{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T19:12:23Z","timestamp":1768677143796,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ANR","award":["ANR-22-PECY-0007"],"award-info":[{"award-number":["ANR-22-PECY-0007"]}]},{"name":"EU Horizon 2020","award":["830927"],"award-info":[{"award-number":["830927"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616279","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"808-820","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Scalable Program Clone Search through Spectral Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5203-6124","authenticated-orcid":false,"given":"Tristan","family":"Benoit","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Lorraine, Nancy, France \/ CNRS, Nancy, France \/ LORIA, Nancy, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8262-3887","authenticated-orcid":false,"given":"Jean-Yves","family":"Marion","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Lorraine, Nancy, France \/ CNRS, Nancy, France \/ LORIA, Nancy, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6509-3506","authenticated-orcid":false,"given":"S\u00e9bastien","family":"Bardin","sequence":"additional","affiliation":[{"name":"CEA LIST, Saclay, France \/ Universit\u00e9 Paris-Saclay, Saclay, France"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","unstructured":"Hadj Ahmed Bay Ahmed Abdel-Ouahab Boudraa and Delphine Dare-Emzivat. 2019. A Joint Spectral Similarity Measure for Graphs Classification. Pattern Recognition Letters https:\/\/doi.org\/10.1016\/j.patrec.2018.12.014 10.1016\/j.patrec.2018.12.014","DOI":"10.1016\/j.patrec.2018.12.014"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","unstructured":"Jinrong Bai Qibin Shi and Shiguang Mu. 2019. A Malware and Variant Detection Method Using Function Call Graph Isomorphism. Security and Communication Networks https:\/\/doi.org\/10.1155\/2019\/1043794 10.1155\/2019\/1043794","DOI":"10.1155\/2019"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290967"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991114"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","unstructured":"Tristan Benoit. 2023. Artifacts - Scalable Program Clone Search through Spectral Analysis. https:\/\/doi.org\/10.5281\/zenodo.8289599 10.5281\/zenodo.8289599","DOI":"10.5281\/zenodo.8289599"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_8"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_2_13_1","volume-title":"Obfuscation-Resilient Executable Payload Extraction From Packed Malware. In USENIX Security Symposium.","author":"Cheng Binlin","year":"2021","unstructured":"Binlin Cheng, Jiang Ming, Erika A Leal, Haotian Zhang, Jianming Fu, Guojun Peng, and Jean-Yves Marion. 2021. Obfuscation-Resilient Executable Payload Extraction From Packed Malware. In USENIX Security Symposium."},{"key":"e_1_3_2_2_14_1","volume-title":"Spectral graph theory","author":"Chung Fan","unstructured":"Fan Chung. 1997. Spectral graph theory. American Mathematical Society."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50901-3_17"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3177157"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594343"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","unstructured":"Prasad Deshpande and Mark Stamp. 2016. Metamorphic Malware Detection Using Function Call Graph Analysis. MIS Review https:\/\/doi.org\/10.31979\/etd.t9xm-ahsc 10.31979\/etd.t9xm-ahsc","DOI":"10.31979\/etd.t9xm-ahsc"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134048"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"e_1_3_2_2_22_1","volume-title":"Structural Comparison of Executable Objects. Workshop on Detection of Intrusions and Malware & Vulnerability Assessment.","author":"Dullien Thomas","year":"2004","unstructured":"Thomas Dullien. 2004. Structural Comparison of Executable Objects. Workshop on Detection of Intrusions and Malware & Vulnerability Assessment."},{"key":"e_1_3_2_2_23_1","unstructured":"Thomas Dullien and Rolf Rolles. 2005. Graph-based comparison of Executable Objects. SSTIC."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","unstructured":"Sebastian Eschweiler Khaled Yakdan and Elmar Gerhards-Padilla. 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code. In NDSS. https:\/\/doi.org\/10.14722\/NDSS.2016.23185 10.14722\/NDSS.2016.23185","DOI":"10.14722\/NDSS.2016.23185"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2999611.2999636"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2953752"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","unstructured":"Xinbo Gao Bing Xiao Dacheng Tao and Xuelong Li. 2010. A survey of graph edit distance. Pattern Analysis and Applications https:\/\/doi.org\/10.1007\/s10044-008-0141-y 10.1007\/s10044-008-0141-y","DOI":"10.1007\/s10044-008-0141-y"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3524938.3525302"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","unstructured":"Irfan Ul Haq and Juan Caballero. 