{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:40:18Z","timestamp":1759333218227,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819635306"},{"type":"electronic","value":"9789819635313"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_20","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:09:58Z","timestamp":1741867798000},"page":"409-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["VulMatch: Binary-Level Vulnerability Detection Through Signature"],"prefix":"10.1007","author":[{"given":"Zian","family":"Liu","sequence":"first","affiliation":[]},{"given":"Shigang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ejaz","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dongxi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Heffley, J., Meunier, P.: Can source code auditing software identify common vulnerabilities and be used to evaluate software security? In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, pp. 21:1\u201310. IEEE (2004)","DOI":"10.1109\/HICSS.2004.1265654"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1287\/mnsc.1070.0748","volume":"54","author":"S Haefliger","year":"2008","unstructured":"Haefliger, S., Von Krogh, G., Spaeth, S.: Code reuse in open source software. Manage. Sci. 54(1), 180\u2013193 (2008)","journal-title":"Manage. Sci."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Xu, Z., Chen, B., Chandramohan, M., Liu, Y., Song, F.: Spain: security patch analysis for binaries towards understanding the pain and pills. In: Proceedings of the 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE), pp. 462\u2013472. IEEE (2017)","DOI":"10.1109\/ICSE.2017.49"},{"issue":"6","key":"20_CR4","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1145\/2980983.2908126","volume":"51","author":"Y David","year":"2016","unstructured":"David, Y., Partush, N., Yahav, E.: Statistical similarity of binaries. ACM SIGPLAN Notices 51(6), 266\u2013280 (2016)","journal-title":"ACM SIGPLAN Notices"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"David, Y., Partush, N., Yahav, E.: Similarity of binaries through re-optimization. In: Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2017","DOI":"10.1145\/3062341.3062387"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Lakhotia, A., Preda, M.D., Giacobazzi, R.: Fast location of similar code fragments using semantic \u2018juice\u2019. In: Proceedings of the 2013 ACM SIGPLAN Program Protection and Reverse Engineering Workshop (2013)","DOI":"10.1145\/2430553.2430558"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Pewny, J., Schuster, F., Bernhard, L., Holz, T., Rossow, C.: Leveraging semantic signatures for bug search in binary programs. In: Proceedings of the Annual Computer Security Applications Conference, pp. 406\u2013415 (2014)","DOI":"10.1145\/2664243.2664269"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Feng, Q., Wang, M., Zhang, M., Zhou, R., Henderson, A., Yin, H.: Extracting conditional formulas for cross-platform bug search. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 346\u2013359 (2017)","DOI":"10.1145\/3052973.3052995"},{"key":"20_CR9","unstructured":"Zhang, H., Qian, Z.: Precise and accurate patch presence test for binaries. In: Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), pp. 887\u2013902 (2018)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Jiang, Z.., et al.: Pdiff: semantic-based patch presence testing for downstream kernels. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1149\u20131163 (2020)","DOI":"10.1145\/3372297.3417240"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Zhao, L., Zhu, Y., Ming, J., Zhang, Y., Zhang, H., Yin, H.: Patchscope: memory object centric patch diffing. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 149\u2013165 (2020)","DOI":"10.1145\/3372297.3423342"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Liu, D., Li, Y., Tang, Y., Wang, B., Xie, W.: Vmpbl: identifying vulnerable functions based on machine learning combining patched information and binary comparison technique by lcs. In: Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy (TrustCom\/BigDataSE). IEEE, pp. 800\u2013807 (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00114"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Xiao, Y., et al.: Viva: binary level vulnerability identification via partial signature. In: Proceedings of the 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 213\u2013224. IEEE (2021)","DOI":"10.1109\/SANER50967.2021.00028"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Xu, Y., Xu, Z., Chen, B., Song, F., Liu, Y., Liu, T.: Patch based vulnerability matching for binary programs. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 376\u2013387 (2020)","DOI":"10.1145\/3395363.3397361"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., Song, D.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 363\u2013376 (2017)","DOI":"10.1145\/3133956.3134018"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Gao, J., Yang, X., Fu, Y., Jiang, Y., Sun, J.: Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary. In: Proceedings of the 2018 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2018, pp. 896\u2013899","DOI":"10.1145\/3238147.3240480"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Feng, Q., Zhou, R., Xu, C., Cheng, Y., Testa, B., Yin, H.: Scalable graph-based bug search for firmware images. