Work place: Dept. of Computer Science & Engineering, JNNCE Shivamogga, Visvesvaraya Technological University, Belagavi – 590018, India
E-mail: mohan.hg0408@gmail.com
Website:
Research Interests: Deep Learning
Biography
Mohan H G is currently working as Assistant Professor in the department of Computer Science and Engineering, JNNCE Shivamogga and pursuing his Ph.D in Visvesvaraya Technological University, Belagavi in the field of Cyber Security. He received his M.Tech. in Computer Science and Engineering from Visvesvaraya Technological University, India in 2014. His research interests include Semantic Networks, Deep Learning and Cybersecurity.
By Nandish M. Jalesh Kumar Mohan H. G. Manjunath Sargur Krishnamurthy
DOI: https://doi.org/10.5815/ijcnis.2025.03.05, Pub. Date: 8 Jun. 2025
Binary code similarity detection (BCSD) is a method for identifying similarities between two or more slices of binary code (machine code or assembly code) without access to their original source code. BCSD is often used in many areas, such as vulnerability detection, plagiarism detection, malware analysis, copyright infringement and software patching. Numerous approaches have been developed in these areas via graph matching and deep learning algorithms. Existing solutions have low detection accuracy and lack cross-architecture analysis. This work introduces a cross-platform graph deep learning-based approach, i.e., GraphConvDeep, which uses graph convolution networks to compute the embedding. The proposed GraphConvDeep approach relies on the control flow graph (CFG) of individual binary functions. By evaluating the distance between two embeddings of functions, the similarity is detected. The experimental results show that GraphConvDeep is better than other cutting-edge methods at accurately detecting similarities, achieving an average accuracy of 95% across different platforms. The analysis shows that the proposed approach achieves better performance with an area under the curve (AUC) value of 96%, particularly in identifying real-world vulnerabilities.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals