{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:40:48Z","timestamp":1763343648754,"version":"3.45.0"},"reference-count":37,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065179","type":"journal-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:01:03Z","timestamp":1747195263000},"page":"763-790","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Firmware Comparison Based on Evolutionary Algorithm and Trusted Base Point"],"prefix":"10.32604","volume":"84","author":[{"given":"Wenbing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yongwen","family":"Liu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/MM.2021.3114754","article-title":"History of microcontrollers: first 50 years","volume":"41","author":"Raghunathan","year":"2021","journal-title":"IEEE Micro"},{"key":"ref2","series-title":"33rd USENIX Security Symposium (USENIX Security 24)","first-page":"5609","article-title":"Unveiling IoT security in reality: a firmware-centric journey","author":"Nino","year":"2024"},{"key":"ref3","series-title":"33rd USENIX Security Symposium (USENIX Security 24)","first-page":"5627","article-title":"Your firmware has arrived: a study of firmware update vulnerabilities","author":"Wu","year":"2024"},{"key":"ref4","series-title":"33rd USENIX Security Symposium (USENIX Security 24)","first-page":"4265","article-title":"Improving ML-based binary function similarity detection by assessing and deprioritizing control flow graph features","author":"Wang","year":"2024"},{"key":"ref5","series-title":"33rd USENIX Security Symposium (USENIX Security 24)","first-page":"1759","article-title":"Code is not natural language: unlock the power of semantics-oriented graph representation for binary code similarity detection","author":"He","year":"2024"},{"key":"ref6","unstructured":"Collyer J, Watson T, Phillips I. Faser: binary code similarity search through the use of intermediate representations. arXiv:2310.03605. 2023."},{"key":"ref7","series-title":"Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"503","article-title":"Learning transferable binary code representations with natural language supervision","author":"Wang","year":"2024"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"110799","DOI":"10.1016\/j.comnet.2024.110799","article-title":"A fast malware detection model based on heterogeneous graph similarity search","volume":"254","author":"Li","year":"2024","journal-title":"Comput Netw"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"23","DOI":"10.3390\/technologies12020023","article-title":"Multistage malware detection method for backup systems","volume":"12","author":"Novak","year":"2024","journal-title":"Technologies"},{"key":"ref10","series-title":"Pacific Rim International Conference on Artificial Intelligence","first-page":"249","article-title":"MTMG: a framework for generating adversarial examples targeting multiple learning-based malware detection systems","author":"Jia","year":"2023"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"100106","DOI":"10.1016\/j.tbench.2023.100106","article-title":"ERMDS: a obfuscation dataset for evaluating robustness of learning-based malware detection system","volume":"3","author":"Jia","year":"2023","journal-title":"BenchCouncil Transact Benchmarks Stand Evaluat"},{"key":"ref12","series-title":"Proceedings of the 21st ACM\/IEEE International Symposium on Code Generation and Optimization","first-page":"55","article-title":"The impact of inter-procedural code obfuscation on binary diffing techniques","author":"Zhang","year":"2023"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/3381307.3381310","article-title":"Open-source tools and benchmarks for code-clone detection: past, present, and future trends","volume":"19","author":"Walker","year":"2020","journal-title":"SIGAPP Appl Comput Rev"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1109\/TSE.2017.2655046","article-title":"Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection","volume":"43","author":"Luo","year":"2017","journal-title":"IEEE Trans Softw Eng"},{"key":"ref15","series-title":"2015 IEEE Symposium on Security and Privacy","first-page":"709","article-title":"Cross-architecture bug search in binary executables","author":"Pewny","year":"2015"},{"key":"ref16","series-title":"ASIA CCS, 2017-Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security","first-page":"346","article-title":"Extracting conditional formulas for cross-platform bug search","author":"Feng","year":"2017"},{"key":"ref17","series-title":"Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"149","article-title":"CEBin: a cost-effective framework for large-scale binary code similarity