{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T08:24:05Z","timestamp":1774167845004,"version":"3.50.1"},"reference-count":100,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2024,5,31]]},"abstract":"<jats:p>Binary code similarity analysis is extremely useful, since it provides rich information about an unknown binary, such as revealing its functionality and identifying reused libraries. Robust binary similarity analysis is challenging, as heavy compiler optimizations can make semantically similar binaries have gigantic syntactic differences. Unfortunately, existing semantic-based methods still suffer from either incomplete coverage or low accuracy.<\/jats:p>\n          <jats:p>\n            In this article, we propose\n            <jats:sc>ARCTURUS<\/jats:sc>\n            , a new technique that can achieve high code coverage and high accuracy simultaneously by manipulating program execution under the guidance of code reachability. Our key insight is that the compiler must preserve program semantics\u00a0(e.g., dependences between code fragments) during compilation; therefore, the code reachability, which implies the interdependence between code, is invariant across code transformations. Based on the above insight, our key idea is to leverage the stability of code reachability to manipulate the program execution such that deep code logic can also be covered in a consistent way. Experimental results show that\n            <jats:sc>ARCTURUS<\/jats:sc>\n            achieves an average precision of 87.8% with 100% block coverage, outperforming compared methods by 38.4%, on average.\n            <jats:sc>ARCTURUS<\/jats:sc>\n            takes only 0.15 second to process one function, on average, indicating that it is efficient for practical use.\n          <\/jats:p>","DOI":"10.1145\/3640337","type":"journal-article","created":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T12:26:34Z","timestamp":1704975994000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["<scp>ARCTURUS<\/scp>\n            : Full Coverage Binary Similarity Analysis with Reachability-guided Emulation"],"prefix":"10.1145","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8719-1070","authenticated-orcid":false,"given":"Anshunkang","family":"Zhou","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2035-7176","authenticated-orcid":false,"given":"Yikun","family":"Hu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6619-781X","authenticated-orcid":false,"given":"Xiangzhe","family":"Xu","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6417-1034","authenticated-orcid":false,"given":"Charles","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,18]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"VMPSofe. 2017. VMPROTECT SOFTWARE. [Online]. Available: http:\/\/vmpsoft.com\/"},{"key":"e_1_3_2_3_2","unstructured":"GrammaTech. 2019. Binary Software Composition Analysis. [Online]. Available: https:\/\/www.verifysoft.com\/en_grammatech_codesentry.html\/"},{"key":"e_1_3_2_4_2","unstructured":"Zynamics. 2020. BinDiff. [Online]. Available: https:\/\/www.zynamics.com\/bindiff\/manual\/index.html"},{"key":"e_1_3_2_5_2","unstructured":"2020. BinTuner. Retrieved from https:\/\/github.com\/BinTuner\/Dev"},{"key":"e_1_3_2_6_2","unstructured":"Chris Lattner. 2008. LLVM and Clang: Next generation compiler technology. The BSD Conference 5 (2008) 1\u201320."},{"key":"e_1_3_2_7_2","unstructured":"2020. The Kam1n0 Assembly Analysis Platform. Retrieved from https:\/\/github.com\/McGill-DMaS\/Kam1n0-Community"},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Pascal Junod Julien Rinaldini Johan Wehrli and Julie Michielin. 2015. Obfuscator-LLVM\u2013software protection for the masses. IEEE\/ACM 1st International Workshop on Software Protection IEEE 3\u20139.","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_2_9_2","unstructured":"2021. SAFEtorch. Retrieved from https:\/\/github.com\/facebookresearch\/SAFEtorch"},{"key":"e_1_3_2_10_2","unstructured":"2022. jTrans. Retrieved from https:\/\/github.com\/vul337\/jTrans"},{"key":"e_1_3_2_11_2","volume-title":"Compilers: Principles, Techniques, & Tools","author":"Aho Alfred V.","year":"2007","unstructured":"Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman. 2007. Compilers: Principles, Techniques, & Tools. Pearson Education India."},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319647.3325833"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241140"},{"key":"e_1_3_2_14_2","first-page":"8","volume-title":"Proceedings of the Annual Network and Distributed System Security Symposium (NDSS\u201909)","author":"Bayer Ulrich","year":"2009","unstructured":"Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, and Engin Kirda. 