{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:25:14Z","timestamp":1773512714355,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819712731","type":"print"},{"value":"9789819712748","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-1274-8_3","type":"book-chapter","created":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:20:02Z","timestamp":1710271202000},"page":"31-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Impact of\u00a0Library Code in\u00a0Binary Similarity Systems"],"prefix":"10.1007","author":[{"given":"Andrei Vasile","family":"Mihalca","sequence":"first","affiliation":[]},{"given":"Ciprian Pavel","family":"Opri\u015fa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,13]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4699-6","volume-title":"Modern Compiler Design","author":"D Grune","year":"2012","unstructured":"Grune, D., Van Reeuwijk, K., Bal, H.E., Jacobs, C.J.H., Langendoen, K.: Modern Compiler Design. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-1-4614-4699-6"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Nagarakatte, S., Zhao, J., Martin, M.M.K., Zdancewic, S.: CETS: compiler enforced temporal safety for C. In: Proceedings of the 2010 International Symposium on Memory Management, pp. 31\u201340 (2010)","DOI":"10.1145\/1806651.1806657"},{"key":"3_CR3","unstructured":"C runtime (CRT) and C++ standard library (STL).lib files (2023)"},{"key":"3_CR4","unstructured":"Josuttis, N.M.: The C++ Standard Library: A Tutorial and Reference (2012)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Deutsch, P., Gailly, J.-L.: ZLIB compressed data format specification version 3.3. Technical report (1996)","DOI":"10.17487\/rfc1950"},{"key":"3_CR6","unstructured":"Moran, N., Bennett, J.T.: Supply Chain Analysis: From Quartermaster to Sunshop, vol. 11. FireEye (2013)"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s10207-006-0086-3","volume":"5","author":"GS-W Yeo","year":"2006","unstructured":"Yeo, G.S.-W., Phan, R.C.-W.: On the security of the WinRAR encryption feature. Int. J. Inf. Secur. 5, 115\u2013123 (2006)","journal-title":"Int. J. Inf. Secur."},{"key":"3_CR8","unstructured":"Topan, V.I., Dudea, S.V., Canja, V.D.: Fuzzy whitelisting anti-malware systems and methods. US Patent 8,584,235 (2013)"},{"key":"3_CR9","unstructured":"Intel 64 and IA-32 architectures software developer manuals (2022)"},{"key":"3_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139058452","volume-title":"Mining of Massive Datasets","author":"A Rajaraman","year":"2011","unstructured":"Rajaraman, A., Ullman, J.D.: Mining of Massive Datasets. Cambridge University Press, Cambridge (2011)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Mihalca, A., Opri\u015fa, C., Potolea, R.: Hunting for malware code in massive collections. In: 2020 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/AQTR49680.2020.9129948"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Oprisa, C., Cabau, G., Colesa, A.: From plagiarism to malware detection. In: 2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, pp. 227\u2013234. IEEE (2013)","DOI":"10.1109\/SYNASC.2013.37"},{"issue":"1","key":"3_CR13","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10115-015-0903-y","volume":"49","author":"C Opri\u015fa","year":"2016","unstructured":"Opri\u015fa, C., Gavrilu\u0163, D., Cab\u0103u, G.: A scalable approach for detecting plagiarized mobile applications. Knowl. Inf. Syst. 49(1), 143\u2013169 (2016)","journal-title":"Knowl. Inf. Syst."},{"issue":"3","key":"3_CR14","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s11416-013-0191-6","volume":"10","author":"C Opri\u015fa","year":"2014","unstructured":"Opri\u015fa, C., Cab\u0103u, G., Cole\u015fa, A.: Automatic code features extraction using bio-inspired algorithms. J. Comput. Virol. Hacking Tech. 10(3), 165\u2013176 (2014)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-04342-0_6","volume-title":"Recent Advances in Intrusion Detection","author":"K Griffin","year":"2009","unstructured":"Griffin, K., Schneider, S., Hu, X., Chiueh, T.: Automatic generation of string signatures for malware detection. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 101\u2013120. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04342-0_6"},{"key":"3_CR16","unstructured":"Ida flirt (2022)"},{"key":"3_CR17","unstructured":"Top 13 popular packers used in malware (2022)"},{"issue":"2","key":"3_CR18","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1111\/j.1469-8137.1912.tb05611.x","volume":"11","author":"P Jaccard","year":"1912","unstructured":"Jaccard, P.: The distribution of the flora in the alpine zone. 1. New Phytol. 11(2), 37\u201350 (1912)","journal-title":"New Phytol."},{"key":"3_CR19","volume-title":"Introduction to Algorithms","author":"TH Cormen","year":"2022","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. MIT Press, Cambridge (2022)"}],"container-title":["Communications in Computer and Information Science","Ubiquitous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-1274-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:20:26Z","timestamp":1710271226000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-1274-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819712731","9789819712748"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-1274-8_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UbiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Exeter","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ubisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hpcn.exeter.ac.uk\/ubisec2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"MyReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"91","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}