{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:20:08Z","timestamp":1742912408278,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319990729"},{"type":"electronic","value":"9783319990736"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99073-6_4","type":"book-chapter","created":{"date-parts":[[2018,8,10]],"date-time":"2018-08-10T18:09:38Z","timestamp":1533924578000},"page":"66-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["MobileFindr: Function Similarity Identification for Reversing Mobile Binaries"],"prefix":"10.1007","author":[{"given":"Yibin","family":"Liao","sequence":"first","affiliation":[]},{"given":"Ruoyan","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Guodong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Kang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,8]]},"reference":[{"key":"4_CR1","unstructured":"Android studio - debug your app. https:\/\/developer.android.com\/studio\/debug\/index.html. Accessed 30 Jan 2018"},{"key":"4_CR2","unstructured":"Apktool - a tool for reverse engineering android apk files. https:\/\/ibotpeaches.github.io\/Apktool\/. Accessed 30 Jan 2018"},{"key":"4_CR3","unstructured":"Bingrep. https:\/\/github.com\/hada2\/bingrep. Accessed 30 Jan 2018"},{"key":"4_CR4","unstructured":"Clutch 2.0.4. https:\/\/github.com\/KJCracks\/Clutch\/releases\/tag\/2.0.4. Accessed 30 Jan 2018"},{"key":"4_CR5","unstructured":"dex2jar. https:\/\/github.com\/pxb1988\/dex2jar. Accessed 30 Jan 2018"},{"key":"4_CR6","unstructured":"Disable aslr on ios applications. http:\/\/www.securitylearn.net\/2013\/05\/23\/disable-aslr-on-ios-applications\/. Accessed 30 Jan 2018"},{"key":"4_CR7","unstructured":"Frida. https:\/\/www.frida.re\/. Accessed 30 Jan 2018"},{"key":"4_CR8","unstructured":"Hex-rays decompiler. https:\/\/www.hex-rays.com\/products\/decompiler\/index.shtml. Accessed 30 Jan 2018"},{"key":"4_CR9","unstructured":"Ida. https:\/\/www.hex-rays.com\/products\/ida\/index.shtml. Accessed 30 Jan 2018"},{"key":"4_CR10","unstructured":"Jd-gui. http:\/\/jd.benow.ca\/. Accessed 30 Jan 2018"},{"key":"4_CR11","unstructured":"ldid. http:\/\/iphonedevwiki.net\/index.php\/Ldid. Accessed 30 Jan 2018"},{"key":"4_CR12","unstructured":"The lldb debugger. https:\/\/lldb.llvm.org\/. Accessed 30 Jan 2018"},{"key":"4_CR13","unstructured":"More complex = less secure: Miss a test path and you could get hacked. http:\/\/www.mccabe.com\/pdf\/MoreComplexEqualsLessSecure-McCabe.pdf. Accessed 30 Jan 2018"},{"key":"4_CR14","unstructured":"Nearpy. https:\/\/github.com\/pixelogik\/NearPy. Accessed 30 Jan 2018"},{"key":"4_CR15","unstructured":"smali\/baksmali wiki. https:\/\/github.com\/JesusFreke\/smali\/wiki. Accessed 30 Jan 2018"},{"key":"4_CR16","unstructured":"Top 10 libraries for ios developers. https:\/\/www.raywenderlich.com\/177482\/top-10-ios-developer-libraries. Accessed 30 Jan 2018"},{"key":"4_CR17","unstructured":"Zynamics bindiff. https:\/\/www.zynamics.com\/bindiff.html. Accessed 30 Jan 2018"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Andoni, A., Indyk, P.: Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: 47th Annual IEEE Symposium on Foundations of Computer Science, 2006. FOCS 2006, pp. 459\u2013468. IEEE (2006)","DOI":"10.1109\/FOCS.2006.49"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Brumley, D., Poosankam, P., Song, D., Zheng, J.: Automatic patch-based exploit generation is possible: techniques and implications. In: IEEE Symposium on Security and Privacy 2008. SP 2008, pp. 143\u2013157. IEEE (2008)","DOI":"10.1109\/SP.2008.17"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"David, Y., Partush, N., Yahav, E.: Similarity of binaries through re-optimization. In: Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 79\u201394. ACM (2017)","DOI":"10.1145\/3062341.3062387"},{"key":"4_CR21","unstructured":"Egele, M., Woo, M., Chapman, P., Brumley, D.: Blanket execution: dynamic similarity testing for program binaries and components. USENIX (2014)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Eschweiler, S., Yakdan, K., Gerhards-Padilla, E.: discovRE: efficient cross-architecture identification of bugs in binary code. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23185"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Feng, Q., Zhou, R., Xu, C., Cheng, Y., Testa, B., Yin, H.: Scalable graph-based bug search for firmware images. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 480\u2013491. ACM (2016)","DOI":"10.1145\/2976749.2978370"},{"key":"4_CR24","unstructured":"Flake, H.: Structural comparison of executable objects. In: Proceedings of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment, number P-46 in Lecture Notes in Informatics, pp. 161\u2013174. Citeseer (2004)"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-88625-9_16","volume-title":"Information and Communications Security","author":"D Gao","year":"2008","unstructured":"Gao, D., Reiter, M.K., Song, D.: BinHunt: automatically finding semantic differences in binary programs. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 238\u2013255. