{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:32:24Z","timestamp":1773156744685,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T00:00:00Z","timestamp":1535932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,3]]},"DOI":"10.1145\/3238147.3238199","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T20:04:36Z","timestamp":1534795476000},"page":"667-678","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":156,"title":["\u03b1Diff: cross-version binary code similarity detection with DNN"],"prefix":"10.1145","author":[{"given":"Bingchang","family":"Liu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Wei","family":"Huo","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Wenchao","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Feng","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Aihua","family":"Piao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China"}]},{"given":"Wei","family":"Zou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2018,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"265","article-title":"TensorFlow: A System for Large-Scale Machine Learning","volume":"16","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , 2016 . TensorFlow: A System for Large-Scale Machine Learning .. In OSDI , Vol. 16. 265 \u2013 283 . Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016. TensorFlow: A System for Large-Scale Machine Learning.. In OSDI, Vol. 16. 265\u2013283.","journal-title":"OSDI"},{"key":"e_1_3_2_1_2_1","volume-title":"NDSS","volume":"9","author":"Bayer Ulrich","year":"2009","unstructured":"Ulrich Bayer , Paolo Milani Comparetti , Clemens Hlauschek , Christopher Kruegel , and Engin Kirda . 2009 . Scalable, Behavior-Based Malware Clustering .. In NDSS , Vol. 9 . Citeseer, 8\u201311. Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, and Engin Kirda. 2009. Scalable, Behavior-Based Malware Clustering.. In NDSS, Vol. 9. Citeseer, 8\u201311."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766959"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Jane Bromley Isabelle Guyon Yann LeCun Eduard S\u00e4ckinger and Roopak Shah. 1994. Signature verification using a\" siamese\" time delay neural network. In Advances in Neural Information Processing Systems. 737\u2013744.   Jane Bromley Isabelle Guyon Yann LeCun Eduard S\u00e4ckinger and Roopak Shah. 1994. Signature verification using a\" siamese\" time delay neural network. In Advances in Neural Information Processing Systems. 737\u2013744.","DOI":"10.1142\/9789812797926_0003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.17"},{"key":"e_1_3_2_1_6_1","volume-title":"Chia Yuan Cho, and Hee Beng Kuan Tan","author":"Chandramohan Mahinthan","year":"2016","unstructured":"Mahinthan Chandramohan , Yinxing Xue , Zhengzi Xu , Yang Liu , Chia Yuan Cho, and Hee Beng Kuan Tan . 2016 . Mahinthan Chandramohan, Yinxing Xue, Zhengzi Xu, Yang Liu, Chia Yuan Cho, and Hee Beng Kuan Tan. 2016."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security Symposium","volume":"15","author":"Chen Kai","year":"2015","unstructured":"Kai Chen , Peng Wang , Yeonjoon Lee , XiaoFeng Wang , Nan Zhang , Heqing Huang , Wei Zou , and Peng Liu . 2015 . Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale .. In USENIX Security Symposium , Vol. 15 . Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.. In USENIX Security Symposium, Vol. 15."},{"key":"e_1_3_2_1_9_1","volume-title":"Keras. Retrieved","author":"Fran\u00e7ois","year":"2018","unstructured":"Fran\u00e7ois Chollet et al. 2015 . Keras. Retrieved April 10, 2018 from https:\/\/keras.io\/ Fran\u00e7ois Chollet et al. 2015. Keras. Retrieved April 10, 2018 from https:\/\/keras.io\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"e_1_3_2_1_11_1","volume-title":"Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, 8609\u20138613","author":"Dahl George E","year":"2013","unstructured":"George E Dahl , Tara N Sainath , and Geoffrey E Hinton . 2013 . Improving deep neural networks for LVCSR using rectified linear units and dropout. In Acoustics , Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, 8609\u20138613 . George E Dahl, Tara N Sainath, and Geoffrey E Hinton. 2013. Improving deep neural networks for LVCSR using rectified linear units and dropout. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, 8609\u20138613."},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Machine Learning. 2702\u20132711","author":"Dai Hanjun","year":"2016","unstructured":"Hanjun Dai , Bo Dai , and Le Song . 2016 . Discriminative embeddings of latent variable models for structured data . In International Conference on Machine Learning. 2702\u20132711 . Hanjun Dai, Bo Dai, and Le Song. 2016. Discriminative embeddings of latent variable models for structured data. In International Conference on Machine Learning. 2702\u20132711."