{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:20:30Z","timestamp":1773843630652,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":101,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3567975","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"361-374","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7843-9510","authenticated-orcid":false,"given":"Sunwoo","family":"Ahn","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Korea, South \u2013 Republic of Korea and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0813-8349","authenticated-orcid":false,"given":"Seonggwan","family":"Ahn","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Korea, South \u2013 Republic of Korea and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0799-0230","authenticated-orcid":false,"given":"Hyungjoon","family":"Koo","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sungkyunkwan University, Korea, South \u2013 Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6412-2926","authenticated-orcid":false,"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Seoul National University, Korea, South \u2013 Republic of Korea and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 5th Program Protection and Reverse Engineering Workshop (PPREW)","author":"Ali-Gombe Aisha","unstructured":"Aisha Ali-Gombe , Irfan Ahmed , and Golden G . \u00a0Richard III. 2015. OpSeq: Android Malware Fingerprinting . In Proceedings of the 5th Program Protection and Reverse Engineering Workshop (PPREW) . Los Angeles, CA. Aisha Ali-Gombe, Irfan Ahmed, and Golden G.\u00a0Richard III. 2015. OpSeq: Android Malware Fingerprinting. In Proceedings of the 5th Program Protection and Reverse Engineering Workshop (PPREW). Los Angeles, CA."},{"key":"e_1_3_2_1_2_1","unstructured":"Angr. 2016. Python Framework for Analyzing Binaries. https:\/\/angr.io\/.  Angr. 2016. Python Framework for Analyzing Binaries. https:\/\/angr.io\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2987189.2987282"},{"key":"e_1_3_2_1_5_1","volume-title":"Runtime Packers: The Hidden Problem. In Black Hat USA Briefings (Black Hat USA).","author":"Brosch Tom","year":"2006","unstructured":"Tom Brosch and Maik Morgenstern . 2006 . Runtime Packers: The Hidden Problem. In Black Hat USA Briefings (Black Hat USA). Las Vegas, NV . Tom Brosch and Maik Morgenstern. 2006. Runtime Packers: The Hidden Problem. In Black Hat USA Briefings (Black Hat USA). Las Vegas, NV."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_8"},{"key":"e_1_3_2_1_7_1","unstructured":"BusyBox. 2022. The Swiss Army Knife of Embedded Linux. https:\/\/busybox.net.  BusyBox. 2022. The Swiss Army Knife of Embedded Linux. https:\/\/busybox.net."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.40"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE). Montpellier.","author":"Chandramohan Mahinthan","year":"2018","unstructured":"Mahinthan Chandramohan , Yinxing Xue , Zhengzi Xu , Yang Liu , Chia\u00a0Yuan Cho , and Tan Hee\u00a0Beng Kuan . 2018 . VulSeeker: A Semantic Learning Based Vulnerability Seeker for Cross-Platform Binary . In Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE). Montpellier. Mahinthan Chandramohan, Yinxing Xue, Zhengzi Xu, Yang Liu, Chia\u00a0Yuan Cho, and Tan Hee\u00a0Beng Kuan. 2018. VulSeeker: A Semantic Learning Based Vulnerability Seeker for Cross-Platform Binary. In Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE). Montpellier."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"e_1_3_2_1_12_1","unstructured":"The\u00a0MITRE Corporation. 2012. CVE-2012-2776 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2012-2776\/.  The\u00a0MITRE Corporation. 2012. CVE-2012-2776 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2012-2776\/."},{"key":"e_1_3_2_1_13_1","unstructured":"The\u00a0MITRE Corporation. 2014. CVE-2014-0160 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2014-0160\/.  The\u00a0MITRE Corporation. 2014. CVE-2014-0160 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2014-0160\/."