
Problematic Issues of a Program Representations Genetic De-evolution for Search Vulnerabilities and Recommendations for Its Resolution
https://doi.org/10.31854/1813-324X-2025-11-1-84-98
EDN: URSGXI
Abstract
The relevance of the topic is justified by the software reverse engineering methodology lack required to resolve the following scientific contradiction in the field (as a contrast between need and opportunity): on the one hand, vulnerability search is most effective in those program representations in which they were implemented (e.g. source code, algorithms or architecture); on the other hand, as a rule, only machine code is available for analysis, which is poorly suited for identifying high-level vulnerabilities (i.e. from earlier representations). The main author's study, the final stage of which is given in the article, is devoted to the creation of the this methodology elements (concept, model, method, algorithms, metrics, as well as their implementations).
The purpose of this article is to discuss 25 problematic issues (the so-called scientific discussion) that arose in the main study devoted to the software reverse engineering development based on genetic algorithms. The main application of the research results is both obtaining a program representation suitable for expert (and other) analysis for vulnerabilities, and their direct search using the built-in signature method. At the same time, resolving even a part of the issues will significantly increase the efficiency of such genetic reverse engineering.
The following methods were used in the work: the main research results analysis to identify problematic issues, ways to resolve them synthesis, as well as issues systematization and scoring from the standpoint of ways to eliminate them for an overall assessment of the scientific work completeness.
A causes of each issue detailed research allowed us to determine ways to resolve them, the feasibility of which also justifies the main research results. In particular, problematic issues are based both on some absence of theoretical tools necessary for genetic reverse engineering, and on the insufficient practical efficiency of others.
The scientific novelty of the issues lies in the fact that almost each of them is voiced for the first time.
The theoretical significance lies in the fact that the development of each problematic issue can both open a separate scientific study (or even a direction), and obtain new significant results.
The practical significance lies in the possibility of creating software solutions to resolve identified issues, which can also be applied to related tasks.
Keywords
About the Author
K. E. IzrailovRussian Federation
References
1. Getman A.I., Goryunov M.N., Matskevich A.G., Rybolovlev D.A. A Comparison of a Machine Learning-Based Intrusion Detection System and Signature-Based Systems. Proceedings of the Institute for System Programming of the RAS. 2022;34(5):111‒126. (in Russ.) DOI:10.15514/ISPRAS-2022-34(5)-7. EDN:LDJOUO
2. Izrailov K.E., Gololobov N.V., Kraskin G.A. Method of Malware Analysis Based on Fuzzy Hash. Informatization and communication. 2019;2:36‒44. (in Russ.) EDN:DUIUJM
3. Izrailov K. Genetic Decompilation Concept of the Telecommunication Devices Machine Code. Proceedings of Telecommunication Universities. 2021;7(4):95‒109. (in Russ.) DOI:10.31854/1813-324X-2021-7-4-95-109. EDN:AIOFPM
4. Izrailov K.E. The Genetic De-Evolution Concept of Program Representations. Part 1. Voprosy kiberbezopasnosti. 2024;1(59):61‒66. (in Russ.) DOI:10.21681/2311-3456-2024-1-61-66. EDN:CBCKRF
5. Izrailov K.E. The Genetic De-Evolution Concept of Program Representations. Part 2. Voprosy kiberbezopasnosti. 2024;2(60):81‒86. (in Russ.) DOI:10.21681/2311-3456-2024-2-81-86. EDN:JUBPML
6. Skobtsov Yu.A. From Genetic Algorithms to Metaheuristics. Informatika i kibernetika. 2021;1-2(23-24):101‒107. EDN:ILCTUW
7. Totukhov K.E., Romanov A.Yu., Lukyanov V.I. Investigation of the Effectiveness of Genetic Algorithms with Various Methods of Crossing and Selection. Scientific Works of the Kuban State Technological University. 2022;6:98‒109. (in Russ.) EDN:DPRWIJ
8. Emelyanov A.A. The Reflexive Recognizing Grammar. Bulletin of VSAWT. 2016;46:23‒32. (in Russ.) EDN:VPBBLP
9. Izrailov K.E., Buinevich M.V. Signature Search for Vulnerabilities in Machine Code Based on Genetic Decompilation. Zaŝita informacii. Inside. 2025;2(122):2‒11. (in Russ.)