2009. Scalable, behavior-based malware clustering. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS\u201909). Citeseer, 8\u201311."},{"key":"e_1_3_2_15_2","first-page":"1","volume-title":"Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop","author":"Bourquin Martial","year":"2013","unstructured":"Martial Bourquin, Andy King, and Edward Robbins. 2013. BinSlayer: Accurate comparison of binary executables. In Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop. 1\u201310."},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.17"},{"key":"e_1_3_2_17_2","unstructured":"Nguyen Anh Quynh. 2020. Capstone. The Ultimate Disassembler. [Online]. Available: https:\/\/www.capstone-engine.org\/"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385964"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908126"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177157"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594343"},{"key":"e_1_3_2_24_2","volume-title":"An Aggressive Approach to Loop Unrolling","author":"Davidson Jack W.","year":"1995","unstructured":"Jack W. Davidson and Sanjay Jinturkar. 1995. An Aggressive Approach to Loop Unrolling. Technical Report. Citeseer."},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Rocco De Nicola. 2011. Behavioral equivalences. Encyclopedia of Parallel Computing Springer 120\u2013127.","DOI":"10.1007\/978-0-387-09766-4_517"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813675"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"e_1_3_2_29_2","volume-title":"Proceedings of the 23rd USENIX Security Symposium (SEC\u201914)","author":"Egele Manuel","year":"2014","unstructured":"Manuel Egele, Maverick Woo, Peter Chapman, and David Brumley. 2014. Blanket execution: Dynamic similarity testing for program binaries and components. In Proceedings of the 23rd USENIX Security Symposium (SEC\u201914). USENIX Association."},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_31_2","volume-title":"Proceedings of the ACM on Asia Conference on Computer and Communications Security (AsiaCCS\u201917)","author":"Feng Qian","year":"2017","unstructured":"Qian Feng, Minghua Wang, Mu Zhang, Rundong Zhou, Andrew Henderson, and Heng Yin. 2017. Extracting conditional formulas for cross-platform bug search. In Proceedings of the ACM on Asia Conference on Computer and Communications Security (AsiaCCS\u201917). ACM."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_33_2","first-page":"679","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201918)","author":"Gan Shuitao","year":"2018","unstructured":"Shuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, and Zuoning Chen. 2018. CollAFL: Path sensitive fuzzing. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201918). IEEE, 679\u2013696."},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"e_1_3_2_35_2","first-page":"896","volume-title":"Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201918)","author":"Gao Jian","year":"2018","unstructured":"Jian Gao, Xin Yang, Ying Fu, Yu Jiang, and Jiaguang Sun. 2018. VulSeeker: A semantic learning based vulnerability seeker for cross-platform binary. In Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201918). IEEE, 896\u2013899."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568273"},{"key":"e_1_3_2_37_2","unstructured":"David Molnar P. Godefroid and M. Y. Levin. 2008. Automated whitebox fuzz testing. NDSS Vol. 8 151\u2013166."},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3446371"},{"key":"e_1_3_2_39_2","first-page":"704","volume-title":"Proceedings of the International Conference on Security and Privacy in Communication Systems","author":"Hu Xunchao","year":"2017","unstructured":"Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, and Heng Yin. 2017. JSForce: A forced execution engine for malicious JavaScript detection. In Proceedings of the International Conference on Security and Privacy in Communication Systems. Springer, 704\u2013720."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.50"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.22"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00019"},{"key":"e_1_3_2_43_2","first-page":"81","volume-title":"Proceedings of the 22nd USENIX Security Symposium (USENIX Security\u201913)","author":"Jang Jiyong","year":"2013","unstructured":"Jiyong Jang, Maverick Woo, and David Brumley. 2013. Towards automatic software lineage inference. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security\u201913). 81\u201396."