• Kalinin M and Gribkov N. (2024). Syntactic–Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices. Sensors. 10.3390/s24227251. 24:22. (7251).

    https://www.mdpi.com/1424-8220/24/22/7251

  • Jiang S, Fu C, He S, Lv J, Han L and Hu H. BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection. IEEE Transactions on Software Engineering. 10.1109/TSE.2024.3411072. 50:10. (2485-2497).

    https://ieeexplore.ieee.org/document/10589540/

  • Jiang X, Wang S, Gong Y, Yu T, Liu L and Yu X. (2024). HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection. Computers & Security. 10.1016/j.cose.2024.104029. 145. (104029). Online publication date: 1-Oct-2024.

    https://linkinghub.elsevier.com/retrieve/pii/S0167404824003341

  • Wang H, Gao Z, Zhang C, Sun M, Zhou Y, Qiu H and Xiao X. CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection. Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis. (149-161).

    https://doi.org/10.1145/3650212.3652117

  • Zhang Y, Fang B, Xiong Z, Wang Y, Liu Y, Zheng C and Zhang Q. A Semantics-Based Approach on Binary Function Similarity Detection. IEEE Internet of Things Journal. 10.1109/JIOT.2024.3389014. 11:15. (25910-25924).

    https://ieeexplore.ieee.org/document/10500829/

  • Feng Y, Li H, Cao Y, Wang Y and Feng H. CRABS-former: CRoss-Architecture Binary Code Similarity Detection based on Transformer. Proceedings of the 15th Asia-Pacific Symposium on Internetware. (11-20).

    https://doi.org/10.1145/3671016.3671390

  • Jia L, Wu C, Zhang P and Wang Z. CodeExtract: Enhancing Binary Code Similarity Detection with Code Extraction Techniques. Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems. (143-154).

    https://doi.org/10.1145/3652032.3657572

  • Jia Y, Yu Z, Hong Z and Shaikh A. (2024). Semantic aware-based instruction embedding for binary code similarity detection. PLOS ONE. 10.1371/journal.pone.0305299. 19:6. (e0305299).

    https://dx.plos.org/10.1371/journal.pone.0305299

  • Pan Z, Hu X, Xia X, Zhan X, Lo D and Yang X. PPT4J: Patch Presence Test for Java Binaries. Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. (1-12).

    https://doi.org/10.1145/3597503.3639231

  • Dong C, Li S, Yang S, Xiao Y, Wang Y, Li H, Li Z and Sun L. LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries. Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. (1-12).

    https://doi.org/10.1145/3597503.3623336

  • Ruan L, Xu Q, Zhu S, Huang X and Lin X. (2024). A Survey of Binary Code Similarity Detection Techniques. Electronics. 10.3390/electronics13091715. 13:9. (1715).

    https://www.mdpi.com/2079-9292/13/9/1715

  • Song Q, Sang Y, Zhang Y, Li S and Xu X. SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification. IEEE Transactions on Information Forensics and Security. 10.1109/TIFS.2023.3331895. 19. (1372-1387).

    https://ieeexplore.ieee.org/document/10314554/

  • Zhang D, Gao H, Liu S and Zhu X. (2024). Learning Semantic Representation for Binary Code Similarity Detection. Artificial Intelligence in China. 10.1007/978-981-99-7545-7_49. (481-491).

    https://link.springer.com/10.1007/978-981-99-7545-7_49

  • Yan Y, Yu L, Wang T, Li Y and Pan Z. (2024). Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized LLVM IR. Digital Forensics and Cyber Crime. 10.1007/978-3-031-56583-0_7. (95-113).

    https://link.springer.com/10.1007/978-3-031-56583-0_7

  • Yi X, Li G, Ding A, Zheng Y, Li Y and Li J. (2023). AdvBinSD: Poisoning the Binary Code Similarity Detector via Isolated Instruction Sequences 2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom). 10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00183. 979-8-3503-2922-3. (1149-1156).

    https://ieeexplore.ieee.org/document/10491700/

  • Xia B, Pang J, Zhou X, Shan Z, Wang J and Yue F. (2023). Binary code similarity analysis based on naming function and common vector space. Scientific Reports. 10.1038/s41598-023-42769-9. 13:1.

