{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:06:42Z","timestamp":1776784002130,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534367","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":140,"title":["jTrans: jump-aware transformer for binary code similarity detection"],"prefix":"10.1145","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua University, China \/ Beijing National Research Center for Information Science and Technology, China"}]},{"given":"Wenjie","family":"Qu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Gilad","family":"Katz","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Israel"}]},{"given":"Wenyu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Tsinghua University, China \/ Beijing National Research Center for Information Science and Technology, China"}]},{"given":"Zeyu","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"given":"Han","family":"Qiu","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Jianwei","family":"Zhuge","sequence":"additional","affiliation":[{"name":"Tsinghua University, China \/ Beijing National Research Center for Information Science and Technology, China"}]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, China \/ Beijing National Research Center for Information Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.11"},{"key":"e_1_3_2_1_2_1","unstructured":"Archlinux. 2021. Arch linux. https:\/\/archlinux.org\/packages\/ \t\t\t\t\t  Archlinux. 2021. Arch linux. https:\/\/archlinux.org\/packages\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Archlinux. 2021. Arch User Repository. https:\/\/aur.archlinux.org\/ \t\t\t\t\t  Archlinux. 2021. Arch User Repository. https:\/\/aur.archlinux.org\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.40"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"e_1_3_2_1_7_1","volume-title":"International conference on machine learning. 2702\u20132711","author":"Dai Hanjun","year":"2016","unstructured":"Hanjun Dai , Bo Dai , and Le Song . 2016 . Discriminative embeddings of latent variable models for structured data . In International conference on machine learning. 2702\u20132711 . Hanjun Dai, Bo Dai, and Le Song. 2016. Discriminative embeddings of latent variable models for structured data. In International conference on machine learning. 2702\u20132711."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908126"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3177157"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594343"},{"key":"e_1_3_2_1_12_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805.","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805. Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939719"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"e_1_3_2_1_16_1","first-page":"3","article-title":"Graph-based comparison of executable objects (english version)","volume":"5","author":"Dullien Thomas","year":"2005","unstructured":"Thomas Dullien and Rolf Rolles . 2005 . Graph-based comparison of executable objects (english version) . Sstic , 5 , 1 (2005), 3 . Thomas Dullien and Rolf Rolles. 2005. Graph-based comparison of executable objects (english version). Sstic, 5, 1 (2005), 3.","journal-title":"Sstic"},{"key":"e_1_3_2_1_17_1","volume-title":"23rd $USENIX$ Security Symposium ($USENIX$ Security 14). 303\u2013317.","author":"Egele Manuel","unstructured":"Manuel Egele , Maverick Woo , Peter Chapman , and David Brumley . 2014. Blanket execution: Dynamic similarity testing for program binaries and components . In 23rd $USENIX$ Security Symposium ($USENIX$ Security 14). 303\u2013317. Manuel Egele, Maverick Woo, Peter Chapman, and David Brumley. 2014. Blanket execution: Dynamic similarity testing for program binaries and components. In 23rd $USENIX$ Security Symposium ($USENIX$ Security 14). 303\u2013317."},{"key":"e_1_3_2_1_18_1","first-page":"58","article-title":"discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code","volume":"52","author":"Eschweiler Sebastian","year":"2016","unstructured":"Sebastian Eschweiler , Khaled Yakdan , and Elmar Gerhards-Padilla . 2016 . discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code .. In NDSS. 52 , 58 \u2013 79 . Sebastian Eschweiler, Khaled Yakdan, and Elmar Gerhards-Padilla. 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code.. In NDSS. 52, 58\u201379.","journal-title":"NDSS."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.21"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052995"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_22_1","volume-title":"GI SIG SIDAR workshop, DIMVA","author":"Flake Halvar","year":"2004","unstructured":"Halvar Flake . 