},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_15"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598143"},{"key":"e_1_3_2_46_2","first-page":"1149","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Jiang Zheyue","year":"2020","unstructured":"Zheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, and Zhemin Yang. 2020. PDiff: Semantic-based patch presence testing for downstream kernels. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 1149\u20131163."},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/321765.321768"},{"key":"e_1_3_2_48_2","first-page":"188","volume-title":"Proceedings of the IEEE 7th International Conference on Software Security and Reliability Companion","author":"Johnson Ryan","year":"2013","unstructured":"Ryan Johnson and Angelos Stavrou. 2013. Forced-path execution for android applications on x86 platforms. In Proceedings of the IEEE 7th International Conference on Software Security and Reliability Companion. IEEE, 188\u2013197."},{"key":"e_1_3_2_49_2","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS\u201921)","author":"Jung Jinho","year":"2021","unstructured":"Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, and Taesoo Kim. 2021. Winnie: Fuzzing windows applications with harness synthesis and fast cloning. In Proceedings of the Network and Distributed System Security Symposium (NDSS\u201921)."},{"key":"e_1_3_2_50_2","article-title":"Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned","author":"Kim Dongkwan","year":"2020","unstructured":"Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, and Yongdae Kim. 2020. Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned. arXiv preprint arXiv:2011.10749 (2020).","journal-title":"arXiv preprint arXiv:2011.10749"},{"key":"e_1_3_2_51_2","first-page":"897","volume-title":"Proceedings of the 26th International Conference on World Wide Web","author":"Kim Kyungtae","year":"2017","unstructured":"Kyungtae Kim, I. Luk Kim, Chung Hwan Kim, Yonghwi Kwon, Yunhui Zheng, Xiangyu Zhang, and Dongyan Xu. 2017. J-force: Forced execution on JavaScript. In Proceedings of the 26th International Conference on World Wide Web. 897\u2013906."},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155609"},{"key":"e_1_3_2_53_2","volume-title":"Proceedings of the 34th European Conference on Object-Oriented Programming (ECOOP\u201920)","author":"Li Liyi","year":"2020","unstructured":"Liyi Li and Elsa L. Gunter. 2020. K-LLVM: A relatively complete semantics of LLVM IR. In Proceedings of the 34th European Conference on Object-Oriented Programming (ECOOP\u201920). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_3_2_54_2","article-title":"PalmTree: Learning an assembly language model for instruction embedding","author":"Li Xuezixiang","year":"2021","unstructured":"Xuezixiang Li, Qu Yu, and Heng Yin. 2021. PalmTree: Learning an assembly language model for instruction embedding. arXiv preprint arXiv:2103.03809 (2021).","journal-title":"arXiv preprint arXiv:2103.03809"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_58_2","first-page":"431","volume-title":"Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC\u201907)","author":"Martignoni Lorenzo","year":"2007","unstructured":"Lorenzo Martignoni, Mihai Christodorescu, and Somesh Jha. 2007. OmniUnpack: Fast, generic, and safe unpacking of malware. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC\u201907). IEEE, 431\u2013441."},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_15"},{"key":"e_1_3_2_60_2","first-page":"92","volume-title":"Proceedings of the International Conference on Information Security and Cryptology","author":"Ming Jiang","year":"2012","unstructured":"Jiang Ming, Meng Pan, and Debin Gao. 2012. iBinHunt: Binary hunting with inter-procedural control flow. In Proceedings of the International Conference on Information Security and Cryptology. Springer, 92\u2013109."},{"key":"e_1_3_2_61_2","volume-title":"Proceedings of the 26th USENIX Security Symposium (SEC\u201917)","author":"Ming Jiang","year":"2017","unstructured":"Jiang Ming, Dongpeng Xu, Yufei Jiang, and Dinghao Wu. 2017. BinSim: Trace-based semantic binary diffing via system call sliced segment equivalence checking. In Proceedings of the 26th USENIX Security Symposium (SEC\u201917). USENIX Association."},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18467-8_28"},{"key":"e_1_3_2_63_2","first-page":"833","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201921)","author":"Pang C.","year":"2021","unstructured":"C. Pang, R. Yu, Y. Chen, E. Koskinen, G. Portokalidis, B. Mao, and J. Xu. 2021. SoK: All you ever wanted to know about x86\/x64 binary disassembly but were afraid to ask. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201921). IEEE Computer Society, 833\u2013851."