{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:57:26Z","timestamp":1770227846531,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["226-2022-00064"],"award-info":[{"award-number":["226-2022-00064"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62141222"],"award-info":[{"award-number":["62141222"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["NRF-NRFI08-2022-0002"],"award-info":[{"award-number":["NRF-NRFI08-2022-0002"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,12]]},"DOI":"10.1145\/3597503.3639231","type":"proceedings-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T16:43:26Z","timestamp":1712940206000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["PPT4J: Patch Presence Test for Java Binaries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6059-5191","authenticated-orcid":false,"given":"Zhiyuan","family":"Pan","sequence":"first","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0093-3292","authenticated-orcid":false,"given":"Xing","family":"Hu","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6302-3256","authenticated-orcid":false,"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"Software Engineering Application Technology Lab, Huawei, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9814-5977","authenticated-orcid":false,"given":"Xian","family":"Zhan","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-7201","authenticated-orcid":false,"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4111-4189","authenticated-orcid":false,"given":"Xiaohu","family":"Yang","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"d.]. Java Language and Virtual Machine Specifications. Retrieved","author":"Oracle","year":"2023","unstructured":"Oracle and\/or its affiliates. [n. d.]. Java Language and Virtual Machine Specifications. Retrieved July 1, 2023 from https:\/\/docs.oracle.com\/javase\/specs"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_1_3_1","volume-title":"ASM: A code manipulation tool to implement adaptable systems. Adaptable and extensible component systems","author":"Bruneton Eric","year":"2002","unstructured":"Eric Bruneton, Romain Lenglet, and Thierry Coupaye. 2002. ASM: A code manipulation tool to implement adaptable systems. Adaptable and extensible component systems (2002)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528482"},{"key":"e_1_3_2_1_5_1","volume-title":"d.]. BinDiff. Retrieved","author":"Company The Zynamics","year":"2023","unstructured":"The Zynamics Company. [n. d.]. BinDiff. Retrieved July 1, 2023 from https:\/\/www.zynamics.com\/bindiff.html"},{"key":"e_1_3_2_1_6_1","volume-title":"d.]. Common Vulnerabilities and Exposures. Retrieved","author":"The MITRE Corporation","year":"2023","unstructured":"The MITRE Corporation. [n. d.]. Common Vulnerabilities and Exposures. Retrieved July 1, 2023 from https:\/\/www.cve.org"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium. 1147--1164","author":"Dai Jiarun","year":"2020","unstructured":"Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, and Zhemin Yang. 2020. BScout: Direct whole patch presence test for java executables. In Proceedings of the 29th USENIX Conference on Security Symposium. 1147--1164."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594343"},{"key":"e_1_3_2_1_9_1","first-page":"58","article-title":"discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code","volume":"52","author":"Eschweiler Sebastian","year":"2016","unstructured":"Sebastian Eschweiler, Khaled Yakdan, Elmar Gerhards-Padilla, et al. 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code.. In Ndss, Vol. 52. 58--79.","journal-title":"Ndss"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_11_1","unstructured":"The Apache Software Foundation. 2023. Apache Ant. Retrieved July 1 2023 from https:\/\/ant.apache.org"},{"key":"e_1_3_2_1_12_1","volume-title":"Log4j - Apache Log4j(TM) 2. Retrieved","author":"Software Foundation The Apache","year":"2023","unstructured":"The Apache Software Foundation. 2023. Log4j - Apache Log4j(TM) 2. Retrieved July 1, 2023 from https:\/\/logging.apache.org\/log4j\/2.x"},{"key":"e_1_3_2_1_13_1","unstructured":"The Apache Software Foundation. 2023. Maven. Retrieved July 1 2023 from https:\/\/maven.apache.org"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93574"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052974"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3140868"},{"key":"e_1_3_2_1_18_1","volume-title":"d.]. Detailed Unified (Comparing and Merging Files). Retrieved","author":"Free Software Foundation Inc. [n.","year":"2023","unstructured":"Free Software Foundation Inc. [n. d.]. Detailed Unified (Comparing and Merging Files). Retrieved Oct 11, 2023 from https:\/\/www.gnu.org\/software\/diffutils\/manual\/html_node\/Detailed-Unified.html"},{"key":"e_1_3_2_1_19_1","volume-title":"Gradle Build Tool. Retrieved","author":"Gradle Inc. 2023.","year":"2023","unstructured":"Gradle Inc. 2023. Gradle Build Tool. Retrieved July 1, 2023 from https:\/\/gradle.org"},{"key":"e_1_3_2_1_20_1","volume-title":"d.]. ASM. Retrieved","author":"INRIA.","year":"2023","unstructured":"INRIA. [n. d.]