},{"key":"e_1_3_2_1_14_1","unstructured":"The\u00a0MITRE Corporation. 2014. CVE-2014-0221 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2014-0221\/.  The\u00a0MITRE Corporation. 2014. CVE-2014-0221 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2014-0221\/."},{"key":"e_1_3_2_1_15_1","unstructured":"The\u00a0MITRE Corporation. 2014. CVE-2014-3508 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2014-3508\/.  The\u00a0MITRE Corporation. 2014. CVE-2014-3508 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2014-3508\/."},{"key":"e_1_3_2_1_16_1","unstructured":"The\u00a0MITRE Corporation. 2014. CVE-2014-9295 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2014-9295\/.  The\u00a0MITRE Corporation. 2014. CVE-2014-9295 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2014-9295\/."},{"key":"e_1_3_2_1_17_1","unstructured":"The\u00a0MITRE Corporation. 2015. CVE-2015-1791 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2015-1791\/.  The\u00a0MITRE Corporation. 2015. CVE-2015-1791 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2015-1791\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Curl. 2022. libcurl - the multiprotocol file transfer library. https:\/\/curl.se\/libcurl.  Curl. 2022. libcurl - the multiprotocol file transfer library. https:\/\/curl.se\/libcurl."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908126"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594343"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 2019 Conference of the Association for Computational Linguistics (NAACL)","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2019 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding . In Proceedings of the 2019 Conference of the Association for Computational Linguistics (NAACL) . Minneapolis, Minnesota. Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the Association for Computational Linguistics (NAACL). Minneapolis, Minnesota."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"e_1_3_2_1_25_1","volume-title":"Symposium sur la s\u00e9curit\u00e9 des technologies de l\u2019information et des communications (SSTIC). Rennes.","author":"Dullien Thomas","year":"2005","unstructured":"Thomas Dullien and Rolf Rolles . 2005 . Graph-based comparison of Executable Objects (English Version) . In Symposium sur la s\u00e9curit\u00e9 des technologies de l\u2019information et des communications (SSTIC). Rennes. Thomas Dullien and Rolf Rolles. 2005. Graph-based comparison of Executable Objects (English Version). In Symposium sur la s\u00e9curit\u00e9 des technologies de l\u2019information et des communications (SSTIC). Rennes."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Egele Manuel","year":"2014","unstructured":"Manuel Egele , Maverick Woo , Peter Chapman , and David Brumley . 2014 . Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components . In Proceedings of the 23rd USENIX Security Symposium . San Diego, CA. Manuel Egele, Maverick Woo, Peter Chapman, and David Brumley. 2014. Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. In Proceedings of the 23rd USENIX Security Symposium. San Diego, CA."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 1st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). Dortmund.","author":"Flake Halvar","year":"2004","unstructured":"Halvar Flake . 2004 . Structural Comparison of Executable Objects . In Proceedings of the 1st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). Dortmund. Halvar Flake. 2004. Structural Comparison of Executable Objects. In Proceedings of the 1st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). Dortmund."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"e_1_3_2_1_31_1","volume-title":"Libbgmp: The GNU Multiple Precision Arithmetic Library. https:\/\/gmplib.org.","author":"GNU.","year":"2022","unstructured":"GNU. 2022 . Libbgmp: The GNU Multiple Precision Arithmetic Library. https:\/\/gmplib.org. GNU. 2022. Libbgmp: The GNU Multiple Precision Arithmetic Library. https:\/\/gmplib.org."},{"key":"e_1_3_2_1_32_1","unstructured":"Google. 