MSSA:用于二进制代码相似性检测的多阶段语义感知神经网络。
PeerJ Comput Sci. 2025 Jan 17;11:e2504. doi: 10.7717/peerj-cs.2504. eCollection 2025.

物联网设备中克隆导致的漏洞的句法-语义检测

Syntactic-Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices.

作者信息

Kalinin Maxim, Gribkov Nikita

机构信息

Institute of Computer Science and Cybersecurity, Peter the Great St. Petersburg Polytechnic University, 29 Polytekhnicheskaya ul., 195251 St. Petersburg, Russia.

出版信息

Sensors (Basel). 2024 Nov 13;24(22):7251. doi: 10.3390/s24227251.

DOI:10.3390/s24227251
PMID:39599028
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11597925/
Abstract

This paper addresses the problem of IoT security caused by code cloning when developing a massive variety of different smart devices. A clone detection method is proposed to identify clone-caused vulnerabilities in IoT software. A hybrid solution combines syntactic and semantic analyses of the code. Based on the recovered code, an attributed abstract syntax tree is constructed for each code fragment. All nodes of the commonly used abstract syntax tree are proposed to be weighted with semantic attribute vectors. Each attributed tree is then encoded as a semantic vector using a Deep Graph Neural Network. Two graph networks are combined into a Siamese neural model, allowing training to generate semantic vectors and compare vector pairs within each training epoch. Semantic analysis is also applied to clones with low similarity metric values. This allows one to correct the similarity decision in the case of incorrect matching of functions at the syntactic level. To automate the search for clones, the BinDiff algorithm is added in the first stage to accurately select clone candidates. This has a positive impact on the ability to apply the proposed method to large sets of binary code. In an experimental study, the developed method-compared to BinDiff, Gemini, and Asteria tools-has demonstrated the highest efficiency.

摘要

本文探讨了在开发大量不同的智能设备时,由代码克隆导致的物联网安全问题。提出了一种克隆检测方法,以识别物联网软件中由克隆引起的漏洞。一种混合解决方案结合了代码的句法和语义分析。基于恢复的代码,为每个代码片段构建一个属性抽象语法树。建议对常用抽象语法树的所有节点用语义属性向量进行加权。然后使用深度图神经网络将每个属性树编码为一个语义向量。将两个图网络组合成一个连体神经模型,允许在每个训练周期内进行训练以生成语义向量并比较向量对。语义分析也应用于相似度度量值较低的克隆。这使得在句法层面函数匹配不正确的情况下能够纠正相似度判定。为了自动搜索克隆,在第一阶段添加了BinDiff算法以准确选择克隆候选对象。这对将所提出的方法应用于大量二进制代码集的能力有积极影响。在一项实验研究中,与BinDiff、Gemini和Asteria工具相比,所开发的方法已证明具有最高的效率。