{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:04:18Z","timestamp":1775016258636,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2022YFB2703500"],"award-info":[{"award-number":["2022YFB2703500"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232014"],"award-info":[{"award-number":["62232014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272377"],"award-info":[{"award-number":["62272377"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62293501"],"award-info":[{"award-number":["62293501"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62293502"],"award-info":[{"award-number":["62293502"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72241433"],"award-info":[{"award-number":["72241433"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61721002"],"award-info":[{"award-number":["61721002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032010"],"award-info":[{"award-number":["62032010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002280"],"award-info":[{"award-number":["62002280"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-AFSG Research Fund"},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2020M683507"],"award-info":[{"award-number":["2020M683507"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2019TQ0251"],"award-info":[{"award-number":["2019TQ0251"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2020M673439"],"award-info":[{"award-number":["2020M673439"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Talent Fund of Association for Science and Technology in Shaanxi, China"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,12]]},"DOI":"10.1145\/3597503.3639080","type":"proceedings-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T16:43:26Z","timestamp":1712940206000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Cross-Inlining Binary Function Similarity Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6464-5428","authenticated-orcid":false,"given":"Ang","family":"Jia","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong University, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9327-0987","authenticated-orcid":false,"given":"Ming","family":"Fan","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5089-6018","authenticated-orcid":false,"given":"Xi","family":"Xu","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9137-4635","authenticated-orcid":false,"given":"Wuxia","family":"Jin","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3509-3919","authenticated-orcid":false,"given":"Haijun","family":"Wang","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7600-0934","authenticated-orcid":false,"given":"Ting","family":"Liu","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Shaanxi, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/news.sophos.com\/en-us\/2020\/04\/26\/asnarok\/. [Online","author":"SciTools Reveiws","year":"2021","unstructured":"2020. Reveiws 1 - SciTools. https:\/\/news.sophos.com\/en-us\/2020\/04\/26\/asnarok\/. [Online; accessed 3-September-2021]."},{"key":"e_1_3_2_1_2_1","volume-title":"Emotet? CERT Polska. https:\/\/cert.pl\/en\/posts\/2020\/02\/whats-up-emotet\/. [Online","year":"2021","unstructured":"2020. What's up, Emotet? CERT Polska. https:\/\/cert.pl\/en\/posts\/2020\/02\/whats-up-emotet\/. [Online; accessed 3-September-2021]."},{"key":"e_1_3_2_1_3_1","volume-title":"Gnulib - The GNU Portability Library. https:\/\/www.gnu.org\/software\/gnulib\/. [Online","year":"2022","unstructured":"2021. Gnulib - The GNU Portability Library. https:\/\/www.gnu.org\/software\/gnulib\/. [Online; accessed 23-April-2022]."},{"key":"e_1_3_2_1_4_1","volume-title":"IDA Pro Disassembler and Debugger - Hex Rays. https:\/\/www.hex-rays.com\/ida-pro\/. [Online","year":"2022","unstructured":"2021. IDA Pro Disassembler and Debugger - Hex Rays. https:\/\/www.hex-rays.com\/ida-pro\/. [Online; accessed 20-April-2022]."},{"key":"e_1_3_2_1_5_1","volume-title":"Inline expansion. https:\/\/en.wikipedia.org\/wiki\/Inline_expansion. [Online","year":"2022","unstructured":"2022. Inline expansion. https:\/\/en.wikipedia.org\/wiki\/Inline_expansion. [Online; accessed 23-April-2022]."},{"key":"e_1_3_2_1_6_1","volume-title":"Synopsys 2022 open source security and risk analysis report. https:\/\/www.synopsys.com\/software-integrity\/resources\/analyst-reports\/open-source-security-risk-analysis.html. [Online","year":"2023","unstructured":"2022. Synopsys 2022 open source security and risk analysis report. https:\/\/www.synopsys.com\/software-integrity\/resources\/analyst-reports\/open-source-security-risk-analysis.html. [Online; accessed 29-May-2023]."