{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T05:50:12Z","timestamp":1772776212750,"version":"3.50.1"},"reference-count":84,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636217"],"award-info":[{"award-number":["U1636217"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016YFB0801201"],"award-info":[{"award-number":["2016YFB0801201"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016QY071401"],"award-info":[{"award-number":["2016QY071401"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Major Project of Ministry of Industry and Information Technology of China","award":["[2018] 282"],"award-info":[{"award-number":["[2018] 282"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2901951","type":"journal-article","created":{"date-parts":[[2019,2,27]],"date-time":"2019-02-27T20:24:01Z","timestamp":1551299041000},"page":"28170-28184","source":"Crossref","is-referenced-by-count":9,"title":["Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2035-7176","authenticated-orcid":false,"given":"Yikun","family":"Hu","sequence":"first","affiliation":[]},{"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115645"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.106"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2560811"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.43"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243827"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134072"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336767"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.18"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.60"},{"key":"ref32","first-page":"782","article-title":"Turning programs against each other: High coverage fuzz-testing using binary-code mutation and dynamic slicing","author":"karg\u00e9n","year":"2015","journal-title":"Proceedings of the Joint Meeting on Foundations of Software Engineering"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1145\/1993316.1993544","article-title":"Automated atomicity-violation fixing","volume":"46","author":"jin","year":"2011","journal-title":"ACM SIGPLAN Notices"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2454513"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134627"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_6"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-3-319-60876-1_14","article-title":"BinShape: Scalable and robust binary library function identification using function shape","author":"shirani","year":"2017","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052974"},{"key":"ref63","first-page":"95","article-title":"Codecarboncopy","author":"sidiroglou-douskos","year":"2017","journal-title":"Proc of the 9th Joint Meeting on Foundations of Software Engineering (ESEC\/FSE)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.22"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/2813885.2737988","article-title":"Automatic error elimination by horizontal code transfer across multiple applications","volume":"50","author":"sidiroglou-douskos","year":"2015","journal-title":"ACM SIGPLAN Notices"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671280"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985899"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092717"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577061"},{"key":"ref68","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2017.23225","article-title":"Ramblr: Making reassembly great again","author":"wang","year":"2017","journal-title":"Proc 24th Netw Distrib Syst Secur Symp (NDSS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3175492"},{"key":"ref69","first-page":"627","article-title":"Reassembleable disassembling","author":"wang","year":"2015","journal-title":"Proc Usenix Secur Symp"},{"key":"ref1","first-page":"340","article-title":"Control-flow integrity","author":"abadi","year":"2005","journal-title":"Proc 12th ACM Conf Comput Commun Secur"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23185","article-title":"DiscovRE: Efficient cross-architecture identification of bugs in binary code","author":"eschweiler","year":"2016","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref22","article-title":"Calling conventions for different C++ compilers and operating systems","author":"fog","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.27"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.81"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.50"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3141235.3141240"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)81042-9"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"ref59","article-title":"PLTO: A link-time optimizer for the intel IA-32 architecture","author":"schwarz","year":"2001","journal-title":"Proc Workshop Binary Translation"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2768427"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859059"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451151"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"ref53","first-page":"154","article-title":"Retrofitting security in cots software with binary rewriting","author":"o\u2019sullivan","year":"2011","journal-title":"Proc IFIP Int Inf Secur Conf"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.25"},{"key":"ref11","first-page":"1253","article-title":"Adaptive android kernel live patching","author":"chen","year":"2017","journal-title":"Proc 26th USENIX Security Symp (USENIX Security)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.24"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908126"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177157"},{"key":"ref15","first-page":"349","article-title":"Tracelet-based code search in executables","author":"david","year":"2014","journal-title":"Proc ACM SIGPLAN Conf Prog Lang Design and Implement"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146266"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996855"},{"key":"ref17","first-page":"38","article-title":"Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization","author":"ding","year":"2019","journal-title":"Proc IEEE Symp Secur Privacy (SP)"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1145\/2674025.2576208","article-title":"A platform for secure static binary instrumentation","volume":"49","author":"zhang","year":"2014","journal-title":"ACM SIGPLAN Notices"},{"key":"ref18","first-page":"303","article-title":"Blanket execution: Dynamic similarity testing for program binaries and components","author":"egele","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp (USENIX Secur )"},{"key":"ref84","article-title":"Generic value-set analysis on low-level code","author":"zhang","year":"2014","journal-title":"Proc of the Analytic Virtual Integration of Cyber- Physical Systems Workshop"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821527"},{"key":"ref83","first-page":"319","article-title":"Precise dynamic slicing algorithms","author":"zhang","year":"2003","journal-title":"Proc Int Conf Softw Eng (ICSE)"},{"key":"ref80","first-page":"887","article-title":"Precise and accurate patch presence test for binaries","author":"zhang","year":"2018","journal-title":"Proc 27th USENIX Conf Secur Symp"},{"key":"ref4","first-page":"5","article-title":"Analyzing memory accesses in \n$\\times86$\n executables","author":"balakrishnan","year":"2004","journal-title":"Proc Int Conf Compiler Construction"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349303"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2024569.2024572"},{"key":"ref5","first-page":"40","article-title":"Superset disassembly: Statically rewriting x86 binaries without heuristics","author":"bauman","year":"2018","journal-title":"Proc 24th Netw Distrib Syst Secur Symp (NDSS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2365864.2151043"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191551"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"ref46","first-page":"691","article-title":"Angelix: Scalable multiline program patch synthesis via symbolic analysis","author":"mechtaev","year":"2016","journal-title":"Proc IEEE\/ACM 38th Int Conf Softw Eng (ICSE)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180247"},{"key":"ref48","first-page":"253","article-title":"Binsim: Trace-based semantic binary diffing via system call sliced segment equivalence checking","author":"ming","year":"2017","journal-title":"Proc 26th USENIX Security Symp"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931047"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1145\/2914770.2837617","article-title":"Automatic patch generation by learning correct code","volume":"51","author":"long","year":"2016","journal-title":"ACM SIGPLAN Notices"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884872"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1145\/2635868.2635900","article-title":"Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection","author":"luo","year":"2014","journal-title":"Proc Sixth ACM SIGSOFT Int'l Symp Foundations of Software Eng"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1145\/1064978.1065034","article-title":"Pin: Building customized program analysis tools with dynamic instrumentation","volume":"40","author":"luk","year":"2005","journal-title":"ACM SIGPLAN Notices"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08653831.pdf?arnumber=8653831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T09:10:37Z","timestamp":1643274637000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8653831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":84,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2901951","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}