2021. A Survey of Binary Code Similarity. ACM Computing Surveys (CSUR) https:\/\/doi.org\/10.1145\/3446371 10.1145\/3446371","DOI":"10.1145\/3446371"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985453"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2535461.2535485"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.22"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3215628"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534774"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","unstructured":"Irena Jovanovi\u0107 and Zoran Stani\u0107. 2012. Spectral distances of graphs. Linear Algebra Appl. https:\/\/doi.org\/10.1016\/j.laa.2011.08.019 10.1016\/j.laa.2011.08.019","DOI":"10.1016\/j.laa.2011.08.019"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2401603.2401672"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624046"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3187689"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982509"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3157096.3157278"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_11"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430558"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513228.2513300"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","unstructured":"R. B. Lehoucq D. C. Sorensen and C. Yang. 1998. ARPACK Users\u2019 Guide. Society for Industrial and Applied Mathematics. https:\/\/doi.org\/10.1137\/1.9780898719628 10.1137\/1.9780898719628","DOI":"10.1137\/1.9780898719628"},{"key":"e_1_3_2_2_50_1","volume-title":"36th International conference on machine learning.","author":"Li Yujia","year":"2019","unstructured":"Yujia Li, Chenjie Gu, Thomas Dullien, Oriol Vinyals, and Pushmeet Kohli. 2019. Graph matching networks for learning the similarity of graph structured objects. In 36th International conference on machine learning."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421001"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2655046"},{"key":"e_1_3_2_2_54_1","volume-title":"How Machine Learning Is Solving the Binary Function Similarity Problem. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Marcelli Andrea","year":"2022","unstructured":"Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, and Yanick Fratantonio. 2022. How Machine Learning Is Solving the Binary Function Similarity Problem. In 31st USENIX Security Symposium (USENIX Security 22)."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051852"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241211"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","unstructured":"Jiang Ming Dongpeng Xu and Dinghao Wu. 2015. Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference. In IFIP Advances in Information and Communication Technology. https:\/\/doi.org\/10.1007\/978-3-319-18467-8_28 10.1007\/978-3-319-18467-8_28","DOI":"10.1007\/978-3-319-18467-8_28"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.83"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/3304889.3305021"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","unstructured":"Irving Ojalvo and Miya Newman. 1970. Vibration modes of large structures by an automatic matrix-reduction method. Aiaa Journal - AIAA J https:\/\/doi.org\/10.2514\/3.5878 10.2514\/3.5878","DOI":"10.2514\/3.5878"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359812"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00012"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664269"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","unstructured":"Pau Riba Andreas Fischer Josep Llad\u00f3s and Alicia Forn\u00e9s. 2021. Learning graph edit distance by graph neural networks. Pattern Recognition https:\/\/doi.org\/10.1016\/j.patcog.2021.108132 10.1016\/j.patcog.2021.108132","DOI":"10.1016\/j.patcog.2021.108132"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1983.6313167"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11747-3_3"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","unstructured":"Francesc Serratosa. 2014. Fast computation of Bipartite graph matching. Pattern Recognition Letters https:\/\/doi.org\/10.1016\/j.patrec.2014.04.015 10.1016\/j.patrec.2014.04.015","DOI":"10.1016\/j.patrec.2014.04.015"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054845"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528442"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005560"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.03.011"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-012-0175-y"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.49"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421003"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3056139"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616279","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:03Z","timestamp":1750178163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":77,"alternative-id":["10.1145\/3611643.3616279","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616279","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}