2020. Release of BERT Models. https:\/\/github.com\/google-research\/bert.  Google. 2020. Release of BERT Models. https:\/\/github.com\/google-research\/bert."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446371"},{"key":"e_1_3_2_1_34_1","unstructured":"Hex-rays. 2019. IDAPython Documentation. https:\/\/www.hex-rays.com\/products\/ida\/support\/idapython_docs\/.  Hex-rays. 2019. IDAPython Documentation. https:\/\/www.hex-rays.com\/products\/ida\/support\/idapython_docs\/."},{"key":"e_1_3_2_1_35_1","unstructured":"Hex-Rays. 2022. IDA Pro Disassembler. https:\/\/www.hex-rays.com\/products\/ida\/.  Hex-Rays. 2022. IDA Pro Disassembler. https:\/\/www.hex-rays.com\/products\/ida\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Geoffrey\u00a0E Hinton Nitish Srivastava Alex Krizhevsky Ilya Sutskever and Ruslan\u00a0R Salakhutdinov. 2012. Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580(2012).  Geoffrey\u00a0E Hinton Nitish Srivastava Alex Krizhevsky Ilya Sutskever and Ruslan\u00a0R Salakhutdinov. 2012. Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580(2012)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 22th USENIX Security Symposium","author":"Hu Xin","year":"2013","unstructured":"Xin Hu , Sandeep Bhatkar , Kent Griffin , and Kang\u00a0 G. Shin . 2013 . MutantX-S: Scalable Malware Clustering Based on Static Features . In Proceedings of the 22th USENIX Security Symposium . Washington, DC. Xin Hu, Sandeep Bhatkar, Kent Griffin, and Kang\u00a0G. Shin. 2013. MutantX-S: Scalable Malware Clustering Based on Static Features. In Proceedings of the 22th USENIX Security Symposium. Washington, DC."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.50"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.22"},{"key":"e_1_3_2_1_41_1","unstructured":"huanghonggit. 2019. BERT MLM with Pytorch. https:\/\/github.com\/huanghonggit\/Mask-Language-Model.  huanghonggit. 2019. BERT MLM with Pytorch. https:\/\/github.com\/huanghonggit\/Mask-Language-Model."},{"key":"e_1_3_2_1_42_1","unstructured":"ImageMagick. 2022. ImageMagick. https:\/\/imagemagick.org.  ImageMagick. 2022. ImageMagick. https:\/\/imagemagick.org."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359835"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155608"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3187689"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1941-2"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 3rd International Conference on Learning Representations (ICLR)","author":"Kingma P","year":"2015","unstructured":"Diederik\u00a0 P Kingma and Jimmy Ba . 2015 . Adam: A Method for Stochastic Optimization . In Proceedings of the 3rd International Conference on Learning Representations (ICLR) . San Diego, CA. Diederik\u00a0P Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In Proceedings of the 3rd International Conference on Learning Representations (ICLR). San Diego, CA."},{"key":"e_1_3_2_1_49_1","volume-title":"Siamese Neural Networks for One-Shot Image Recognition. Ph.\u00a0D. Dissertation","author":"Koch Gregory","unstructured":"Gregory Koch . 2015. Siamese Neural Networks for One-Shot Image Recognition. Ph.\u00a0D. Dissertation . University of Toronto , Toronto. http:\/\/www.cs.toronto.edu\/\u00a0gkoch\/files\/msc-thesis.pdf. Gregory Koch. 2015. Siamese Neural Networks for One-Shot Image Recognition. Ph.\u00a0D. Dissertation. University of Toronto, Toronto. http:\/\/www.cs.toronto.edu\/\u00a0gkoch\/files\/msc-thesis.pdf."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 32nd International Conference on Machine Learning (ICML). Lille.","author":"Koch Gregory","year":"2015","unstructured":"Gregory Koch , Richard Zemel , and Ruslan Salakhutdinov . 2015 . Siamese Neural Networks for One-shot Image Recognition . In Proceedings of the 32nd International Conference on Machine Learning (ICML). Lille. Gregory Koch, Richard Zemel, and Ruslan Salakhutdinov. 2015. Siamese Neural Networks for One-shot Image Recognition. In Proceedings of the 32nd International Conference on Machine Learning (ICML). Lille."