},{"key":"e_1_3_2_64_2","article-title":"TREX: Learning execution semantics from micro-traces for binary similarity","author":"Pei Kexin","year":"2020","unstructured":"Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, and Baishakhi Ray. 2020. TREX: Learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680 (2020).","journal-title":"arXiv preprint arXiv:2012.08680"},{"key":"e_1_3_2_65_2","first-page":"829","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914)","author":"Peng Fei","year":"2014","unstructured":"Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, and Zhendong Su. 2014. X-force: Force-executing binary programs for security applications. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security\u201914). 829\u2013844."},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454035"},{"key":"e_1_3_2_68_2","first-page":"100","volume-title":"Proceedings of the International Symposium on Software Testing and Analysis","author":"Rosenblum Nathan","year":"2011","unstructured":"Nathan Rosenblum, Barton P. Miller, and Xiaojin Zhu. 2011. Recovering the toolchain provenance of binary code. In Proceedings of the International Symposium on Software Testing and Analysis. 100\u2013110."},{"key":"e_1_3_2_69_2","article-title":"PHB Practical Handbook of Curve Fitting","author":"Sandra L. A.","year":"1994","unstructured":"L. A. Sandra. 1994. PHB Practical Handbook of Curve Fitting. CRC Press, Boca Raton, FL.","journal-title":"CRC Press, Boca Raton, FL"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/335231.335246"},{"key":"e_1_3_2_71_2","first-page":"986","volume-title":"Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"Shi Heyuan","year":"2019","unstructured":"Heyuan Shi, Runzhe Wang, Ying Fu, Mingzhe Wang, Xiaohai Shi, Xun Jiao, Houbing Song, Yu Jiang, and Jiaguang Sun. 2019. Industry practice of coverage-guided enterprise Linux kernel fuzzing. In Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 986\u2013995."},{"key":"e_1_3_2_72_2","first-page":"493","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Steffens Marius","year":"2020","unstructured":"Marius Steffens and Ben Stock. 2020. PMForce: Systematically analyzing postmessage handlers at scale. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 493\u2013505."},{"key":"e_1_3_2_73_2","first-page":"288","volume-title":"Proceedings of the 25th Asia-Pacific Software Engineering Conference (APSEC\u201918)","author":"Tang Wei","year":"2018","unstructured":"Wei Tang, Du Chen, and Ping Luo. 2018. BCFinder: A lightweight and platform-independent tool to find third-party components in binaries. In Proceedings of the 25th Asia-Pacific Software Engineering Conference (APSEC\u201918). IEEE, 288\u2013297."},{"key":"e_1_3_2_74_2","first-page":"104","volume-title":"Proceedings of the IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER\u201920)","author":"Tang Wei","year":"2020","unstructured":"Wei Tang, Ping Luo, Jialiang Fu, and Dan Zhang. 2020. LibDX: A cross-platform and accurate system to detect third-party libraries in binary code. In Proceedings of the IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER\u201920). IEEE, 104\u2013115."},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528442"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238221"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.13"},{"key":"e_1_3_2_78_2","unstructured":"Gang-Ryung Uh Robert Cohn Bharadwaj Yadavalli Ramesh Peri and Ravi Ayyagari. 2007. Analyzing dynamic binary instrumentation overhead. Workshop on Binary Instrumentation and Application."},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00289078"},{"key":"e_1_3_2_80_2","article-title":"jTrans: Jump-aware transformer for binary code similarity","author":"Wang Hao","year":"2022","unstructured":"Hao Wang, Wenjie Qu, Gilad Katz, Wenyu Zhu, Zeyu Gao, Han Qiu, Jianwei Zhuge, and Chao Zhang. 2022. jTrans: Jump-aware transformer for binary code similarity. arXiv preprint arXiv:2205.12713 (2022).","journal-title":"arXiv preprint arXiv:2205.12713"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155606"},{"key":"e_1_3_2_82_2","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/978-3-540-74320-0_12","volume-title":"Proceedings of the International Workshop on Recent Advances in Intrusion Detection","author":"Wilhelm Jeffrey","year":"2007","unstructured":"Jeffrey Wilhelm and Tzi-cker Chiueh. 2007. A forced sampled execution approach to kernel rootkit identification. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection. Springer, 219\u2013235."