{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:52:29Z","timestamp":1752360749002,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030582005"},{"type":"electronic","value":"9783030582012"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58201-2_11","type":"book-chapter","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T23:02:29Z","timestamp":1600038149000},"page":"155-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding"],"prefix":"10.1007","author":[{"given":"Can","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mengxia","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Xiaorui","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Baoxu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"key":"11_CR1","unstructured":"Le, S.: Structure2Vec: deep learning for security analytics over graphs (2018)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Bromley, J., et al.: Signature verification using a \u201csiamese\u201d time delay neural network. In: Advances in neural information processing systems (1994)","DOI":"10.1142\/9789812797926_0003"},{"issue":"3","key":"11_CR3","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/S0022-2836(05)80360-2","volume":"215","author":"SF Altschul","year":"1990","unstructured":"Altschul, S.F., et al.: Basic local alignment search tool. J. Mol. Biol. 215(3), 403\u2013410 (1990)","journal-title":"J. Mol. Biol."},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TKDE.2016.2598561","volume":"29","author":"C Shi","year":"2016","unstructured":"Shi, C., et al.: A survey of heterogeneous information network analysis. IEEE Trans. Knowl. Data Eng. 29(1), 17\u201337 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"11_CR5","unstructured":"Andriesse, D., et al.: An in-depth analysis of disassembly on full-scale x86\/x64 binaries. In: 25th USENIX Security Symposium (USENIX Security 2016) (2016)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Chandramohan, M., et al.: BinGo: cross-architecture cross-OS binary search. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM (2016)","DOI":"10.1145\/2950290.2950350"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Ding, S., et al.: Asm2Vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. IEEE (2019)","DOI":"10.1109\/SP.2019.00003"},{"key":"11_CR8","unstructured":"Dullien, T., et al.: Automated attacker correlation for malicious code. Bochum University (Germany FR) (2010)"},{"issue":"1","key":"11_CR9","first-page":"3","volume":"5","author":"T Dullien","year":"2005","unstructured":"Dullien, T., Rolles, R.: Graph-based comparison of executable objects (English version). SSTIC 5(1), 3 (2005)","journal-title":"SSTIC"},{"key":"11_CR10","unstructured":"BinDiff manual. https:\/\/www.zynamics.com\/bindiff\/manual\/. Accessed 15 Sept 2019"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Junod, P., et al.: Obfuscator-LLVM-software protection for the masses. In: 2015 IEEE\/ACM 1st International Workshop on Software Protection, pp. 3\u20139. IEEE (2015)","DOI":"10.1109\/SPRO.2015.10"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Eschweiler, S, Yakdan, K., Gerhards-Padilla, E.: discovRE: efficient cross-architecture identification of bugs in binary code. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23185"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Feng, M., et al.: Open-source license violations of binary software at large scale. In: IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER) (2019)","DOI":"10.1109\/SANER.2019.8667977"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Feng, Q., et al.: Scalable graph-based bug search for firmware images. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM (2016)","DOI":"10.1145\/2976749.2978370"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Xu, X., et al.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM (2017)","DOI":"10.1145\/3133956.3134018"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2016)","DOI":"10.1145\/2939672.2939754"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Hu, X., et al.: Large-scale malware indexing using function-call graphs. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM (2009)","DOI":"10.1145\/1653662.1653736"},{"issue":"50","key":"11_CR18","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1098\/rsif.2010.0063","volume":"7","author":"O Kuchaiev","year":"2010","unstructured":"Kuchaiev, O., et al.: Topological network alignment uncovers biological function and phylogeny. J. R. Soc. Interface 7(50), 1341\u20131354 (2010)","journal-title":"J. R. Soc. Interface"},{"issue":"1","key":"11_CR19","first-page":"3","volume":"30","author":"T L\u00e1szl\u00f3","year":"2009","unstructured":"L\u00e1szl\u00f3, T., Kiss, \u00c1.: Obfuscating C++ programs via control flow flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae, Sectio Computatorica 30(1), 3\u201319 (2009)","journal-title":"Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae, Sectio Computatorica"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Liu, B., et al.: $$\\alpha $$diff: cross-version binary code similarity detection with DNN. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering. ACM (2018)","DOI":"10.1145\/3238147.3238199"},{"key":"11_CR21","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-030-37228-6_16","volume-title":"Security and Privacy in Communication Networks","author":"M Luo","year":"2019","unstructured":"Luo, M., Yang, C., Gong, X., Yu, L.: FuncNet: a Euclidean embedding approach for lightweight cross-platform binary recognition. In: Chen, S., Choo, K.-K.R., Fu, X., Lou, W., Mohaisen, A. (eds.) SecureComm 2019. LNICST, vol. 304, pp. 319\u2013337. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37228-6_16"},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"257","DOI":"10.4137\/CIN.S680","volume":"6","author":"T Milenkovi\u0107","year":"2008","unstructured":"Milenkovi\u0107, T., Pr\u017eulj, N.: Uncovering biological network function via graphlet degree signatures. Cancer Inform. 6, 257\u2013273 (2008). CIN-S680","journal-title":"Cancer Inform."},{"issue":"5594","key":"11_CR23","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1126\/science.298.5594.824","volume":"298","author":"R Milo","year":"2002","unstructured":"Milo, R., et al.: Network motifs: simple building blocks of complex networks. Science 298(5594), 824\u2013827 (2002)","journal-title":"Science"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Tang, J., et al.: LINE: large-scale information network embedding. In: Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee (2015)","DOI":"10.1145\/2736277.2741093"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1007\/978-3-319-72359-4_48","volume-title":"Information Security Practice and Experience","author":"Y Tang","year":"2017","unstructured":"Tang, Y., Wang, Y., Wei, S.N., Yu, B., Yang, Q.: Matching function-call graph of binary codes and its applications (Short Paper). In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 770\u2013779. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72359-4_48"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Zuo, F., Li, X., et al. Neural machine translation inspired binary code similarity comparison beyond function pairs. In: Proceedings of the 2019 Network and Distributed Systems Security Symposium (NDSS) (2019, in press)","DOI":"10.14722\/ndss.2019.23492"},{"key":"11_CR27","unstructured":"SimHash wiki. https:\/\/en.wikipedia.org\/wiki\/SimHash. Accessed 3 Jan 2020"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58201-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T00:06:36Z","timestamp":1726272396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58201-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582005","9783030582012"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58201-2_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2020.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.88","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.14","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}