{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:43:00Z","timestamp":1769913780229,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3582818","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"443-456","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8284-4458","authenticated-orcid":false,"given":"Abdullah","family":"Qasem","sequence":"first","affiliation":[{"name":"Security Research Centre, Concordia University, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3015-3043","authenticated-orcid":false,"given":"Mourad","family":"Debbabi","sequence":"additional","affiliation":[{"name":"Security Research Centre, Concordia University, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8287-2587","authenticated-orcid":false,"given":"Bernard","family":"Lebel","sequence":"additional","affiliation":[{"name":"Thales Canada, Thales Research &amp; Technologies, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3007-2350","authenticated-orcid":false,"given":"Marthe","family":"Kassouf","sequence":"additional","affiliation":[{"name":"Hydro-Qu\u00e9bec Research Institute, Hydro-Qu\u00e9bec, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3486860"},{"key":"e_1_3_2_1_2_1","volume-title":"Neural Networks for Pattern Recognition","author":"M Bishop","unstructured":"Christopher\u00a0 M Bishop 1995. Neural Networks for Pattern Recognition . Oxford University Press . Christopher\u00a0M Bishop 1995. Neural Networks for Pattern Recognition. Oxford University Press."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Sebastian Eschweiler Khaled Yakdan and Elmar Gerhards-Padilla. 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code.. In NDSS.  Sebastian Eschweiler Khaled Yakdan and Elmar Gerhards-Padilla. 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code.. In NDSS.","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_6_1","unstructured":"FLIRT. 2020. FLIRT @ONLINE. https:\/\/hex-rays.com\/products\/ida\/tech\/flirt\/.  FLIRT. 2020. FLIRT @ONLINE. https:\/\/hex-rays.com\/products\/ida\/tech\/flirt\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2918326"},{"key":"e_1_3_2_1_8_1","unstructured":"idapro. 2020. idapro @ONLINE. https:\/\/www.hex-rays.com\/products\/ida\/index.shtml.  idapro. 2020. idapro @ONLINE. https:\/\/www.hex-rays.com\/products\/ida\/index.shtml."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3187689"},{"key":"e_1_3_2_1_12_1","volume-title":"Kingma and Jimmy Ba","author":"P.","year":"2015","unstructured":"Diederik\u00a0 P. Kingma and Jimmy Ba . 2015 . Adam : A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds .). http:\/\/arxiv.org\/abs\/1412.6980 Diederik\u00a0P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_1_13_1","volume-title":"International conference on machine learning. PMLR, 3835\u20133845","author":"Li Yujia","year":"2019","unstructured":"Yujia Li , Chenjie Gu , Thomas Dullien , Oriol Vinyals , and Pushmeet Kohli . 2019 . Graph matching networks for learning the similarity of graph structured objects . In International conference on machine learning. PMLR, 3835\u20133845 . Yujia Li, Chenjie Gu, Thomas Dullien, Oriol Vinyals, and Pushmeet Kohli. 2019. Graph matching networks for learning the similarity of graph structured objects. In International conference on machine learning. PMLR, 3835\u20133845."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_1_15_1","volume-title":"Evaluation in Information Retrieval","author":"Manning D.","year":"1809","unstructured":"Christopher\u00a0 D. Manning , Prabhakar Raghavan , and Hinrich Sch\u00fctze . 2008. Evaluation in Information Retrieval . Cambridge University Press , 139\u2013161. https:\/\/doi.org\/10.1017\/CBO978051 1809 071.009 10.1017\/CBO9780511809071.009 Christopher\u00a0D. Manning, Prabhakar Raghavan, and Hinrich Sch\u00fctze. 2008. Evaluation in Information Retrieval. Cambridge University Press, 139\u2013161. https:\/\/doi.org\/10.1017\/CBO9780511809071.009"},{"key":"e_1_3_2_1_16_1","unstructured":"Andrea Marcelli Mariano Graziano Xabier Ugarte-Pedrero Yanick Fratantonio Mohamad Mansouri and Davide Balzarotti. [n. d.]. How Machine Learning Is Solving the Binary Function Similarity Problem. ([n. d.]).  Andrea Marcelli Mariano Graziano Xabier Ugarte-Pedrero Yanick Fratantonio Mohamad Mansouri and Davide Balzarotti. [n. d.]. How Machine Learning Is Solving the Binary Function Similarity Problem. ([n. d.])."},{"key":"e_1_3_2_1_17_1","volume-title":"How Machine Learning Is Solving the Binary Function Similarity Problem. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Marcelli Andrea","year":"2022","unstructured":"Andrea Marcelli , Mariano Graziano , Xabier Ugarte-Pedrero , Yanick Fratantonio , Mohamad Mansouri , and Davide Balzarotti . 