},{"key":"e_1_3_2_1_51_1","unstructured":"Hyungjoon Koo Soyeon Park Daejin Choi and Taesoo Kim. 2021. Semantic-aware Binary Code Representation with BERT. arXiv preprint arXiv:2106.05478(2021).  Hyungjoon Koo Soyeon Park Daejin Choi and Taesoo Kim. 2021. Semantic-aware Binary Code Representation with BERT. arXiv preprint arXiv:2106.05478(2021)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488018"},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the 8th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","author":"Kruegel Christopher","year":"2005","unstructured":"Christopher Kruegel , Engin Kirda , Darren Mutz , William Robertson , and Giovanni Vigna . 2005 . Polymorphic Worm Detection Using Structural Information of Executables . In Proceedings of the 8th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) . Seattle, Washington. Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, and Giovanni Vigna. 2005. Polymorphic Worm Detection Using Structural Information of Executables. In Proceedings of the 8th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Seattle, Washington."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 7th International Conference on Learning Representations (ICLR)","author":"Lan Zhenzhong","year":"2019","unstructured":"Zhenzhong Lan , Mingda Chen , Sebastian Goodman , Kevin Gimpel , Piyush Sharma , and Radu Soricut . 2019 . ALBERT: A Lite BERT for Self-supervised Learning of Language Representations . In Proceedings of the 7th International Conference on Learning Representations (ICLR) . New Orleans, LA. Zhenzhong Lan, Mingda Chen, Sebastian Goodman, Kevin Gimpel, Piyush Sharma, and Radu Soricut. 2019. ALBERT: A Lite BERT for Self-supervised Learning of Language Representations. In Proceedings of the 7th International Conference on Learning Representations (ICLR). New Orleans, LA."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513228.2513300"},{"key":"e_1_3_2_1_56_1","unstructured":"Xuezixiang Li Qu Yu and Heng Yin. 2021. Offical Implementation for PalmTree. https:\/\/github.com\/palmtreemodel\/PalmTree.  Xuezixiang Li Qu Yu and Heng Yin. 2021. Offical Implementation for PalmTree. https:\/\/github.com\/palmtreemodel\/PalmTree."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484587"},{"key":"e_1_3_2_1_58_1","unstructured":"LibTom. 2022. LibTomCrypt. https:\/\/www.libtom.net\/LibTomCrypt.  LibTom. 2022. LibTomCrypt. https:\/\/www.libtom.net\/LibTomCrypt."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421001"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_1_61_1","unstructured":"Yinhan Liu Myle Ott Naman Goyal Jingfei Du Mandar Joshi Danqi Chen Omer Levy Mike Lewis Luke Zettlemoyer and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. arXiv preprint arXiv:1907.11692(2019).  Yinhan Liu Myle Ott Naman Goyal Jingfei Du Mandar Joshi Danqi Chen Omer Levy Mike Lewis Luke Zettlemoyer and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. arXiv preprint arXiv:1907.11692(2019)."},{"key":"e_1_3_2_1_62_1","unstructured":"Ilya Loshchilov and Frank Hutter. 2017. Decoupled Weight Decay Regularization. arXiv preprint arXiv:1711.05101(2017).  Ilya Loshchilov and Frank Hutter. 2017. Decoupled Weight Decay Regularization. arXiv preprint arXiv:1711.05101(2017)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_1_64_1","first-page":"1","article-title":"Binary Code Similarity Detection through LSTM and Siamese Neural Network","volume":"8","author":"Luo Zhengping","year":"2021","unstructured":"Zhengping Luo , Tao Hou , Xiangrong Zhou , Hui Zeng , and Zhuo Lu . 2021 . Binary Code Similarity Detection through LSTM and Siamese Neural Network . EAI Endorsed Transactions on Security and Safety 8 , 29 (2021), 1 \u2013 10 . Zhengping Luo, Tao Hou, Xiangrong Zhou, Hui Zeng, and Zhuo Lu. 2021. Binary Code Similarity Detection through LSTM and Siamese Neural Network. EAI Endorsed Transactions on Security and Safety 8, 29 (2021), 1\u201310.","journal-title":"EAI Endorsed Transactions on Security and Safety"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_15"},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of the 15th International Conference on Information Security and Cryptology (ISISC)","author":"Ming Jiang","year":"2012","unstructured":"Jiang Ming , Meng Pan , and Debin Gao . 