},{"key":"e_1_3_2_83_2","first-page":"213","volume-title":"Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER\u201921)","author":"Xiao Yang","year":"2021","unstructured":"Yang Xiao, Zhengzi Xu, Weiwei Zhang, Chendong Yu, Longquan Liu, Wei Zou, Zimu Yuan, Yang Liu, Aihua Piao, and Wei Huo. 2021. VIVA: Binary level vulnerability identification via partial signature. In Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER\u201921). IEEE, 213\u2013224."},{"key":"e_1_3_2_84_2","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201918)","author":"Xu Dongpeng","year":"2018","unstructured":"Dongpeng Xu, Jiang Ming, Yu Fu, and Dinghao Wu. 2018. VMHunt: A verifiable approach to partially-virtualized binary code simplification. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201918). ACM."},{"key":"e_1_3_2_85_2","unstructured":"Liang Xu Fangqi Sun and Zhendong Su. 2009. Constructing precise control flow graphs from binaries. University of California Davis Tech. Rep. Citeseer 14\u201323."},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00084"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397361"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2827379"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813663"},{"key":"e_1_3_2_91_2","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201915)","author":"Yadegari Babak","year":"2015","unstructured":"Babak Yadegari, Brian Johannesmeyer, Ben Whitely, and Saumya Debray. 2015. A generic approach to automatic deobfuscation of executable code. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201915). IEEE."},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510627"},{"key":"e_1_3_2_93_2","doi-asserted-by":"crossref","unstructured":"Jia Yang Cai Fu Xiao-Yang Liu Heng Yin and Pan Zhou. 2021. Codee: A tensor embedding scheme for binary code search. IEEE Transactions on Software Engineering 48 7 (2021) 2224\u20132244.","DOI":"10.1109\/TSE.2021.3056139"},{"key":"e_1_3_2_94_2","first-page":"224","volume-title":"Proceedings of the 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201921)","author":"Yang Shouguo","year":"2021","unstructured":"Shouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang, Hongsong Zhu, and Zhiqiang Shi. 2021. Asteria: Deep learning-based AST-encoding for cross-platform binary code similarity detection. In Proceedings of the 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201921). IEEE, 224\u2013236."},{"key":"e_1_3_2_95_2","first-page":"1121","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201920)","author":"You Wei","year":"2020","unstructured":"Wei You, Zhuo Zhang, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Harmon, and Xiangyu Zhang. 2020. PMP: Cost-effective forced execution with probabilistic memory pre-planning. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201920). IEEE, 1121\u20131138."},{"key":"e_1_3_2_96_2","doi-asserted-by":"crossref","unstructured":"Zimu Yuan Muyue Feng Feng Li Gu Ban Yang Xiao Shiyang Wang Qian Tang He Su Chendong Yu Jiahuan Xu Piao Aihua Xue Jingling and Huo Wei. 2019. B2SFinder: Detecting open-source software reuse in COTS software. In 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201919) IEEE 1038\u20131049.","DOI":"10.1109\/ASE.2019.00100"},{"key":"e_1_3_2_97_2","volume-title":"Proceedings of the 27th USENIX Security Symposium (SEC\u201918)","author":"Zhang Hang","year":"2018","unstructured":"Hang Zhang and Zhiyun Qian. 2018. Precise and accurate patch presence test for binaries. In Proceedings of the 27th USENIX Security Symposium (SEC\u201918). USENIX Association."},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103709"},{"key":"e_1_3_2_100_2","first-page":"149","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Zhao Lei","year":"2020","unstructured":"Lei Zhao, Yuncong Zhu, Jiang Ming, Yichen Zhang, Haotian Zhang, and Heng Yin. 2020. PatchScope: Memory object centric patch diffing. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 149\u2013165."},{"key":"e_1_3_2_101_2","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS\u201919)","author":"Zuo Fei","year":"2019","unstructured":"Fei Zuo, Xiaopeng Li, Patrick Young, Lannan Luo, Qiang Zeng, and Zhexin Zhang. 2019. Neural machine translation inspired binary code similarity comparison beyond function pairs. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS\u201919)."}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:27Z","timestamp":1750287027000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":100,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,5,31]]}},"alternative-id":["10.1145\/3640337"],"URL":"https:\/\/doi.org\/10.1145\/3640337","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,18]]},"assertion":[{"value":"2023-09-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}