detection","author":"Wang","year":"2024"},{"key":"ref18","series-title":"Proceedings of the 27th USENIX Security Symposium","first-page":"887","article-title":"Precise and accurate patch presence test for binaries","author":"Zhang","year":"2018"},{"key":"ref19","series-title":"2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE)","first-page":"462","article-title":"SPAIN: security patch analysis for binaries towards understanding the pain and pills","author":"Xu","year":"2017 May 20\u201328"},{"key":"ref20","series-title":"Proceedings of the 16th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement","first-page":"205","article-title":"PG-VulNet: detect supply chain vulnerabilities in IoT devices using pseudo-code and graphs","author":"Liu","year":"2022"},{"key":"ref21","series-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1149","article-title":"Semantic-based patch presence testing for downstream kernels","author":"Jiang","year":"2020"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3446371","article-title":"A survey of binary code similarity","volume":"54","author":"Haq","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref23","unstructured":"BinDiff [Internet]. Zynamics; 2021. [cited 2024 Mar 5]. Available from: https:\/\/www.zynamics.com\/bindiff.html."},{"key":"ref24","series-title":"Proceedings 2020 Network and Distributed System Security Symposium","article-title":"DeepBinDiff: learning program-wide code representations for binary diffing","author":"Duan","year":"2020"},{"key":"ref25","series-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","article-title":"Scalable graph-based bug search for firmware images","author":"Feng","year":"2016"},{"key":"ref26","series-title":"International Workshop on Recent Advances in Intrusion Detection","first-page":"207","article-title":"Polymorphic worm detection using structural information of executables","author":"Kruegel","year":"2005"},{"key":"ref27","series-title":"2013 USENIX Annual Technical Conference (USENIX ATC 13)","first-page":"187","article-title":"Mutantx-s: scalable malware clustering based on static features","author":"Hu","year":"2013"},{"key":"ref28","series-title":"2014 Eighth International Conference on Software Security and Reliability (SERE)","first-page":"78","article-title":"Binclone: detecting code clones in malware","author":"Farhadi","year":"2014"},{"key":"ref29","series-title":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"1","article-title":"Jump-aware transformer for binary code similarity detection","author":"Wang","year":"2022"},{"key":"ref30","series-title":"Proceedings 2023 Network and Distributed System Security Symposium","article-title":"VulHawk: cross-architecture vulnerability detection with entropy-based binary code search","author":"Luo","year":"2023"},{"key":"ref31","series-title":"Proceedings of the Eighteenth International Symposium on Software Testing and Analysis","first-page":"117","article-title":"Detecting code clones in binary executables","author":"S\u00e6bj\u00f8rnsen","year":"2009"},{"key":"ref32","series-title":"International Symposium on Engineering Secure Software and Systems","first-page":"35","article-title":"Idea: opcode-sequence-based malware detection","author":"Santos","year":"2010"},{"key":"ref33","series-title":"Proceedings of the 2012 ACM Research in Applied Computation Symposium","first-page":"316","article-title":"Malware classification method via binary content comparison","author":"Kang","year":"2012"},{"key":"ref34","series-title":"Proceedings of the 28th Annual Computer Security Applications Conference 2012","first-page":"349","article-title":"Lines of malicious code: insights into the malicious software industry","author":"Lindorfer","year":"2012"},{"key":"ref35","series-title":"2012 11th International Conference on Machine Learning and Applications","first-page":"386","article-title":"Binary function clustering using semantic hashes","author":"Jin","year":"2012"},{"key":"ref36","series-title":"22nd USENIX Security Symposium (USENIX Security 13)","first-page":"81","article-title":"Towards automatic software lineage inference","author":"Jang","year":"2013"},{"key":"ref37","series-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","first-page":"21","article-title":"Identifying shared software components to support malware forensics","author":"Ruttenberg","year":"2014"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_65179\/TSP_CMC_65179.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:36:51Z","timestamp":1763343411000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065179","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}