. ASM. Retrieved July 1, 2023 from https:\/\/asm.ow2.io"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417240"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624046"},{"key":"e_1_3_2_1_23_1","volume-title":"Using ASM framework to implement common bytecode transformation patterns. Proc. of the 6th AOSD","author":"Kuleshov Eugene","year":"2007","unstructured":"Eugene Kuleshov. 2007. Using ASM framework to implement common bytecode transformation patterns. Proc. of the 6th AOSD, ACM Press (2007)."},{"key":"e_1_3_2_1_24_1","volume-title":"Information Security and Cryptology-ICISC 2012: 15th International Conference","author":"Ming Jiang","year":"2012","unstructured":"Jiang Ming, Meng Pan, and Debin Gao. 2013. iBinHunt: Binary hunting with inter-procedural control flow. In Information Security and Cryptology-ICISC 2012: 15th International Conference, Seoul, Korea, November 28--30, 2012, Revised Selected Papers 15. Springer, 92--109."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2007.10"},{"key":"e_1_3_2_1_26_1","volume-title":"d.]. National Vulnerability Database. Retrieved","author":"NIST.","year":"2023","unstructured":"NIST. [n. d.]. National Vulnerability Database. Retrieved July 1, 2023 from https:\/\/nvd.nist.gov"},{"key":"e_1_3_2_1_27_1","unstructured":"NVD. 2016. CVE-2016-8739. Retrieved July 1 2023 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-8739"},{"key":"e_1_3_2_1_28_1","unstructured":"NVD. 2017. CVE-2017-1000498. Retrieved July 1 2023 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-1000498"},{"key":"e_1_3_2_1_29_1","unstructured":"NVD. 2017. CVE-2017-18349. Retrieved July 1 2023 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-18349"},{"key":"e_1_3_2_1_30_1","unstructured":"NVD. 2018. CVE-2018-11797. Retrieved July 1 2023 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-11797"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"NVD. 2018. CVE-2018-1272. Retrieved July 1 2023 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-1272","DOI":"10.1149\/MA2018-02\/37\/1272"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"NVD. 2018. CVE-2018-17202. Retrieved July 1 2023 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-17202","DOI":"10.5465\/AMBPP.2018.17202abstract"},{"key":"e_1_3_2_1_33_1","unstructured":"NVD. 2021. CVE-2021-44228. Retrieved July 1 2023 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228"},{"key":"e_1_3_2_1_34_1","volume-title":"or its affiliates. [n. d.]. Spring Framework. Retrieved","author":"VMware Inc.","year":"2023","unstructured":"VMware Inc. or its affiliates. [n. d.]. Spring Framework. Retrieved July 1, 2023 from https:\/\/spring.io\/projects\/spring-framework"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2346"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_37_1","volume-title":"Browse cve vulnerabilities by date. Retrieved","year":"2023","unstructured":"SecurityScorecard. 2023. Browse cve vulnerabilities by date. Retrieved July 1, 2023 from https:\/\/www.cvedetails.com\/browse-by-date.php"},{"key":"e_1_3_2_1_38_1","volume-title":"d.]. IntelliJ IDEA - the Leading Java and Kotlin IDE. Retrieved","author":"JetBrains","year":"2023","unstructured":"JetBrains s.r.o. [n. d.]. IntelliJ IDEA - the Leading Java and Kotlin IDE. Retrieved July 1, 2023 from https:\/\/www.jetbrains.com\/idea"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.03.011"},{"key":"e_1_3_2_1_40_1","unstructured":"Wikipedia. 2023. Diff - Wikipedia. Retrieved July 1 2023 from https:\/\/en.wikipedia.org\/wiki\/Diff"},{"key":"e_1_3_2_1_41_1","volume-title":"Jaccard index - Wikipedia. Retrieved","year":"2023","unstructured":"Wikipedia. 2023. Jaccard index - Wikipedia. Retrieved July 1, 2023 from https:\/\/en.wikipedia.org\/wiki\/Jaccard_index"},{"key":"e_1_3_2_1_42_1","volume-title":"Syntactic sugar - Wikipedia. Retrieved","year":"2023","unstructured":"Wikipedia. 2023. Syntactic sugar - Wikipedia. Retrieved July 1, 2023 from https:\/\/en.wikipedia.org\/wiki\/Syntactic_sugar"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_44_1","volume-title":"Precise and Accurate Patch Presence Test for Binaries. In USENIX Security Symposium. 887--902","author":"Zhang Hang","year":"2018","unstructured":"Hang Zhang and Zhiyun Qian. 2018. Precise and Accurate Patch Presence Test for Binaries. In USENIX Security Symposium. 887--902."}],"event":{"name":"ICSE '24: IEEE\/ACM 46th International Conference on Software Engineering","location":"Lisbon Portugal","acronym":"ICSE '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"]},"container-title":["Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639231","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597503.3639231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:12Z","timestamp":1750287012000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639231"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,12]]},"references-count":44,"alternative-id":["10.1145\/3597503.3639231","10.1145\/3597503"],"URL":"https:\/\/doi.org\/10.1145\/3597503.3639231","relation":{},"subject":[],"published":{"date-parts":[[2024,4,12]]},"assertion":[{"value":"2024-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}