2012 . iBinHunt: Binary Hunting with Inter-procedural Control Flow . In Proceedings of the 15th International Conference on Information Security and Cryptology (ISISC) . Seoul. Jiang Ming, Meng Pan, and Debin Gao. 2012. iBinHunt: Binary Hunting with Inter-procedural Control Flow. In Proceedings of the 15th International Conference on Information Security and Cryptology (ISISC). Seoul."},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the 26th USENIX Security Symposium","author":"Ming Jiang","year":"2017","unstructured":"Jiang Ming , Dongpeng Xu , Yufei Jiang , and Dinghao Wu . 2017 . BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking . In Proceedings of the 26th USENIX Security Symposium . Vancouver, Canada. Jiang Ming, Dongpeng Xu, Yufei Jiang, and Dinghao Wu. 2017. BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. In Proceedings of the 26th USENIX Security Symposium. Vancouver, Canada."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCET49848.2020.9153977"},{"key":"e_1_3_2_1_69_1","unstructured":"Nginx. 2020. High Performance Load-balancer and Web Server. https:\/\/nginx.com.  Nginx. 2020. High Performance Load-balancer and Web Server. https:\/\/nginx.com."},{"key":"e_1_3_2_1_70_1","unstructured":"National Security\u00a0Agency (NSA). 2019. Software Reverse Engineering (SRE) Suite of Tools. https:\/\/ghidra-sre.org\/.  National Security\u00a0Agency (NSA). 2019. Software Reverse Engineering (SRE) Suite of Tools. https:\/\/ghidra-sre.org\/."},{"key":"e_1_3_2_1_71_1","unstructured":"OpenSSL. 2022. Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org.  OpenSSL. 2022. Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/3042817.3043083"},{"key":"e_1_3_2_1_73_1","volume-title":"TREX: Learning Execution Semantics from Micro-Traces for Binary Similarity. arXiv preprint arXiv:2012.08680(2020).","author":"Pei Kexin","year":"2020","unstructured":"Kexin Pei , Zhou Xuan , Junfeng Yang , Suman Jana , and Baishakhi Ray . 2020 . TREX: Learning Execution Semantics from Micro-Traces for Binary Similarity. arXiv preprint arXiv:2012.08680(2020). Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, and Baishakhi Ray. 2020. TREX: Learning Execution Semantics from Micro-Traces for Binary Similarity. arXiv preprint arXiv:2012.08680(2020)."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_75_1","unstructured":"PuTTygen. 2022. Download PuTTYgen - Putty key generator. https:\/\/www.puttygen.com.  PuTTygen. 2022. Download PuTTYgen - Putty key generator. https:\/\/www.puttygen.com."},{"key":"e_1_3_2_1_76_1","unstructured":"PyTorch. 2019. Open Source Machine Learning Framework. https:\/\/pytorch.org\/.  PyTorch. 2019. Open Source Machine Learning Framework. https:\/\/pytorch.org\/."},{"key":"e_1_3_2_1_77_1","unstructured":"Radare2. 2019. Libre and Portable Reverse Engineering Framework. https:\/\/rada.re\/n\/.  Radare2. 2019. Libre and Portable Reverse Engineering Framework. https:\/\/rada.re\/n\/."},{"key":"e_1_3_2_1_78_1","unstructured":"Alec Radford Karthik Narasimhan Tim Salimans and Ilya Sutskever. 2018. Improving Language Understanding by Generative Pre-Training. (2018). https:\/\/www.cs.ubc.ca\/\u00a0amuham01\/LING530\/papers\/radford2018improving.pdf.  Alec Radford Karthik Narasimhan Tim Salimans and Ilya Sutskever. 2018. Improving Language Understanding by Generative Pre-Training. (2018). https:\/\/www.cs.ubc.ca\/\u00a0amuham01\/LING530\/papers\/radford2018improving.pdf."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23057"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_6"},{"key":"e_1_3_2_1_82_1","unstructured":"SQLite. 2022. SQLite. https:\/\/www.sqlite.org.  SQLite. 2022. SQLite. https:\/\/www.sqlite.org."