{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:30Z","timestamp":1750220430712,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,2,19]]},"DOI":"10.1145\/3459104.3459122","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T22:48:56Z","timestamp":1626821336000},"page":"96-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Patch Analysis Method Based on Multi-firmware Comparison"],"prefix":"10.1145","author":[{"given":"Ruiqing","family":"XIAO","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China"}]},{"given":"Yuefei","family":"ZHU","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China"}]},{"given":"Anxiang","family":"HU","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China"}]},{"given":"Xiaoya","family":"ZHU","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China"}]},{"given":"Shengli","family":"LIU","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Survey of Binary Code Similarity.[J]. arXiv: Cryptography and Security","author":"Haq I U","year":"2019","unstructured":"Haq I U , Caballero J. A Survey of Binary Code Similarity.[J]. arXiv: Cryptography and Security , 2019 . Haq I U, Caballero J. A Survey of Binary Code Similarity.[J]. arXiv: Cryptography and Security, 2019."},{"key":"e_1_3_2_1_2_1","first-page":"161","article-title":"Structural comparison of executable objects[C]\/\/Proc. of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment, number P-46","volume":"2004","author":"Flake H","unstructured":"Flake H . Structural comparison of executable objects[C]\/\/Proc. of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment, number P-46 in Lecture Notes in Informatics. 2004 : 161 - 174 . Flake H. Structural comparison of executable objects[C]\/\/Proc. of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment, number P-46 in Lecture Notes in Informatics. 2004: 161-74.","journal-title":"Lecture Notes in Informatics."},{"issue":"1","key":"e_1_3_2_1_3_1","first-page":"3","article-title":"Graph-based comparison of executable objects (english version)[J]","volume":"5","author":"Dullien T","year":"2005","unstructured":"Dullien T , Rolles R . Graph-based comparison of executable objects (english version)[J] . SSTIC , 2005 , 5 ( 1 ): 3 . Dullien T, Rolles R. Graph-based comparison of executable objects (english version)[J]. SSTIC, 2005, 5(1): 3.","journal-title":"SSTIC"},{"key":"e_1_3_2_1_4_1","volume-title":"April.","author":"Bindiff","year":"2019","unstructured":"Bindiff 5 , https:\/\/www.zynamics.com\/Bindiff.html , April. 2019 . Bindiff5, https:\/\/www.zynamics.com\/Bindiff.html, April. 2019."},{"volume-title":"ACM","author":"Bourquin M","key":"e_1_3_2_1_5_1","unstructured":"Bourquin M , King A , Robbins E. Binslayer : accurate comparison of binary executables[C]\/\/Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop . ACM , 2013: 4. Bourquin M, King A, Robbins E. Binslayer: accurate comparison of binary executables[C]\/\/Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop. ACM, 2013: 4."},{"key":"e_1_3_2_1_6_1","volume-title":"Compressing Differences of Executable Code[J]","author":"Baker B S","year":"1999","unstructured":"Baker B S , Manber U , Muth R . Compressing Differences of Executable Code[J] . 1999 . Baker B S , Manber U , Muth R . Compressing Differences of Executable Code[J]. 1999."},{"key":"e_1_3_2_1_7_1","volume-title":"SPAIN: security patch analysis for binaries towards understanding the pain and pills[C]. international conference on software engineering","author":"Xu Z","year":"2017","unstructured":"Xu Z , Chen B , Chandramohan M , SPAIN: security patch analysis for binaries towards understanding the pain and pills[C]. international conference on software engineering , 2017 : 462-72. Xu Z, Chen B, Chandramohan M, SPAIN: security patch analysis for binaries towards understanding the pain and pills[C]. international conference on software engineering, 2017: 462-72."},{"key":"e_1_3_2_1_8_1","volume-title":"BinHunt: Automatically Finding Semantic Differences in Binary Programs[J]","author":"Gao D","year":"2008","unstructured":"Gao D , Reiter M K , Song D X . BinHunt: Automatically Finding Semantic Differences in Binary Programs[J] . 2008 . Gao D, Reiter M K, Song D X. BinHunt: Automatically Finding Semantic Differences in Binary Programs[J]. 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE International Conference on Software Analysis. IEEE","author":"Hu Y","year":"2016","unstructured":"Hu Y , Zhang Y , Li J , Cross-Architecture Binary Semantics Understanding via Similar Code Comparison[C]\/\/ IEEE International Conference on Software Analysis. IEEE , 2016 . Hu Y, Zhang Y, Li J, Cross-Architecture Binary Semantics Understanding via Similar Code Comparison[C]\/\/ IEEE International Conference on Software Analysis. IEEE, 2016."},{"key":"e_1_3_2_1_10_1","volume-title":"ACM","author":"Huang H","year":"2017","unstructured":"Huang H , Youssef A M , Debbabi M. BinSequence : Fast, Accurate and Scalable Binary Code Reuse Detection[C]\/\/ Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security . ACM , 2017 . Huang H, Youssef A M, Debbabi M. BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection[C]\/\/ Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ACM, 2017."},{"key":"e_1_3_2_1_11_1","volume-title":"ACM","author":"Kargen U","year":"2017","unstructured":"Kargen U , Shahmehri N. Towards robust instruction-level trace alignment of binary code[C]\/\/ IEEE\/ACM International Conference on Automated Software Engineering . ACM , 2017 . Kargen U, Shahmehri N. Towards robust instruction-level trace alignment of binary code[C]\/\/ IEEE\/ACM International Conference on Automated Software Engineering. ACM, 2017."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.17"}],"event":{"name":"ISEEIE 2021: 2021 International Symposium on Electrical, Electronics and Information Engineering","acronym":"ISEEIE 2021","location":"Seoul Republic of Korea"},"container-title":["2021 International Symposium on Electrical, Electronics and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459104.3459122","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3459104.3459122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:03Z","timestamp":1750193223000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3459104.3459122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,19]]},"references-count":12,"alternative-id":["10.1145\/3459104.3459122","10.1145\/3459104"],"URL":"https:\/\/doi.org\/10.1145\/3459104.3459122","relation":{},"subject":[],"published":{"date-parts":[[2021,2,19]]},"assertion":[{"value":"2021-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}