{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:24Z","timestamp":1750309524542,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T00:00:00Z","timestamp":1749600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,25]]},"DOI":"10.1145\/3713081.3731728","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T17:20:36Z","timestamp":1749230436000},"page":"6-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ReGraph: A Tool for Binary Similarity Identification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1222-6815","authenticated-orcid":false,"given":"Li","family":"Zhou","sequence":"first","affiliation":[{"name":"CEMSE, King Abdullah University of Science and Technology (KAUST), Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3206-2030","authenticated-orcid":false,"given":"Marc","family":"Dacier","sequence":"additional","affiliation":[{"name":"CEMSE, King Abdullah University of Science and Technology (KAUST), Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3825-3930","authenticated-orcid":false,"given":"Charalambos","family":"Konstantinou","sequence":"additional","affiliation":[{"name":"CEMSE, King Abdullah University of Science and Technology (KAUST), Jeddah, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NationalSecurity Agency. 2019. NationalSecurityAgency\/Ghidra: Ghidra is a software reverse engineering (SRE) framework. https:\/\/github.com\/NationalSecurityAgency\/ghidra"},{"key":"e_1_3_2_1_2_1","unstructured":"Fabian Yamaguchi Alex Denisov. 2021. LLVM meets code property graphs. https:\/\/blog.llvm.org\/posts\/2021-02-23-llvm-meets-code-property-graphs\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC.2014.6970342"},{"key":"e_1_3_2_1_4_1","volume-title":"Detecting higher-level similarity patterns in programs. ACM Sigsoft Software engineering notes 30, 5","author":"Basit Hamid Abdul","year":"2005","unstructured":"Hamid Abdul Basit and Stan Jarzabek. 2005. Detecting higher-level similarity patterns in programs. ACM Sigsoft Software engineering notes 30, 5 (2005), 156\u2013165."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_6_1","unstructured":"TI Clang. 2024. 1.3.7. optimization options. https:\/\/software-dl.ti.com\/codegen\/docs\/tiarmclang\/compiler_tools_user_guide\/compiler_manual\/using_compiler\/compiler_options\/optimization_options.html"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594343"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_10_1","unstructured":"GmbH. 2011. https:\/\/www.zynamics.com\/bindiff.html"},{"key":"e_1_3_2_1_11_1","unstructured":"GNU. [n. d.]. https:\/\/ftp.gnu.org\/old-gnu\/Manuals\/binutils-2.12\/html_node\/binutils_10.html"},{"key":"e_1_3_2_1_12_1","unstructured":"GCC GNU. 2023. Options That Control Optimization. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Optimize-Options.html"},{"key":"e_1_3_2_1_13_1","unstructured":"Rays Hex. 1996. Ida Pro. https:\/\/hex-rays.com\/ida-pro\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.50"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052974"},{"key":"e_1_3_2_1_16_1","unstructured":"P\u00e1gina inicial. 2022. https:\/\/openplcproject.com\/docs\/3-1-openplc-editor-overview\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Retdec: An open-source machine-code decompiler. In July","author":"K\u0159oustek Jakub","year":"2017","unstructured":"Jakub K\u0159oustek, Peter Matula, and P Zemek. 2017. Retdec: An open-source machine-code decompiler. In July 2018."},{"key":"e_1_3_2_1_18_1","volume-title":"LLVM: An infrastructure for multi-stage optimization.","author":"Lattner Chris Arthur","year":"2002","unstructured":"Chris Arthur Lattner. 2002. LLVM: An infrastructure for multi-stage optimization. (2002)."},{"key":"e_1_3_2_1_19_1","volume-title":"International conference on machine learning. PMLR, 3835\u20133845","author":"Li Yujia","year":"2019","unstructured":"Yujia Li, Chenjie Gu, Thomas Dullien, Oriol Vinyals, and Pushmeet Kohli. 2019. Graph matching networks for learning the similarity of graph structured objects. In International conference on machine learning. PMLR, 3835\u20133845."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_1_21_1","unstructured":"Zhenhao Luo Pengfei Wang Baosheng Wang Yong Tang Wei Xie Xu Zhou Danjun Liu and Kai Lu. 2023. VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.. In NDSS."},{"key":"e_1_3_2_1_22_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Marcelli Andrea","year":"2022","unstructured":"Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, and Davide Balzarotti. 2022. How machine learning is solving the binary function similarity problem. In 31st USENIX Security Symposium (USENIX Security 22). 2099\u20132116."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678782"},{"key":"e_1_3_2_1_24_1","unstructured":"Iain Pardoe Laura Simon and Derek Young. 2018. 2.6 - (Pearson) Correlation Coefficient r. https:\/\/online.stat.psu.edu\/stat462\/node\/96\/ Accessed: 2025-03-11."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264820.3264821"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_6"},{"key":"e_1_3_2_1_28_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Veli\u010dkovi\u0107 Petar","year":"2017","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_1_29_1","volume-title":"BinEnhance: An Enhancement Framework Based on External Environment Semantics for Binary Code Search. arXiv preprint arXiv:2411.01102","author":"Wang Yongpan","year":"2024","unstructured":"Yongpan Wang, Hong Li, Xiaojie Zhu, Siyuan Li, Chaopeng Dong, Shouguo Yang, and Kangyuan Qin. 2024. BinEnhance: An Enhancement Framework Based on External Environment Semantics for Binary Code Search. arXiv preprint arXiv:2411.01102 (2024)."},{"key":"e_1_3_2_1_30_1","unstructured":"xorpd. [n. d.]. FCATALOG. https:\/\/www.xorpd.net\/pages\/fcatalog.html"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2021.03.040"},{"key":"e_1_3_2_1_33_1","unstructured":"Yamaguchi. 2014. The bug hunter's workbench. https:\/\/joern.io\/"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00036"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"e_1_3_2_1_36_1","first-page":"3872","article-title":"Codecmr: Cross-modal retrieval for function-level binary source code matching","volume":"33","author":"Yu Zeping","year":"2020","unstructured":"Zeping Yu, Wenxin Zheng, Jiaqi Wang, Qiyi Tang, Sen Nie, and Shi Wu. 2020. Codecmr: Cross-modal retrieval for function-level binary source code matching. Advances in Neural Information Processing Systems 33 (2020), 3872\u20133883.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534366"}],"event":{"name":"ISSTA Companion '25: 34th ACM SIGSOFT International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Clarion Hotel Trondheim Trondheim Norway","acronym":"ISSTA Companion '25"},"container-title":["Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3713081.3731728","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:09Z","timestamp":1750295889000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3713081.3731728"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,11]]},"references-count":37,"alternative-id":["10.1145\/3713081.3731728","10.1145\/3713081"],"URL":"https:\/\/doi.org\/10.1145\/3713081.3731728","relation":{},"subject":[],"published":{"date-parts":[[2025,6,11]]},"assertion":[{"value":"2025-06-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}