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.2307\/2371045"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3093926"},{"key":"e_1_3_2_1_85_1","first-page":"2579","article-title":"Visualizing Data using t-SNE","volume":"9","author":"Maaten Laurens Van\u00a0der","year":"2008","unstructured":"Laurens Van\u00a0der Maaten and Geoffrey Hinton . 2008 . Visualizing Data using t-SNE . Journal of machine learning research 9 , 11 (2008), 2579 \u2013 2605 . Laurens Van\u00a0der Maaten and Geoffrey Hinton. 2008. Visualizing Data using t-SNE. Journal of machine learning research 9, 11 (2008), 2579\u20132605.","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_86_1","volume-title":"Proceedings of the 30th Conference on Neural Information Processing Systems (NIPS)","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan\u00a0 N. Gomez , Lukasz Kaiser , and Illia Polosukhin . 2017 . Attention Is All You Need . In Proceedings of the 30th Conference on Neural Information Processing Systems (NIPS) . Long Beach, CA. Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention Is All You Need. In Proceedings of the 30th Conference on Neural Information Processing Systems (NIPS). Long Beach, CA."},{"key":"e_1_3_2_1_87_1","unstructured":"vsftpd. 2022. Probably the Most Secure and Fastest FTP server. https:\/\/security.appspot.com\/vsftpd.html.  vsftpd. 2022. Probably the Most Secure and Fastest FTP server. https:\/\/security.appspot.com\/vsftpd.html."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534367"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155606"},{"key":"e_1_3_2_1_90_1","unstructured":"Harald Welte. 2012. Current developments in GPL compliance. (2012). http:\/\/taipei.freedomhec.org\/dlfile\/gpl_compliance.pdf  Harald Welte. 2012. Current developments in GPL compliance. (2012). http:\/\/taipei.freedomhec.org\/dlfile\/gpl_compliance.pdf"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"crossref","unstructured":"Thomas Wolf Lysandre Debut Victor Sanh Julien Chaumond Clement Delangue Anthony Moi Pierric Cistac Tim Rault R\u00e9mi Louf Morgan Funtowicz Joe Davison Sam Shleifer Patrick von Platen Clara Ma Yacine Jernite Julien Plu Canwen Xu Teven\u00a0Le Scao Sylvain Gugger Mariama Drame Quentin Lhoest and Alexander\u00a0M. Rush. 2019. HuggingFace\u015b Transformers: State-of-the-art Natural Language Processing. arXiv preprint arXiv:1910.03771(2019).  Thomas Wolf Lysandre Debut Victor Sanh Julien Chaumond Clement Delangue Anthony Moi Pierric Cistac Tim Rault R\u00e9mi Louf Morgan Funtowicz Joe Davison Sam Shleifer Patrick von Platen Clara Ma Yacine Jernite Julien Plu Canwen Xu Teven\u00a0Le Scao Sylvain Gugger Mariama Drame Quentin Lhoest and Alexander\u00a0M. Rush. 2019. HuggingFace\u015b Transformers: State-of-the-art Natural Language Processing. arXiv preprint arXiv:1910.03771(2019).","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397361"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.49"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00036"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2020.23002"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5474"},{"key":"e_1_3_2_1_99_1","unstructured":"Zlib. 2022. A Massively Spiffy Yet Delicately Unobtrusive Compression Library. https:\/\/zlib.net.  Zlib. 2022. A Massively Spiffy Yet Delicately Unobtrusive Compression Library. https:\/\/zlib.net."},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23492"},{"key":"e_1_3_2_1_101_1","unstructured":"Zynamics. 2022. zynamics BinDiff. https:\/\/www.zynamics.com\/bindiff.html.  Zynamics. 2022. zynamics BinDiff. https:\/\/www.zynamics.com\/bindiff.html."}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3567975","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3567975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:12Z","timestamp":1750183752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3567975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":101,"alternative-id":["10.1145\/3564625.3567975","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3567975","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}