},{"key":"e_1_3_2_1_7_1","volume-title":"VDC Research White Paper | Finding Sources of Security in the Complex Software Supply Chains of Tomorrow. https:\/\/codesonar.grammatech.com\/wp-form-vdc-research-software-supply-chain. [Online","year":"2023","unstructured":"2022. VDC Research White Paper | Finding Sources of Security in the Complex Software Supply Chains of Tomorrow. https:\/\/codesonar.grammatech.com\/wp-form-vdc-research-software-supply-chain. [Online; accessed 29-May-2023]."},{"key":"e_1_3_2_1_8_1","volume-title":"Binutils - GNU Porject. https:\/\/www.gnu.org\/software\/binutils\/. [Online","year":"2023","unstructured":"2023. Binutils - GNU Porject. https:\/\/www.gnu.org\/software\/binutils\/. [Online; accessed 25-July-2023]."},{"key":"e_1_3_2_1_9_1","volume-title":"capstone-PyPI. https:\/\/pypi.org\/project\/capstone\/. [Online","year":"2022","unstructured":"2023. capstone-PyPI. https:\/\/pypi.org\/project\/capstone\/. [Online; accessed 13-July-2022]."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/github.com\/Cisco-Talos\/binary_function_similarity. [Online","year":"2022","unstructured":"2023. Cisco-Talos\/binary-function-similarity. https:\/\/github.com\/Cisco-Talos\/binary_function_similarity. [Online; accessed 13-July-2022]."},{"key":"e_1_3_2_1_11_1","volume-title":"Coreutils - GNU core utilities. https:\/\/www.gnu.org\/software\/coreutils\/. [Online","year":"2023","unstructured":"2023. Coreutils - GNU core utilities. https:\/\/www.gnu.org\/software\/coreutils\/. [Online; accessed 25-July-2023]."},{"key":"e_1_3_2_1_12_1","volume-title":"Gawk - GNU Project. https:\/\/www.gnu.org\/software\/gawk\/. [Online","year":"2023","unstructured":"2023. Gawk - GNU Project. https:\/\/www.gnu.org\/software\/gawk\/. [Online; accessed 25-July-2023]."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-3569. [Online","author":"NVD","year":"2023","unstructured":"2023. NVD - CVE-2014-3569. https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-3569. [Online; accessed 6-June-2023]."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-1792. [Online","author":"NVD","year":"2023","unstructured":"2023. NVD - CVE-2015-1792. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-1792. [Online; accessed 29-May-2023]."},{"key":"e_1_3_2_1_15_1","unstructured":"2023. OpenSSL. https:\/\/www.openssl.org\/."},{"key":"e_1_3_2_1_16_1","volume-title":"Source code and dataset. . https:\/\/github.com\/island255\/cross-inlining_binary_function_similarity. [Online","year":"2023","unstructured":"2023. Source code and dataset. . https:\/\/github.com\/island255\/cross-inlining_binary_function_similarity. [Online; accessed 21-July-2023]."},{"key":"e_1_3_2_1_17_1","volume-title":"tensorflow-PyPI. https:\/\/pypi.org\/project\/tensorflow\/. [Online","year":"2022","unstructured":"2023. tensorflow-PyPI. https:\/\/pypi.org\/project\/tensorflow\/. [Online; accessed 13-July-2022]."},{"key":"e_1_3_2_1_18_1","unstructured":"P\u00e4r Andersson. 2009. Evaluation of inlining heuristics in industrial strength compilers for embedded systems."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00085-7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78791-4_5"},{"key":"e_1_3_2_1_22_1","volume-title":"International conference on machine learning. PMLR, 2702--2711","author":"Dai Hanjun","year":"2016","unstructured":"Hanjun Dai, Bo Dai, and Le Song. 2016. Discriminative embeddings of latent variable models for structured data. In International conference on machine learning. PMLR, 2702--2711."},{"key":"e_1_3_2_1_23_1","volume-title":"Statistical similarity of binaries. Acm sigplan notices 51, 6","author":"David Yaniv","year":"2016","unstructured":"Yaniv David, Nimrod Partush, and Eran Yahav. 2016. Statistical similarity of binaries. Acm sigplan notices 51, 6 (2016), 266--280."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177157"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594343"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.121752"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/182409.182489"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939719"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134048"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"e_1_3_2_1_33_1","volume-title":"Partial Inlining Using Local Graph Rewriting. In 11th European Lisp Symposium.","author":"Durand Ir\u00e8ne A","year":"2018","unstructured":"Ir\u00e8ne A Durand and Robert Strandh. 