{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:04:17Z","timestamp":1775016257778,"version":"3.50.1"},"reference-count":155,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Institute of Information &amp; Communications Technology Planning &amp; Evaluation","award":["2021-0-01332"],"award-info":[{"award-number":["2021-0-01332"]}]},{"name":"Developing Next-Generation Binary Decompiler"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tse.2022.3187689","type":"journal-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T19:32:35Z","timestamp":1656703955000},"page":"1661-1682","source":"Crossref","is-referenced-by-count":69,"title":["Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3642-0253","authenticated-orcid":false,"given":"Dongkwan","family":"Kim","sequence":"first","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"given":"Eunsoo","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6012-7228","authenticated-orcid":false,"given":"Sang Kil","family":"Cha","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0904-2875","authenticated-orcid":false,"given":"Sooel","family":"Son","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4879-1262","authenticated-orcid":false,"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070525"},{"key":"ref3","first-page":"611","article-title":"Recognizing functions in binaries with neural networks","volume-title":"Proc. USENIX Secur. Symp.","author":"Shin"},{"key":"ref4","first-page":"845","article-title":"ByteWeight: Learning to recognize functions in binary code","volume-title":"Proc. USENIX Secur. Symp.","author":"Bao"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.12"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046742"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.18"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_16"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664269"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177157"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052995"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2827379"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23492"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3243127.3243131"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23057"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00053"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23020"},{"key":"ref30","first-page":"303","article-title":"Blanket execution: Dynamic similarity testing for program binaries and components","volume-title":"Proc. USENIX Secur. Symp.","author":"Egele"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115645"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939719"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.50"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052974"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.22"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115648"},{"key":"ref37","first-page":"353","article-title":"Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring","volume-title":"Proc. USENIX Secur. Symp.","author":"Schwartz"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23185"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1093\/sysbio\/45.3.380"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(97)00060-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1142\/9789812797926_0003"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"issue":"1","key":"ref44","article-title":"Graph-based comparison of executable objects (english version)","volume":"5","author":"Dullien","year":"2005","journal-title":"SSTIC"},{"key":"ref45","first-page":"161","article-title":"Structural comparison of executable objects","volume-title":"Proc. Int. Conf. Detection Intrusions Malware Vulnerability Assessment","author":"Flake"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_8"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.70"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430558"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.01.011"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.04.002"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1941-2"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004813"},{"key":"ref56","article-title":"DarunGrim: A patch analysis and binary diffing too","author":"Oh","year":"2015"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594343"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.21"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908126"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59608-2_29"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_23"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"ref63","first-page":"253","article-title":"BinSim: Trace-based semantic binary diffing via system call sliced segment equivalence checking","volume-title":"Proc. USENIX Secur. Symp.","author":"Ming"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115647"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330221"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy055"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00019"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3264820.3264821"},{"key":"ref69","first-page":"517","article-title":"FuncNet: A euclidean embedding approach for lightweight cross-platform binary recognition","volume-title":"Proc. Int. Conf. Secur. Privacy Commun. Syst.","author":"Luo"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_15"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_14"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568286"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1981.231113"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"ref76","first-page":"377","article-title":"SplitScreen: Enabling efficient, distributed malware detection","volume-title":"Proc. USENIX Symp. Netw. Syst. Des. Implementation","author":"Cha"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624046"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451150"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2570554"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2655046"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3021184"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_3"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/53990.53994"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.5555\/2980539.2980649"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/1290082.1290111"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.207"},{"key":"ref90","first-page":"2702","article-title":"Discriminative embeddings of latent variable models for structured data","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Dai"},{"key":"ref91","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.5555\/3044805.3045025"},{"key":"ref95","article-title":"IDA Pro"},{"key":"ref96","first-page":"583","article-title":"An in-depth analysis of disassembly on full-scale x86\/x64 binaries","volume-title":"Proc. USENIX Secur. Symp.","author":"Andriesse"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23051"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00061"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.11"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.59"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.29"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_40"},{"key":"ref103","article-title":"Pie","year":"2016"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/1111542.1111566"},{"key":"ref110","article-title":"The tigress C diversifier\/obfuscator","volume":"14","author":"Collberg","year":"2015","journal-title":"Retrieved August"},{"key":"ref112","article-title":"Autoconf \u2014 Creating automatic configuration scripts","author":"MacKenzie","year":"1996"},{"issue":"1","key":"ref113","first-page":"42","article-title":"GNU parallel - The command-line power tool","volume-title":";login: The USENIX Mag.","volume":"36","author":"Tange","year":"2011"},{"key":"ref114","first-page":"11","article-title":"Exploring network structure, dynamics, and function using NetworkX","volume-title":"Proc. Python Sci. Conf.","author":"Hagberg"},{"key":"ref115","article-title":"Intel 64 and ia-32 architectures software developers manual"},{"key":"ref116","volume-title":"ARM Architecture Reference Manual","author":"Seal","year":"2001"},{"key":"ref117","article-title":"Mips32 architecture for programmers volume II: The mips32 instruction set","year":"2001"},{"key":"ref118","article-title":"The ultimate disassembler"},{"key":"ref119","article-title":"Relative change and difference \u2014 Wikipedia, The free encyclopedia","year":"2018"},{"issue":"Mar","key":"ref120","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"Guyon","year":"2003"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50012-X"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"ref123","article-title":"SciPy: Open source scientific tools for Python","author":"Jones","year":"2001"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2011.37"},{"key":"ref127","first-page":"3","article-title":"Obfuscating C++ programs via control flow flattening","volume":"30","author":"L\u00e1szl\u00f3","year":"2009","journal-title":"Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae, Sectio Computatorica"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427294"},{"key":"ref130","first-page":"99","article-title":"Neural nets can learn function type signatures from binaries","volume-title":"Proc. USENIX Secur. Symp.","author":"Chua"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"key":"ref132","article-title":"Exuberant Ctags","author":"Hiebert","year":"1999"},{"key":"ref133","article-title":"TIE: Principled reverse engineering of types in binary programs","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Lee"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462165"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243866"},{"key":"ref136","article-title":"In nomine function: Naming functions in stripped binaries with neural networks","author":"Artuso","year":"2019"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001433"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp51992.2021.00047"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336768"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_10"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0071"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18467-8_28"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/3175492"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382217"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.56"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081836"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966860"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2980190"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.49"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901951"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423342"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/3446371"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/3432893"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"ref156","first-page":"289","article-title":"CP-Miner: A tool for finding copy-paste and related bugs in operating system code","volume-title":"Proc. Symp. Oper. Syst. Des. Implementation","author":"Li"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref158","article-title":"Automatic feature learning for vulnerability prediction","author":"Dam","year":"2017"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_54"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991102"},{"key":"ref163","article-title":"BinPro: A tool for binary source code provenance","author":"Miyani","year":"2017"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_14"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985453"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437533"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10103953\/09813408.pdf?arnumber=9813408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T12:38:29Z","timestamp":1717072709000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9813408\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":155,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2022.3187689","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}