2022 . How Machine Learning Is Solving the Binary Function Similarity Problem. In 31st USENIX Security Symposium (USENIX Security 22) . 2099\u20132116. Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, and Davide Balzarotti. 2022. How Machine Learning Is Solving the Binary Function Similarity Problem. In 31st USENIX Security Symposium (USENIX Security 22). 2099\u20132116."},{"key":"e_1_3_2_1_18_1","volume-title":"DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings(Lecture Notes in Computer Science, Vol.\u00a011543)","author":"Massarelli Luca","year":"2019","unstructured":"Luca Massarelli , Giuseppe Antonio\u00a0Di Luna , Fabio Petroni , Roberto Baldoni , and Leonardo Querzoni . 2019 . SAFE: Self-Attentive Function Embeddings for Binary Similarity. In Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference , DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings(Lecture Notes in Computer Science, Vol.\u00a011543) , Roberto Perdisci, Cl\u00e9mentine Maurice, Giorgio Giacinto, and Magnus Almgren (Eds.). Springer, 309\u2013329. https:\/\/doi.org\/10.1007\/978-3-030-2 2038-9_15 10.1007\/978-3-030-22038-9_15 Luca Massarelli, Giuseppe Antonio\u00a0Di Luna, Fabio Petroni, Roberto Baldoni, and Leonardo Querzoni. 2019. SAFE: Self-Attentive Function Embeddings for Binary Similarity. In Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings(Lecture Notes in Computer Science, Vol.\u00a011543), Roberto Perdisci, Cl\u00e9mentine Maurice, Giorgio Giacinto, and Magnus Almgren (Eds.). Springer, 309\u2013329. https:\/\/doi.org\/10.1007\/978-3-030-22038-9_15"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Nicholas Nethercote and Julian Seward. 2007. Valgrind: a framework for heavyweight dynamic binary instrumentation. In ACM Sigplan notices Vol.\u00a042. ACM 89\u2013100.  Nicholas Nethercote and Julian Seward. 2007. Valgrind: a framework for heavyweight dynamic binary instrumentation. In ACM Sigplan notices Vol.\u00a042. ACM 89\u2013100.","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_1_20_1","unstructured":"Andrew\u00a0Y Ng Michael\u00a0I Jordan and Yair Weiss. 2002. On spectral clustering: Analysis and an algorithm. In Advances in neural information processing systems. 849\u2013856.  Andrew\u00a0Y Ng Michael\u00a0I Jordan and Yair Weiss. 2002. On spectral clustering: Analysis and an algorithm. In Advances in neural information processing systems. 849\u2013856."},{"key":"e_1_3_2_1_21_1","volume-title":"Trex: Learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680","author":"Pei Kexin","year":"2020","unstructured":"Kexin Pei , Zhou Xuan , Junfeng Yang , Suman Jana , and Baishakhi Ray . 2020 . Trex: Learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680 (2020). Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, and Baishakhi Ray. 2020. Trex: Learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680 (2020)."},{"key":"e_1_3_2_1_22_1","unstructured":"Federico Scrinzi. 2015. Behavioral Analysis of Obfuscated Code. http:\/\/essay.utwente.nl\/67522\/  Federico Scrinzi. 2015. Behavioral Analysis of Obfuscated Code. http:\/\/essay.utwente.nl\/67522\/"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264820.3264821"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_25_1","unstructured":"tigress. 2020. tigress @ONLINE. https:\/\/tigress.wtf\/.  tigress. 2020. tigress @ONLINE. https:\/\/tigress.wtf\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534367"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"e_1_3_2_1_29_1","first-page":"3872","article-title":"Codecmr: Cross-modal retrieval for function-level binary source code matching","volume":"33","author":"Yu Zeping","year":"2020","unstructured":"Zeping Yu , Wenxin Zheng , Jiaqi Wang , Qiyi Tang , Sen Nie , and Shi Wu . 2020 . Codecmr: Cross-modal retrieval for function-level binary source code matching . Advances in Neural Information Processing Systems 33 (2020), 3872 \u2013 3883 . Zeping Yu, Wenxin Zheng, Jiaqi Wang, Qiyi Tang, Sen Nie, and Shi Wu. 2020. Codecmr: Cross-modal retrieval for function-level binary source code matching. Advances in Neural Information Processing Systems 33 (2020), 3872\u20133883.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23492"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582818","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:27Z","timestamp":1750182687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":30,"alternative-id":["10.1145\/3579856.3582818","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3582818","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}