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 480\u2013491 (2016)","DOI":"10.1145\/2976749.2978370"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Massarelli, L., Luna, G.A.D., Petroni, F., Baldoni, R., Querzoni, L.: Safe: self-attentive function embeddings for binary similarity. In: Proceedings of the 2019 International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 309\u2013329. Springer (2019)","DOI":"10.1007\/978-3-030-22038-9_15"},{"key":"20_CR19","unstructured":"Zuo, F., Li, X., Zhang, Z., Young, P., Luo, L., Zeng, Q.: Neural machine translation inspired binary code similarity comparison beyond function pairs. In: Proceedings of the 2022 Network and Distributed System Security Symposium (NDSS) (2022)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Liu, B., et al.: $$\\alpha $$diff: cross-version binary code similarity detection with dnn. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 667\u2013678 (2018)","DOI":"10.1145\/3238147.3238199"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Ding, S.H.H., Fung, B., Charland, P.: Kam1n0: mapreduce-based assembly clone search for reverse engineering. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)","DOI":"10.1145\/2939672.2939719"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Ding, S.H., Fung, B.C., Charland, P.: Asm2vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In: Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), pp. 472\u2013489. IEEE (2019)","DOI":"10.1109\/SP.2019.00003"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Huang, H., Youssef, A.M., Debbabi, M.: Binsequence: fast, accurate and scalable binary code reuse detection. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 155\u2013166 (2017)","DOI":"10.1145\/3052973.3052974"},{"issue":"6","key":"20_CR24","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1145\/2666356.2594343","volume":"49","author":"Y David","year":"2014","unstructured":"David, Y., Yahav, E.: Tracelet-based code search in executables. ACM SIGPLAN Notices 49(6), 349\u2013360 (2014)","journal-title":"ACM SIGPLAN Notices"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Alrabaee, S., Shirani, P., Wang, L., Debbabi, M.: Sigma: a semantic integrated graph matching approach for identifying reused functions in binary code. Digital Investigation, pp. S61\u2013S71 (2015)","DOI":"10.1016\/j.diin.2015.01.011"},{"key":"20_CR26","doi-asserted-by":"publisher","DOI":"10.1145\/3175492","volume-title":"Fossil: A resilient and efficient system for identifying foss functions in malware binaries","author":"S Alrabaee","year":"2018","unstructured":"Alrabaee, S., Shirani, P., Wang, L., Debbabi, M.: Fossil: A resilient and efficient system for identifying foss functions in malware binaries. ACM Trans, Privacy Secur (2018)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Di\u00a0Federico, A., Maggi, F., Comparetti, P.M., Zanero, S.: Lines of malicious code: Insights into the malicious software industry. In: Proceedings of the ACM Annual Computer Security Applications Conference, pp. 349\u2013358 (2012)","DOI":"10.1145\/2420950.2421001"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Chandramohan, M., Xue, Y., Xu, Z., Liu, Y., Cho, C.Y., Tan, H.B.K.: Bingo: Cross-architecture cross-os binary search. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering (2016)","DOI":"10.1145\/2950290.2950350"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Wang, S., Wu, D.: In-memory fuzzing for binary code similarity analysis. In: Proceedings of the 2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 319\u2013330. IEEE (2017)","DOI":"10.1109\/ASE.2017.8115645"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Ng, B.H.,\u00a0Prakash, A.: Expose: discovering potential binary code re-use. In: Proceedings of the IEEE Annual Computer Software and Applications Conference, pp. 492\u2013501 (2013)","DOI":"10.1109\/COMPSAC.2013.83"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Jin, W., et al.: Binary function clustering using semantic hashes. In: Proceedings of the 2012 International Conference on Machine Learning and Applications, pp. 386\u2013391 (2012)","DOI":"10.1109\/ICMLA.2012.70"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Wang, S.-C., Liu, C.-L., Li, Y., Xu, W.-Y.: Semdiff: finding semtic differences in binary programs based on angr. In: Proceedings of the 2017 ITM Web of Conferences (2017)","DOI":"10.1051\/itmconf\/20171203029"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Luo, L., Ming, J., Wu, D., Liu, P., Zhu, S.: Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 389\u2013400 (2014)","DOI":"10.1145\/2635868.2635900"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Li, X., Qu, Y., Yin, H.: Palmtree: learning an assembly language model for instruction embedding. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021, pp. 3236\u20133251 (2021)","DOI":"10.1145\/3460120.3484587"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:10:22Z","timestamp":1741867822000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}