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908126"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"DDWRT","year":"2013","unstructured":"DDWRT 2013 . DD-WRT Firmware Image r21676 . Retrieved April 26, 2018 from ftp:\/\/ftp.dd-wrt.com\/betas\/2013\/05-27-2013-r21676\/senaoeoc5610\/linux.bin DDWRT 2013. DD-WRT Firmware Image r21676. Retrieved April 26, 2018 from ftp:\/\/ftp.dd-wrt.com\/betas\/2013\/05-27-2013-r21676\/senaoeoc5610\/linux.bin"},{"key":"e_1_3_2_1_15_1","volume-title":"Graph-based comparison of executable objects (english version). Sstic","author":"Dullien Thomas","year":"2005","unstructured":"Thomas Dullien and Rolf Rolles . 2005. Graph-based comparison of executable objects (english version). Sstic ( 2005 ), 1\u201313. Thomas Dullien and Rolf Rolles. 2005. Graph-based comparison of executable objects (english version). Sstic (2005), 1\u201313."},{"key":"e_1_3_2_1_16_1","unstructured":"Manuel Egele Maverick Woo Peter Chapman and David Brumley. 2014. Blanket execution: Dynamic similarity testing for program binaries and components. USENIX.   Manuel Egele Maverick Woo Peter Chapman and David Brumley. 2014. Blanket execution: Dynamic similarity testing for program binaries and components. USENIX."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Sebastian Eschweiler Khaled Yakdan and Elmar Gerhards-Padilla. 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code.. In NDSS.  Sebastian Eschweiler Khaled Yakdan and Elmar Gerhards-Padilla. 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code.. In NDSS.","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_19_1","series-title":"Lecture Notes in Informatics","volume-title":"Proc. of the International GI Workshop on Detection of Intrusions and Malware &amp","author":"Flake Halvar","unstructured":"Halvar Flake . 2004. Structural comparison of executable objects . In Proc. of the International GI Workshop on Detection of Intrusions and Malware &amp ; Vulnerability Assessment, number P-46 in Lecture Notes in Informatics . Citeseer , 161\u2013174. Halvar Flake. 2004. Structural comparison of executable objects. In Proc. of the International GI Workshop on Detection of Intrusions and Malware &amp; Vulnerability Assessment, number P-46 in Lecture Notes in Informatics. Citeseer, 161\u2013174."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"e_1_3_2_1_21_1","volume-title":"Deep learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow , Yoshua Bengio , Aaron Courville , and Yoshua Bengio . 2016. Deep learning . Vol. 1 . MIT press Cambridge . Ian Goodfellow, Yoshua Bengio, Aaron Courville, and Yoshua Bengio. 2016. Deep learning. Vol. 1. MIT press Cambridge."},{"key":"e_1_3_2_1_22_1","volume-title":"What Do We Understand About Convolutional Networks? arXiv preprint arXiv:1803.08834","author":"Hadji Isma","year":"2018","unstructured":"Isma Hadji and Richard P Wildes . 2018. What Do We Understand About Convolutional Networks? arXiv preprint arXiv:1803.08834 ( 2018 ). Isma Hadji and Richard P Wildes. 2018. What Do We Understand About Convolutional Networks? arXiv preprint arXiv:1803.08834 (2018)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.100"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","year":"2015","unstructured":"Hex-Rays. 2015 . IDA Pro Disassembler and Debugger . Retrieved April 10, 2018 from https:\/\/www.hex-rays.com\/products\/ida\/index.shtml Hex-Rays. 2015. IDA Pro Disassembler and Debugger. Retrieved April 10, 2018 from https:\/\/www.hex-rays.com\/products\/ida\/index.shtml"},{"key":"e_1_3_2_1_26_1","unstructured":"Geoffrey Hinton Nitish Srivastava and Kevin Swersky. 2012. Neural Networks for Machine Learning-Lecture 6a-Overview of mini-batch gradient descent.  Geoffrey Hinton Nitish Srivastava and Kevin Swersky. 2012. Neural Networks for Machine Learning-Lecture 6a-Overview of mini-batch gradient descent."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"e_1_3_2_1_28_1","volume-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy . 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167 ( 2015 ). Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167 (2015)."},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium. 81\u201396","author":"Jang Jiyong","year":"2013","unstructured":"Jiyong Jang , Maverick Woo , and David Brumley . 2013 . Towards Automatic Software Lineage Inference .. In USENIX Security Symposium. 81\u201396 . Jiyong Jang, Maverick Woo, and David Brumley. 2013. Towards Automatic Software Lineage Inference.. In USENIX Security Symposium. 81\u201396."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.57"},{"key":"e_1_3_2_1_31_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097\u20131105.   Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097\u20131105."},{"key":"e_1_3_2_1_32_1","unstructured":"Yann LeCun Bernhard Boser John S Denker Donnie Henderson Richard E Howard Wayne Hubbard and Lawrence D Jackel. 1989.  Yann LeCun Bernhard Boser John S Denker Donnie Henderson Richard E Howard Wayne Hubbard and Lawrence D Jackel. 1989."