2004 . Structural comparison of executable objects. In Detection of intrusions and malware & vulnerability assessment , GI SIG SIDAR workshop, DIMVA 2004. Halvar Flake. 2004. Structural comparison of executable objects. In Detection of intrusions and malware & vulnerability assessment, GI SIG SIDAR workshop, DIMVA 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"e_1_3_2_1_25_1","volume-title":"2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR\u201906)","author":"Hadsell Raia","year":"2006","unstructured":"Raia Hadsell , Sumit Chopra , and Yann LeCun . 2006 . Dimensionality reduction by learning an invariant mapping . In 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR\u201906) . 2, 1735\u20131742. Raia Hadsell, Sumit Chopra, and Yann LeCun. 2006. Dimensionality reduction by learning an invariant mapping. In 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR\u201906). 2, 1735\u20131742."},{"key":"e_1_3_2_1_26_1","unstructured":"Irfan Ul Haq and Juan Caballero. 2019. A survey of binary code similarity. arXiv preprint arXiv:1909.11424. \t\t\t\t\t  Irfan Ul Haq and Juan Caballero. 2019. A survey of binary code similarity. arXiv preprint arXiv:1909.11424."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985453"},{"key":"e_1_3_2_1_28_1","unstructured":"Hex-Rays. 2015. IDA Pro Disassembler and Debugger. https:\/\/www.hex-rays.com\/products\/ida\/index.shtml \t\t\t\t\t  Hex-Rays. 2015. IDA Pro Disassembler and Debugger. https:\/\/www.hex-rays.com\/products\/ida\/index.shtml"},{"key":"e_1_3_2_1_29_1","volume-title":"Long short-term memory. Neural computation, 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation, 9, 8 ( 1997 ), 1735\u20131780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation, 9, 8 (1997), 1735\u20131780."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"e_1_3_2_1_31_1","volume-title":"Mutantx-s: Scalable malware clustering based on static features. In 2013 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 13). 187\u2013198.","author":"Hu Xin","year":"2013","unstructured":"Xin Hu , Kang G Shin , Sandeep Bhatkar , and Kent Griffin . 2013 . Mutantx-s: Scalable malware clustering based on static features. In 2013 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 13). 187\u2013198. Xin Hu, Kang G Shin, Sandeep Bhatkar, and Kent Griffin. 2013. Mutantx-s: Scalable malware clustering based on static features. In 2013 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 13). 187\u2013198."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.50"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052974"},{"key":"e_1_3_2_1_34_1","volume-title":"22nd $USENIX$ Security Symposium ($USENIX$ Security 13). 81\u201396.","author":"Jang Jiyong","unstructured":"Jiyong Jang , Maverick Woo , and David Brumley . 2013. Towards automatic software lineage inference . In 22nd $USENIX$ Security Symposium ($USENIX$ Security 13). 81\u201396. Jiyong Jang, Maverick Woo, and David Brumley. 2013. Towards automatic software lineage inference. In 22nd $USENIX$ Security Symposium ($USENIX$ Security 13). 81\u201396."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115647"},{"key":"e_1_3_2_1_36_1","volume-title":"Sooel Son, and Yongdae Kim.","author":"Kim Dongkwan","year":"2020","unstructured":"Dongkwan Kim , Eunsoo Kim , Sang Kil Cha , Sooel Son, and Yongdae Kim. 2020 . Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned. arXiv preprint arXiv:2011.10749. Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, and Yongdae Kim. 2020. Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned. arXiv preprint arXiv:2011.10749."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1941-2"},{"key":"e_1_3_2_1_38_1","volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, 25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E Hinton . 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, 25 ( 2012 ), 1097\u20131105. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, 25 (2012), 1097\u20131105."},{"key":"e_1_3_2_1_39_1","volume-title":"International conference on machine learning. 1188\u20131196","author":"Le Quoc","year":"2014","unstructured":"Quoc Le and Tomas Mikolov . 2014 . Distributed representations of sentences and documents . In International conference on machine learning. 1188\u20131196 . Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In International conference on machine learning. 1188\u20131196."