2018. Partial Inlining Using Local Graph Rewriting. In 11th European Lisp Symposium."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Egele Manuel","year":"2014","unstructured":"Manuel Egele, Maverick Woo, Peter Chapman, and David Brumley. 2014. Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 303--317. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/egele"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667977"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00100"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.15"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110653"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446371"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985453"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.50"},{"key":"e_1_3_2_1_45_1","unstructured":"Jan Hubicka. 2004. The GCC call graph module: a framework for inter-procedural optimization."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/73141.74840"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 22th USENIX Security Symposium","author":"Jang Jiyong","year":"2013","unstructured":"Jiyong Jang, Maverick Woo, and David Brumley. 2013. Towards Automatic Software Lineage Inference. In Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14--16, 2013, Samuel T. King (Ed.). USENIX Association, 81--96. https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/papers\/jang"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Ang Jia Ming Fan Wuxia Jin Xi Xu Zhaohui Zhou Qiyi Tang Sen Nie Shi Wu and Ting Liu. [n. d.]. 1-to-1 or 1-to-n? Investigating the effect of function inlining on binary similarity analysis. ACM Transactions on Software Engineering and Methodology ([n. d.]).","DOI":"10.1145\/3561385"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3561385"},{"key":"e_1_3_2_1_50_1","volume-title":"Comparing One with Many-Solving Binary2source Function Matching Under Function Inlining. arXiv preprint arXiv:2210.15159","author":"Jia Ang","year":"2022","unstructured":"Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Qiyi Tang, Sen Nie, Shi Wu, and Ting Liu. 2022. Comparing One with Many-Solving Binary2source Function Matching Under Function Inlining. arXiv preprint arXiv:2210.15159 (2022)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417240"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115647"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.22667\/JISIS.2014.11.31.025"},{"key":"e_1_3_2_1_54_1","volume-title":"Sooel Son, and Yongdae Kim.","author":"Kim Dongkwan","year":"2020","unstructured":"Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, and Yongdae Kim. 2020. Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned. (2020). arXiv:2011.10749 [cs.SE]"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1941-2"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9521-5"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9--15","volume":"3845","author":"Li Yujia","year":"2019","unstructured":"Yujia Li, Chenjie Gu, Thomas Dullien, Oriol Vinyals, and Pushmeet Kohli. 2019. Graph Matching Networks for Learning the Similarity of Graph Structured Objects. In Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9--15 June 2019, Long Beach, California, USA (Proceedings of Machine Learning Research, Vol. 97), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR, 3835--3845. http:\/\/proceedings.mlr.press\/v97\/li19d.html"},{"key":"e_1_3_2_1_58_1","volume-title":"Mo Yu, Bing Xiang, Bowen Zhou, and Yoshua Bengio.","author":"Lin Zhouhan","year":"2017","unstructured":"Zhouhan Lin, Minwei Feng, Cicero Nogueira dos Santos, Mo Yu, Bing Xiang, Bowen Zhou, and Yoshua Bengio. 2017. A structured self-attentive sentence embedding. arXiv preprint arXiv:1703.03130 (2017)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421001"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544902.3546240"},{"key":"e_1_3_2_1_62_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Marcelli Andrea","year":"2022","unstructured":"Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, and Davide Balzarotti. 2022. How machine learning is solving the binary function similarity problem. In 31st USENIX Security Symposium (USENIX Security 22). 2099--2116."