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2655046"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_8"},{"key":"e_1_3_2_1_37_1","volume-title":"Conditional iterative generation of images in latent space. arXiv preprint arXiv:1612.00005","author":"Nguyen Anh","year":"2016","unstructured":"Anh Nguyen , Jason Yosinski , Yoshua Bengio , Alexey Dosovitskiy , and Jeff Clune . 2016. Plug &amp; play generative networks : Conditional iterative generation of images in latent space. arXiv preprint arXiv:1612.00005 ( 2016 ). Anh Nguyen, Jason Yosinski, Yoshua Bengio, Alexey Dosovitskiy, and Jeff Clune. 2016. Plug &amp; play generative networks: Conditional iterative generation of images in latent space. arXiv preprint arXiv:1612.00005 (2016)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00010"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_41_1","first-page":"48109","article-title":"Evaluating web-based question answering systems","volume":"1001","author":"Radev Dragomir R","year":"2002","unstructured":"Dragomir R Radev , Hong Qi , Harris Wu , and Weiguo Fan . 2002 . Evaluating web-based question answering systems . Ann Arbor 1001 (2002), 48109 . Dragomir R Radev, Hong Qi, Harris Wu, and Weiguo Fan. 2002. Evaluating web-based question answering systems. Ann Arbor 1001 (2002), 48109.","journal-title":"Ann Arbor"},{"key":"e_1_3_2_1_42_1","volume-title":"Retrieved","year":"2014","unstructured":"ReadyNAS 2014 . ReadyNAS Firmware Image v6.1.6 . Retrieved April 26, 2018 from http:\/\/www.downloads.netgear.com\/files\/GDC\/ READYNAS-100\/ReadyNASOS-6.1.6-arm.zip ReadyNAS 2014. ReadyNAS Firmware Image v6.1.6. Retrieved April 26, 2018 from http:\/\/www.downloads.netgear.com\/files\/GDC\/ READYNAS-100\/ReadyNASOS-6.1.6-arm.zip"},{"key":"e_1_3_2_1_43_1","volume-title":"Learning representations by back-propagating errors. nature 323, 6088","author":"Rumelhart David E","year":"1986","unstructured":"David E Rumelhart , Geoffrey E Hinton , and Ronald J Williams . 1986. Learning representations by back-propagating errors. nature 323, 6088 ( 1986 ), 533. David E Rumelhart, Geoffrey E Hinton, and Ronald J Williams. 1986. Learning representations by back-propagating errors. nature 323, 6088 (1986), 533."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572287"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_47_1","volume-title":"USENIX Security Symposium. 611\u2013626","author":"Richard Shin Eui Chul","year":"2015","unstructured":"Eui Chul Richard Shin , Dawn Song , and Reza Moazzezi . 2015 . Recognizing Functions in Binaries with Neural Networks .. In USENIX Security Symposium. 611\u2013626 . Eui Chul Richard Shin, Dawn Song, and Reza Moazzezi. 2015. Recognizing Functions in Binaries with Neural Networks.. In USENIX Security Symposium. 611\u2013626."},{"key":"e_1_3_2_1_48_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.434"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155606"},{"key":"e_1_3_2_1_52_1","first-page":"1","article-title":"Bmat-a binary matching tool for stale profile propagation","volume":"2","author":"Wang Zheng","year":"2000","unstructured":"Zheng Wang , Ken Pierce , and Scott McFarling . 2000 . Bmat-a binary matching tool for stale profile propagation . The Journal of Instruction-Level Parallelism 2 (2000), 1 \u2013 20 . Zheng Wang, Ken Pierce, and Scott McFarling. 2000. Bmat-a binary matching tool for stale profile propagation. The Journal of Instruction-Level Parallelism 2 (2000), 1\u201320.","journal-title":"The Journal of Instruction-Level Parallelism"},{"key":"e_1_3_2_1_53_1","unstructured":"Kilian Q Weinberger John Blitzer and Lawrence K Saul. 2006. Distance metric learning for large margin nearest neighbor classification. In Advances in neural information processing systems. 1473\u20131480.   Kilian Q Weinberger John Blitzer and Lawrence K Saul. 2006. Distance metric learning for large margin nearest neighbor classification. In Advances in neural information processing systems. 1473\u20131480."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.49"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"}],"event":{"name":"ASE '18: 33rd ACM\/IEEE International Conference on Automated Software Engineering","location":"Montpellier France","acronym":"ASE '18","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","CNRS Centre National De La Rechercue Scientifique","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3238147.3238199","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3238147.3238199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:35Z","timestamp":1750210775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3238147.3238199"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,3]]},"references-count":56,"alternative-id":["10.1145\/3238147.3238199","10.1145\/3238147"],"URL":"https:\/\/doi.org\/10.1145\/3238147.3238199","relation":{},"subject":[],"published":{"date-parts":[[2018,9,3]]},"assertion":[{"value":"2018-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}