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88625-9_16"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Gibler, C., Stevens, R., Crussell, J., Chen, H., Zang, H., Choi, H.: Adrob: examining the landscape and impact of android application plagiarism. In: Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, pp. 431\u2013444. ACM (2013)","DOI":"10.1145\/2462456.2466709"},{"key":"4_CR27","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.A., et al.: Automated whitebox fuzz testing. In: NDSS, vol. 8, pp. 151\u2013166 (2008)"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Herremans, D.: MorpheuS: automatic music generation with recurrent pattern constraints and tension profiles (2016)","DOI":"10.1109\/TENCON.2016.7848007"},{"key":"4_CR29","doi-asserted-by":"publisher","unstructured":"Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM - software protection for the masses. In: Wyseur, B. (ed.) Proceedings of the IEEE\/ACM 1st International Workshop on Software Protection, SPRO 2015, Firenze, Italy, 19th May 2015, pp. 3\u20139. IEEE (2015). https:\/\/doi.org\/10.1109\/SPRO.2015.10","DOI":"10.1109\/SPRO.2015.10"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Kirat, D., Vigna, G.: Malgene: automatic extraction of malware analysis evasion signature. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 769\u2013780. ACM (2015)","DOI":"10.1145\/2810103.2813642"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Di Federico, A., Maggi, F., Comparetti, P.M., Zanero, S.: Lines of malicious code: insights into the malicious software industry. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 349\u2013358. ACM (2012)","DOI":"10.1145\/2420950.2421001"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Liu, C., Chen, C., Han, J., Yu, P.S.: GPLAG: detection of software plagiarism by program dependence graph analysis. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 872\u2013881. ACM (2006)","DOI":"10.1145\/1150402.1150522"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Luk, C.K., et al.: Pin: building customized program analysis tools with dynamic instrumentation. In: ACM SIGPLAN notices, vol. 40, pp. 190\u2013200. ACM (2005)","DOI":"10.1145\/1064978.1065034"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Luo, L., Ming, J., Wu, D., Liu, P., Zhu, S.: Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 389\u2013400. ACM (2014)","DOI":"10.1145\/2635868.2635900"},{"key":"4_CR35","unstructured":"Ming, J., Xu, D., Jiang, Y., Wu, D.: BinSim: trace-based semantic binary diffing via system call sliced segment equivalence checking. In: Proceedings of the 26th USENIX Security Symposium, pp. 253\u2013270. USENIX Association (2017)"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: IEEE Symposium on Security and Privacy 2007. SP 2007, pp. 231\u2013245. IEEE (2007)","DOI":"10.1109\/SP.2007.17"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Twenty-Third Annual Computer Security Applications Conference 2007. ACSAC 2007, pp. 421\u2013430. IEEE (2007)","DOI":"10.1109\/ACSAC.2007.21"},{"key":"4_CR38","unstructured":"Ng, A.Y., Jordan, M.I., Weiss, Y.: On spectral clustering: analysis and an algorithm. In: Advances in Neural Information Processing Systems, pp. 849\u2013856 (2002)"},{"key":"4_CR39","unstructured":"Oh, J.: Fight against 1-day exploits: diffing binaries vs anti-diffing binaries. Black Hat (2009)"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Petsas, T., Voyatzis, G., Athanasopoulos, E., Polychronakis, M., Ioannidis, S.: Rage against the virtual machine: hindering dynamic analysis of android malware. In: Proceedings of the Seventh European Workshop on System Security, p. 5. ACM (2014)","DOI":"10.1145\/2592791.2592796"},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Pewny, J., Garmany, B., Gawlik, R., Rossow, C., Holz, T.: Cross-architecture bug search in binary executables. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 709\u2013724. IEEE (2015)","DOI":"10.1109\/SP.2015.49"},{"key":"4_CR42","doi-asserted-by":"crossref","unstructured":"Sharma, R., Schkufza, E., Churchill, B., Aiken, A.: Data-driven equivalence checking. In: ACM SIGPLAN Notices, vol. 48, pp. 391\u2013406. ACM (2013)","DOI":"10.1145\/2544173.2509509"},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Wang, X., Jhi, Y.C., Zhu, S., Liu, P.: Behavior based software theft detection. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 280\u2013290. ACM (2009)","DOI":"10.1145\/1653662.1653696"},{"key":"4_CR44","doi-asserted-by":"crossref","unstructured":"Wang, X., Jhi, Y.C., Zhu, S., Liu, P.: Detecting software theft via system call based birthmarks. In: Annual Computer Security Applications Conference 2009. ACSAC 2009, pp. 149\u2013158. IEEE (2009)","DOI":"10.1109\/ACSAC.2009.24"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Xu, D., Ming, J., Wu, D.: Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 921\u2013937. IEEE (2017)","DOI":"10.1109\/SP.2017.56"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., Song, D.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 363\u2013376. ACM (2017)","DOI":"10.1145\/3133956.3134018"},{"key":"4_CR47","unstructured":"Xue, L., Zhou, Y., Chen, T., Luo, X., Gu, G.: Malton: towards on-device non-invasive mobile malware analysis for art. In: 26th USENIX Security Symposium (USENIX Security 17). ACM (2017)"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99073-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T00:02:45Z","timestamp":1691798565000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99073-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319990729","9783319990736"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99073-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"8 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2018.upc.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}