1 |
FLAKE H. Structural comparison of executable objects [C]// Proceedings of the 2004 International Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Ulm: Gesellschaft für Informatik, 2004: 161-173.
|
2 |
DING S H H, FUNG B C M, CHARLAND P. Asm2Vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization [C]// Proceedings of the 2019 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2019: 472-489.
|
3 |
JIN X, PEI K, WON J Y, et al. SymLM: predicting function names in stripped binaries via context-sensitive execution-aware code embeddings [C]// Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2022: 1631-1645.
|
4 |
王泰彦,潘祖烈,于璐,等.基于预训练汇编指令表征的二进制代码相似性检测方法[J].计算机科学, 2023, 50(4): 288-297.
|
|
WANG T Y, PAN Z L, YU L, et al. Binary code similarity detection method based on pre-training assembly instruction representation [J]. Computer Science, 2023, 50(4): 288-297.
|
5 |
夏冰,庞建民,周鑫,等.二进制代码相似性搜索研究进展[J].计算机应用, 2022, 42(4): 985-998.
|
|
XIA B, PANG J M, ZHOU X, et al. Research progress on binary code similarity search [J]. Journal of Computer Applications, 2022, 42(4): 985-998.
|
6 |
HAQ I U, CABALLERO J. A survey of binary code similarity [J]. ACM Computing Surveys, 2021, 54(3): No. 51.
|
7 |
MARCELLI A, GRAZIANO M, UGARTE-PEDRERO X, et al. How machine learning is solving the binary function similarity problem [C]// Proceedings of the 31st USENIX Security Symposium. Berkley: USENIX Association, 2022: 2099-2116.
|
8 |
MINK J, BENKRAOUDA H, YANG L, et al. Everybody’s got ML, tell me what else you have: practitioners’ perception of ML-based security tools and explanations [C]// Proceedings of the 2023 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2023: 2068-2085.
|
9 |
WANG S, WU D. In-memory fuzzing for binary code similarity analysis [C]// Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering. Piscataway: IEEE, 2017: 319-330.
|
10 |
KARGÉN U, SHAHMEHRI N. Towards robust instruction-level trace alignment of binary code [C]// Proceedings of the 2017 32nd IEEE/ACM International Conference on Automated Software Engineering. Piscataway: IEEE, 2017: 342-352.
|
11 |
SALVADOR S, CHAN P. Toward accurate dynamic time warping in linear time and space [J]. Intelligent Data Analysis, 2007, 11(5): 561-580.
|
12 |
MING J, XU D, JIANG Y, et al. BinSim: trace-based semantic binary diffing via system call sliced segment equivalence checking [C]// Proceedings of the 26th USENIX Security Symposium. Berkley: USENIX Association, 2017: 253-270.
|
13 |
DAVID Y, PARTUSH N, YAHAV E. Similarity of binaries through re-optimization [C]// Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM, 2017: 79-94.
|
14 |
Y-C JHI, WANG X, JIA X, et al. Value-based program characterization and its application to software plagiarism detection [C]// Proceedings of the 2011 33rd International Conference on Software Engineering. New York: ACM, 2011: 756-765.
|
15 |
TIAN Z, ZHENG Q, LIU T, et al. DKISB: dynamic key instruction sequence birthmark for software plagiarism detection [C]// Proceedings of the 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing. Piscataway: IEEE, 2013: 619-627.
|
16 |
TIAN Z, ZHENG Q, LIU T, et al. Software plagiarism detection with birthmarks based on dynamic key instruction sequences [J]. IEEE Transactions on Software Engineering, 2015, 41(12): 1217-1235.
|
17 |
DAVID Y, YAHAV E. Tracelet-based code search in executables [J]. ACM SIGPLAN Notices, 2014, 49(6): 349-360.
|
18 |
HU Y, ZHANG Y, LI J, et al. Cross-architecture binary semantics understanding via similar code comparison [C]// Proceedings of the 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering. Piscataway: IEEE, 2016: 57-67.
|
19 |
WANG X, Y-C JHI, ZHU S C, et al. Detecting software theft via system call based birthmarks [C]// Proceedings of the 2009 Annual Computer Security Applications Conference. Piscataway: IEEE, 2009: 149-158.
|
20 |
C-K LUK, COHN R, MUTH R, et al. Pin: building customized program analysis tools with dynamic instrumentation [J]. ACM SIGPLAN Notices, 2005, 40(6): 190-200.
|
21 |
CONDRET. Radare2 user guide [EB/OL]. (2020-03-03) [2023-04-10]. .
|
22 |
DUAN Y, LI X, WANG J, et al. DeepBinDiff: learning program-wide code representations for binary diffing [C/OL]// Proceedings of the 26th Network and Distributed System Security Symposium. Reston: Internet Society, 2020[2023-07-01]. .
|
23 |
KIM S-W, GIL J-M. Research paper classification systems based on TF-IDF and LDA schemes [J]. Human-centric Computing and Information Sciences, 2019, 9: No. 30.
|