10. Mikulik I.I., Utkin L.V., Golubeva I.E. Development and Research of Methods for Local Interpretation of the Siaman Neural Network Based on Explanatory Intelligence. Mathematical methods in technics and technologies - MMTT. 2020;10:88‒91. (in Russ.) EDN:SBFYYB
11. Silenko D.I., Lebedev I.G. Global Optimization Algorithm That Uses Decision Trees To Find Local Extrema. Problems of Informatics. 2023;2(59):21‒33. (in Russ.) DOI:10.24412/2073-0667-2023-2-21-33. EDN:MLGKOX
12. Pyrnova O.A., Nikonorov D.P., Sharifullina A.Yu. Development of a Static Program Code Analyzer. Nauchno-tekhnicheskii vestnik Povolzhia. 2023;12:522‒525. (in Russ.) EDN:AVFOIE
13. Izrailov K.E. Constant Values Distribution Investigation in the C Programs Source Code. Proceedings of Telecommunication Universities. 2024;10(5):119‒129. (in Russ.) DOI:10.31854/1813-324X-2024-10-5-118-128. EDN:KARAVM
14. Hu W., Chen T., Zhang N., Ma J. Adjust ELF Format for Multi-core Architecture. Proceedings of the International Conference on Electronic Computer Technology, 20‒22 February 2009, Macau, China. IEEE; 2009. p.388‒391. DOI:10.1109/ICECT.2009.73
15. Tsygankov V.A., Shabalina O.A., Kataev A.V. Investigation of the Impact of Population Size on the Performance of a Genetic Algorithm. Izvestiya SFedU. Engineering Sciences. 2024;3(239):168‒176. (in Russ.) DOI:10.18522/2311-3103-2024-3-168-176. EDN:IAFWKU
16. Izrailov K.E. Predicting the Size of the Source Code of a Binary Program in the Interests of Its Intellectual Reverse Engineering. Voprosy kiberbezopasnosti. 2024;4(62):13‒25. (in Russ.) DOI:10.21681/2311-3456-2024-4-13-25. EDN:NRFCND
17. Izrailov K.E., Buinevich M.V. Author's metric for assessing proximity of programs: application for vulnerability search using genetic de-evolution. Software & Systems. 2025;38(1):197–206. (in Russ.) DOI:10.15827/0236-235X.149.197-206
18. Pikalov M.V., Pismerov A.M. Genetic Algorithm Parameter Tuning Using Exploratory Landscape Analysis and Machine Learning. Izvestiya SFedU. Engineering Sciences. 2024;2(238):221‒228. (in Russ.) DOI:10.18522/2311-3103-2024-2-221-228. EDN:EFIXDB
19. Pan Z., Yan Y., Yu L., Wang T. Identification of binary file compilation information. Proceedings of the IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference, 16‒18 December 2022, Chongqing, China. IEEE; 2022. p.1141‒1150. DOI:10.1109/IMCEC55388.2022.10019958
20. Kotenko I., Izrailov K., Buinevich M. Analytical Modeling for Identification of the Machine Code Architecture of Cyberphysical Devices in Smart Homes. Sensors. 2022;22(3):1017. DOI:10.3390/s22031017. EDN:WPXNDJ
21. Kotenko I., Izrailov K., Buinevich M. The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices. Journal of Sensor and Actuator Networks. 2023;12(1):11. DOI:10.3390/jsan12010011. EDN:POQUEB
22. Beckman B., Haile J. Binary Analysis with Architecture and Code Section Detection using Supervised Machine Learning. Proceedings of the IEEE Security and Privacy Workshops, 21‒21 May 2020, San Francisco, USA. IEEE; 2020. PP. 152‒156. DOI:10.1109/SPW50608.2020.00041
23. Gusenko M.Yu. Creating a Common Notation of the X86 Processor Software Interface for Automated Disassembler Construction. Software systems and computational methods. 2024;2:119‒146. (in Russ.) DOI:10.7256/2454-0714.2024.2.70951. EDN:EJJSYT
24. Dolidze A.N. Overview of the Specific Functions of the FBD Language on the Example of Programmable Relays Logo! Engineering journal of Don. 2022;11(95):1‒10. (in Russ.) EDN:UZGJVM
25. Ding S.H.H., Fung B.C.M., Charland P. Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization. Proceedings of the IEEE Symposium on Security and Privacy, 19‒23 May 2019, San Francisco, USA. IEEE; 2019. p.472‒489. DOI:10.1109/SP.2019.00003
26. Smolyaninova M.O., Sidorova O.A. About the Main Paradigms of Modern Programming. Originalnye issledovaniia. 2023;13(7):109‒113. (in Russ.) EDN:GJRBFF
Review
For citations:
Izrailov K.E. Problematic Issues of a Program Representations Genetic De-evolution for Search Vulnerabilities and Recommendations for Its Resolution. Proceedings of Telecommunication Universities. 2025;11(1):84-98. (In Russ.) https://doi.org/10.31854/1813-324X-2025-11-1-84-98. EDN: URSGXI