CFG2VEC is a novel Hierarchical Graph Neural Network approach designed to significantly improve the analysis of vulnerable binaries in software reverse engineering.
CFG2VEC introduces a cutting-edge technique for software reverse engineering by employing a Hierarchical Graph Neural Network (GNN) based method. This technology utilizes a unique Graph-of-Graph (GoG) representation to analyze binary functions across various CPU architectures, significantly enhancing the process of identifying and predicting function names in stripped binaries. Built as a plugin for the Ghidra reverse engineering tool, cfg2vec leverages hierarchical graph embedding and siamese network-based supervised learning to outperform existing tools in function name prediction and generalization across unseen CPU architectures.
· Enhanced tools for cybersecurity professionals and reverse engineers analyzing vulnerable software.
· Automated identification and patching of security vulnerabilities in mission-critical embedded software.
· Advanced academic research in the fields of machine learning, cybersecurity, and software development.
· Integration into existing software analysis and development tools to improve efficiency and accuracy.
· Superior accuracy in function name prediction, outperforming the state-of-the-art
· Ability to generalize across various CPU architectures with a single training model.
· Significant improvement in performance with increased training data, achieving better results.
· Facilitates the analysis of binaries built from unseen CPU architectures.
· Integrates seamlessly with Ghidra, enhancing its functionality for reverse engineers.
Patent Pending
software reverse engineering, binary analysis, cross-architecture, machine learning, graph neural network