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2655046"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_15"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23020"},{"key":"e_1_3_2_1_45_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781. \t\t\t\t\t  Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781."},{"key":"e_1_3_2_1_46_1","volume-title":"International Conference on Information Security and Cryptology. 92\u2013109","author":"Ming Jiang","year":"2012","unstructured":"Jiang Ming , Meng Pan , and Debin Gao . 2012 . iBinHunt: Binary hunting with inter-procedural control flow . In International Conference on Information Security and Cryptology. 92\u2013109 . Jiang Ming, Meng Pan, and Debin Gao. 2012. iBinHunt: Binary hunting with inter-procedural control flow. In International Conference on Information Security and Cryptology. 92\u2013109."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_23"},{"key":"e_1_3_2_1_48_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , and Luca Antiga . 2019 . Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32 (2019), 8026\u20138037. Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, and Luca Antiga. 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems, 32 (2019), 8026\u20138037."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664269"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Kimberly Redmond Lannan Luo and Qiang Zeng. 2018. A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis. arXiv preprint arXiv:1812.09652. \t\t\t\t\t  Kimberly Redmond Lannan Luo and Qiang Zeng. 2018. A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis. arXiv preprint arXiv:1812.09652.","DOI":"10.14722\/bar.2019.23057"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the eighteenth international symposium on Software testing and analysis. 117\u2013128","author":"\u00f8rnsen Andreas S\u00e6","year":"2009","unstructured":"Andreas S\u00e6 bj \u00f8rnsen , Jeremiah Willcock , Thomas Panas , Daniel Quinlan , and Zhendong Su . 2009 . Detecting code clones in binary executables . In Proceedings of the eighteenth international symposium on Software testing and analysis. 117\u2013128 . Andreas S\u00e6 bj\u00f8rnsen, Jeremiah Willcock, Thomas Panas, Daniel Quinlan, and Zhendong Su. 2009. Detecting code clones in binary executables. In Proceedings of the eighteenth international symposium on Software testing and analysis. 117\u2013128."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_54_1","unstructured":"SecretPatch. 2021. SecretPatch. https:\/\/github.com\/SecretPatch\/Dataset \t\t\t\t\t  SecretPatch. 2021. SecretPatch. https:\/\/github.com\/SecretPatch\/Dataset"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_6"},{"key":"e_1_3_2_1_56_1","unstructured":"Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104\u20133112. \t\t\t\t\t  Ilya Sutskever Oriol Vinyals and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104\u20133112."},{"key":"e_1_3_2_1_57_1","volume-title":"\u0141 ukasz Kaiser, and Illia Polosukhin","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan N Gomez , \u0141 ukasz Kaiser, and Illia Polosukhin . 2017 . Attention is all you need. In Advances in neural information processing systems. 5998\u20136008. Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141 ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998\u20136008."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.328"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.49"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3056139"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Fei Zuo Xiaopeng Li Patrick Young Lannan Luo Qiang Zeng and Zhexin Zhang. 2018. Neural machine translation inspired binary code similarity comparison beyond function pairs. arXiv preprint arXiv:1808.04706. \t\t\t\t\t  Fei Zuo Xiaopeng Li Patrick Young Lannan Luo Qiang Zeng and Zhexin Zhang. 2018. Neural machine translation inspired binary code similarity comparison beyond function pairs. arXiv preprint arXiv:1808.04706.","DOI":"10.14722\/ndss.2019.23492"},{"key":"e_1_3_2_1_64_1","unstructured":"zynamics. 2018. BinDiff. \"https:\/\/www.zynamics.com\/bindiff.html\" \t\t\t\t\t  zynamics. 2018. BinDiff. \"https:\/\/www.zynamics.com\/bindiff.html\""}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534367","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534367"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":64,"alternative-id":["10.1145\/3533767.3534367","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534367","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}