{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:32:18Z","timestamp":1774539138248,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"15","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Academician Fang Binxing Workstation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,8,1]]},"DOI":"10.1109\/jiot.2024.3389014","type":"journal-article","created":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T17:27:09Z","timestamp":1713288429000},"page":"25910-25924","source":"Crossref","is-referenced-by-count":4,"title":["A Semantics-Based Approach on Binary Function Similarity Detection"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2756-3510","authenticated-orcid":false,"given":"Yuntao","family":"Zhang","sequence":"first","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4440-941X","authenticated-orcid":false,"given":"Zehui","family":"Xiong","sequence":"additional","affiliation":[{"name":"Information Systems Technology and Design, Singapore University of Technology and Design, Tampines, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6990-2972","authenticated-orcid":false,"given":"Yanhao","family":"Wang","sequence":"additional","affiliation":[{"name":"QI-ANXIN Technology Research Institute, QI-ANXIN, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5170-3388","authenticated-orcid":false,"given":"Yuwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Chao","family":"Zheng","sequence":"additional","affiliation":[{"name":"Research and Development Department, Geedge Networks, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9220-2694","authenticated-orcid":false,"given":"Qinnan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence, Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"When Firmware Modifications Attack: A Case Study of Embedded Exploitation","author":"Cui","year":"2013"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_15"},{"key":"ref7","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/S1351324916000334"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-1609"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref12","volume-title":"Retdec: An Open-Source Machine-Code Decompiler","author":"K\u0159oustek","year":"2017"},{"key":"ref13","first-page":"2025","article-title":"Finding bugs using your own code: Detecting functionally-similar yet inconsistent code","volume-title":"Proc. 30th USENIX Security Symp. (USENIX Security)","author":"Ahmadi"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.1900053"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3073032"},{"key":"ref17","volume-title":"Binwalk: Firmware analysis tool","author":"Heffner","year":"2010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3177157"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-x_31"},{"key":"ref22","volume-title":"OpenSSL: Cryptography and SSL\/TLS toolkit","year":"2022"},{"key":"ref23","volume-title":"GmSSL: Chinese national cryptographic algorithms toolkit","year":"2014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2022.3187689"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/75308.75328"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref28","volume-title":"zynamics BinDiff","year":"2019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1561\/2500000014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/113445.113447"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/567067.567085"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.75"},{"key":"ref33","volume-title":"Intel\u00ae Instruction Set Extensions Technology","year":"2022"},{"key":"ref34","volume-title":"Introducing NEON Development Article","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref38","first-page":"34","article-title":"Mcsema: Static translation of x86 instructions to LLVM","volume-title":"Proc. ReCon Conf.","author":"Dinaburg"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387550"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3316482.3326354"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833799"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59152-6_33"},{"key":"ref43","first-page":"1165","article-title":"{MVP}: Detecting vulnerabilities using {patch-enhanced} vulnerability signatures","volume-title":"Proc. 29th USENIX Security Symp. (USENIX Security)","author":"Xiao"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"ref45","article-title":"Neural machine translation inspired binary code similarity comparison beyond function pairs","author":"Zuo","year":"2018","journal-title":"arXiv:1808.04706"},{"key":"ref46","article-title":"LLVM: An infrastructure for multi-stage optimization","author":"Lattner","year":"2002"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.4064\/fm-49-2-129-141"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"ref49","first-page":"2099","article-title":"How machine learning is solving the binary function similarity problem","volume-title":"Proc. 31st USENIX Security Symp. (USENIX Security)","author":"Marcelli"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179420"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833571"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598067"},{"key":"ref53","volume-title":"Online ChatGPT-Optimizing Language Models for Dialogue","year":"2022"},{"key":"ref54","volume-title":"BusyBox","year":"2022"},{"key":"ref55","volume-title":"CVE-2014-0160","year":"2014"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"ref57","article-title":"Incoder: A generative model for code infilling and synthesis","author":"Fried","year":"2022","journal-title":"arXiv:2204.05999"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref60","volume-title":"Radare2","year":"2024"},{"issue":"1","key":"ref61","first-page":"3","article-title":"Graph-based comparison of executable objects","volume":"5","author":"Dullien","year":"2005","journal-title":"Sstic"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908126"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052974"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"ref65","article-title":"FASER: Binary code similarity search through the use of intermediate representations","author":"Collyer","year":"2023","journal-title":"arXiv:2310.03605"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3604611"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3569933"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10607832\/10500829.pdf?arnumber=10500829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T15:45:12Z","timestamp":1721835912000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10500829\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,1]]},"references-count":67,"journal-issue":{"issue":"15"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3389014","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,1]]}}}