{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:03:51Z","timestamp":1775016231621,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1145\/2950290.2950350","type":"proceedings-article","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T13:46:03Z","timestamp":1478007963000},"page":"678-689","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":161,"title":["BinGo: cross-architecture cross-OS binary search"],"prefix":"10.1145","author":[{"given":"Mahinthan","family":"Chandramohan","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Yinxing","family":"Xue","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Zhengzi","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Chia Yuan","family":"Cho","sequence":"additional","affiliation":[{"name":"DSO National Laboratories, Singapore"}]},{"given":"Hee Beng Kuan","family":"Tan","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2016,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Cross-Architecture Cross-OS Binary Search. https: \/\/sites.google.com\/site\/bingofse2016\/","year":"2016","unstructured":"BinGo : Cross-Architecture Cross-OS Binary Search. https: \/\/sites.google.com\/site\/bingofse2016\/ , 2016 . {Online; accessed 11-March-2016}. BinGo: Cross-Architecture Cross-OS Binary Search. https: \/\/sites.google.com\/site\/bingofse2016\/, 2016. {Online; accessed 11-March-2016}."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.hex-rays.com\/ idapro\/","author":"Interactive Disassembler IDA","year":"2016","unstructured":"IDA Pro - Interactive Disassembler . http:\/\/www.hex-rays.com\/ idapro\/ , 2016 . {Online; accessed 11-March-2016}. IDA Pro - Interactive Disassembler. http:\/\/www.hex-rays.com\/ idapro\/, 2016. {Online; accessed 11-March-2016}."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807267"},{"key":"e_1_3_2_1_4_1","volume-title":"Springer","author":"Balakrishnan G.","year":"2005","unstructured":"G. Balakrishnan , T. Reps , D. Melski , and T. Teitelbaum . Wysinwyx: What you see is not what you execute. In Verified software: theories, tools, experiments, pages 202\u2013213 . Springer , 2005 . G. Balakrishnan, T. Reps, D. Melski, and T. Teitelbaum. Wysinwyx: What you see is not what you execute. In Verified software: theories, tools, experiments, pages 202\u2013213. Springer, 2005."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/267895.267921"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_8"},{"key":"e_1_3_2_1_8_1","volume-title":"DTIC Document","author":"Caballero J.","year":"2009","unstructured":"J. Caballero , N. M. Johnson , S. McCamant , and D. Song . Binary code extraction and interface identification for security applications. Technical report , DTIC Document , 2009 . J. Caballero, N. M. Johnson, S. McCamant, and D. Song. Binary code extraction and interface identification for security applications. Technical report, DTIC Document, 2009."},{"issue":"2","key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Comprehensive survey on distance\/similarity measures between probability density functions","volume":"1","author":"Cha S.-H.","year":"2007","unstructured":"S.-H. Cha . Comprehensive survey on distance\/similarity measures between probability density functions . City , 1 ( 2 ): 1 , 2007 . S.-H. Cha. Comprehensive survey on distance\/similarity measures between probability density functions. City, 1(2):1, 2007.","journal-title":"City"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380220502"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594343"},{"key":"e_1_3_2_1_12_1","first-page":"340","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"De Moura L.","unstructured":"L. De Moura and N. Bj\u00f8rner . Z3: An efficient smt solver . In Tools and Algorithms for the Construction and Analysis of Systems , pages 337\u2013 340 . Springer, 2008. L. De Moura and N. Bj\u00f8rner. Z3: An efficient smt solver. In Tools and Algorithms for the Construction and Analysis of Systems, pages 337\u2013340. Springer, 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939719"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceeding of CanSecWest","author":"Dullien T.","year":"2009","unstructured":"T. Dullien and S. Porst . Reil: A platform-independent intermediate representation of disassembled code for static code analysis . Proceeding of CanSecWest , 2009 . T. Dullien and S. Porst. Reil: A platform-independent intermediate representation of disassembled code for static code analysis. Proceeding of CanSecWest, 2009."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Egele M.","year":"2014","unstructured":"M. Egele , M. Woo , P. Chapman , and D. Brumley . Blanket execution: Dynamic similarity testing for program binaries and components . In Proceedings of the 23rd USENIX Security Symposium , San Diego, CA, USA , August 20-22, 2014 . M. Egele, M. Woo, P. Chapman, and D. Brumley. Blanket execution: Dynamic similarity testing for program binaries and components. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014."},{"key":"e_1_3_2_1_16_1","unstructured":"pages 303\u2013317 2014. pages 303\u2013317 2014."},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security Symposium","author":"Egele M.","year":"2014","unstructured":"M. Egele , M. Woo , P. Chapman , and D. Brumley . Blanket execution: Dynamic similarity testing for program binaries and components . In USENIX Security Symposium , 2014 . M. Egele, M. Woo, P. Chapman, and D. Brumley. Blanket execution: Dynamic similarity testing for program binaries and components. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_18_1","first-page":"173","volume-title":"GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6.7, 2004","author":"Flake H.","year":"2004","unstructured":"H. Flake . Structural comparison of executable objects. In Detection of Intrusions and Malware &amp; Vulnerability Assessment , GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6.7, 2004 , Proceedings , pages 161\u2013 173 , 2004 . H. Flake. Structural comparison of executable objects. In Detection of Intrusions and Malware &amp; Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6.7, 2004, Proceedings, pages 161\u2013173, 2004."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"e_1_3_2_1_21_1","first-page":"96","volume-title":"Proceedings of the 22th USENIX Security Symposium","author":"Jang J.","year":"2013","unstructured":"J. Jang , M. Woo , and D. Brumley . Towards automatic software lineage inference . In Proceedings of the 22th USENIX Security Symposium , Washington, DC, USA , August 14-16, 2013 , pages 81\u2013 96 , 2013. J. Jang, M. Woo, and D. Brumley. Towards automatic software lineage inference. In Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, pages 81\u201396, 2013."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985899"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572283"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568296"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_11"},{"key":"e_1_3_2_1_28_1","volume-title":"8th International Symposium, RAID 2005","author":"Kr\u00fcgel C.","year":"2005","unstructured":"C. Kr\u00fcgel , E. Kirda , D. Mutz , W. K. Robertson , and G. Vigna . Polymorphic worm detection using structural information of executables. In Recent Advances in Intrusion Detection , 8th International Symposium, RAID 2005 , Seattle, WA, USA , September 7-9, 2005 , Revised Papers, pages 207\u2013226, 2005. C. Kr\u00fcgel, E. Kirda, D. Mutz, W. K. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pages 207\u2013226, 2005."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_1_30_1","volume-title":"principles, patterns, and practices","author":"Martin R. C.","year":"2003","unstructured":"R. C. Martin . Agile software development : principles, patterns, and practices . Prentice Hall PTR , 2003 . R. C. Martin. Agile software development: principles, patterns, and practices. Prentice Hall PTR, 2003."},{"key":"e_1_3_2_1_31_1","first-page":"430","volume-title":"ICT Systems Security and Privacy Protection","author":"Ming J.","unstructured":"J. Ming , D. Xu , and D. Wu . Memoized semantics-based binary diffing with application to malware lineage inference . In ICT Systems Security and Privacy Protection , pages 416\u2013 430 . Springer, 2015. J. Ming, D. Xu, and D. Wu. Memoized semantics-based binary diffing with application to malware lineage inference. In ICT Systems Security and Privacy Protection, pages 416\u2013 430. Springer, 2015."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664269"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806672.1806678"},{"key":"e_1_3_2_1_35_1","first-page":"189","volume-title":"Leuven","author":"Rosenblum N. E.","year":"2011","unstructured":"N. E. Rosenblum , X. Zhu , and B. P. Miller . Who wrote this code? identifying the authors of program binaries. In Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security , Leuven , Belgium , September 12-14, 2011 . Proceedings, pages 172\u2013 189 , 2011. N. E. Rosenblum, X. Zhu, and B. P. Miller. Who wrote this code? identifying the authors of program binaries. In Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pages 172\u2013189, 2011."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572287"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451150"},{"key":"e_1_3_2_1_38_1","volume-title":"In Proceedings of the 23nd Network and Distributed System Security Symposium. NDSS","author":"Sebastian E.","year":"2016","unstructured":"E. Sebastian , Y. Khaled , and G.-P. Elmar . discovre : Efficient cross-architecture identification of bugs in binary code . In In Proceedings of the 23nd Network and Distributed System Security Symposium. NDSS , 2016 . E. Sebastian, Y. Khaled, and G.-P. Elmar. discovre: Efficient cross-architecture identification of bugs in binary code. In In Proceedings of the 23nd Network and Distributed System Security Symposium. NDSS, 2016."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818017"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336767"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081738"}],"event":{"name":"FSE'16: 24nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering","location":"Seattle WA USA","acronym":"FSE'16","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950290.2950350","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2950290.2950350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:56Z","timestamp":1750218596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950290.2950350"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":42,"alternative-id":["10.1145\/2950290.2950350","10.1145\/2950290"],"URL":"https:\/\/doi.org\/10.1145\/2950290.2950350","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]},"assertion":[{"value":"2016-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}