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_15"},{"key":"e_1_3_2_1_64_1","volume-title":"AAAI-98 workshop on learning for text categorization","volume":"752","author":"McCallum Andrew","year":"1998","unstructured":"Andrew McCallum, Kamal Nigam, et al. 1998. A comparison of event models for naive bayes text classification. In AAAI-98 workshop on learning for text categorization, Vol. 752. Madison, WI, 41--48."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_8"},{"key":"e_1_3_2_1_66_1","volume-title":"26th USENIX Security Symposium, USENIX Security 2017","author":"Ming Jiang","year":"2017","unstructured":"Jiang Ming, Dongpeng Xu, Yufei Jiang, and Dinghao Wu. 2017. BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16--18, 2017, Engin Kirda and Thomas Ristenpart (Eds.). USENIX Association, 253--270. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/ming"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18467-8_28"},{"key":"e_1_3_2_1_68_1","volume-title":"BinPro: A Tool for Binary Source Code Provenance. CoRR abs\/1711.00830","author":"Miyani Dhaval","year":"2017","unstructured":"Dhaval Miyani, Zhen Huang, and David Lie. 2017. BinPro: A Tool for Binary Source Code Provenance. CoRR abs\/1711.00830 (2017). arXiv:1711.00830 http:\/\/arxiv.org\/abs\/1711.00830"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00012"},{"key":"e_1_3_2_1_70_1","volume-title":"Trex: Learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680","author":"Pei Kexin","year":"2020","unstructured":"Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, and Baishakhi Ray. 2020. Trex: Learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680 (2020)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_14"},{"key":"e_1_3_2_1_72_1","volume-title":"A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis. arXiv preprint arXiv:1812.09652","author":"Redmond Kimberly","year":"2018","unstructured":"Kimberly Redmond, Lannan Luo, and Qiang Zeng. 2018. A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis. arXiv preprint arXiv:1812.09652 (2018)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454035"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.03.011"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115645"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00084"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397361"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2827379"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"e_1_3_2_1_81_1","volume-title":"CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching. In Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020","author":"Yu Zeping","year":"2020","unstructured":"Zeping Yu, Wenxin Zheng, Jiaqi Wang, Qiyi Tang, Sen Nie, and Shi Wu. 2020. CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching. In Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6--12, 2020, virtual."},{"key":"e_1_3_2_1_82_1","volume-title":"Precise and Accurate Patch Presence Test for Binaries. In 27th USENIX Security Symposium, USENIX Security 2018","author":"Zhang Hang","year":"2018","unstructured":"Hang Zhang and Zhiyun Qian. 2018. Precise and Accurate Patch Presence Test for Binaries. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15--17, 2018. USENIX Association, 887--902."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24644-2_26"},{"key":"e_1_3_2_1_84_1","volume-title":"Neural machine translation inspired binary code similarity comparison beyond function pairs. arXiv preprint arXiv:1808.04706","author":"Zuo Fei","year":"2018","unstructured":"Fei Zuo, Xiaopeng Li, Patrick Young, Lannan Luo, Qiang Zeng, and Zhexin Zhang. 2018. Neural machine translation inspired binary code similarity comparison beyond function pairs. arXiv preprint arXiv:1808.04706 (2018)."}],"event":{"name":"ICSE '24: IEEE\/ACM 46th International Conference on Software Engineering","location":"Lisbon Portugal","acronym":"ICSE '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"]},"container-title":["Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597503.3639080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:11Z","timestamp":1750286951000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,12]]},"references-count":83,"alternative-id":["10.1145\/3597503.3639080","10.1145\/3597503"],"URL":"https:\/\/doi.org\/10.1145\/3597503.3639080","relation":{},"subject":[],"published":{"date-parts":[[2024,4,12]]},"assertion":[{"value":"2024-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}