    https://www.nature.com/articles/s41598-023-42769-9

  • Luo Z, Wang P, Xie W, Zhou X and Wang B. (2023). IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations. Sensors. 10.3390/s23187789. 23:18. (7789).

    https://www.mdpi.com/1424-8220/23/18/7789

  • Yan Y, Pan Z, Yu L and Wang T. (2023). Research on the influencing factors of LLVM IR optimization effect 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA). 10.1109/ICIBA56860.2023.10165133. 978-1-6654-9079-5. (756-763).

    https://ieeexplore.ieee.org/document/10165133/

  • Liu J, Zeng J, Wang X and Liang Z. Learning Graph-Based Code Representations for Source-Level Functional Similarity Detection. Proceedings of the 45th International Conference on Software Engineering. (345-357).

    https://doi.org/10.1109/ICSE48619.2023.00040

  • Pei K, Xuan Z, Yang J, Jana S and Ray B. Learning Approximate Execution Semantics From Traces for Binary Function Similarity. IEEE Transactions on Software Engineering. 10.1109/TSE.2022.3231621. 49:4. (2776-2790).

    https://ieeexplore.ieee.org/document/10002189/

  • Kim D, Kim E, Cha S, Son S and Kim Y. Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned. IEEE Transactions on Software Engineering. 10.1109/TSE.2022.3187689. 49:4. (1661-1682).

    https://ieeexplore.ieee.org/document/9813408/

  • Zhang P, Wu C, Peng M, Zeng K, Yu D, Lai Y, Kang Y, Wang W and Wang Z. Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques. Proceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization. (55-67).

    https://doi.org/10.1145/3579990.3580007

  • Pangestu M, Simon and Karnalim O. (2023). Mitigating Accidental Code Plagiarism in a Programming Course Through Code Referencing. Towards a Collaborative Society Through Creative Learning. 10.1007/978-3-031-43393-1_55. (615-626).

    https://link.springer.com/10.1007/978-3-031-43393-1_55

  • Song Q, Zhang Y and Li S. (2023). Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison. Security and Privacy in Communication Networks. 10.1007/978-3-031-25538-0_11. (192-211).

    https://link.springer.com/10.1007/978-3-031-25538-0_11

  • Zhang W, Xu Z, Xiao Y and Xue Y. (2022). Unleashing the power of pseudo-code for binary code similarity analysis. Cybersecurity. 10.1186/s42400-022-00121-0. 5:1.

    https://cybersecurity.springeropen.com/articles/10.1186/s42400-022-00121-0

  • Wang Q, Yan H, Zhao C, Mei R, Han Z and Zhou Y. (2022). APT Attribution for Malware Based on Time Series Shapelets 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 10.1109/TrustCom56396.2022.00108. 978-1-6654-9425-0. (769-777).

    https://ieeexplore.ieee.org/document/10063628/

  • Zhang Y, Wang Y, Liu Y, Pang Z and Fang B. (2022). PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS). 10.1109/QRS57517.2022.00061. 978-1-6654-7704-8. (537-548).

    https://ieeexplore.ieee.org/document/10062362/

  • Liu H, Ma H and Zhang Y. (2021). Multigranularity semantics based vulnerability search method for cross‐platform binary. International Journal of Intelligent Systems. 10.1002/int.22436. 37:12. (10172-10192). Online publication date: 1-Dec-2022.

    https://onlinelibrary.wiley.com/doi/10.1002/int.22436

  • Jiang S, Fu C, Qian Y, He S, Lv J and Han L. (2022). IFAttn. Computers and Security. 120:C. Online publication date: 1-Sep-2022.

    https://doi.org/10.1016/j.cose.2022.102804

  • Dib M, Torabi S, Bou-Harb E, Bouguila N and Assi C. EVOLIoT. Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. (452-466).

    https://doi.org/10.1145/3488932.3517393

  • Haq I and Caballero J. (2021). A Survey of Binary Code Similarity. ACM Computing Surveys. 54:3. (1-38). Online publication date: 30-Apr-2022.

    https://doi.org/10.1145/3446371

  • Gui H, Tang K, Shan Z, Qiao M, Zhang C, Huang Y and Liu F. (2022). AAPFE: Aligned Assembly Pre-Training Function Embedding for Malware Analysis. Electronics. 10.3390/electronics11060940. 11:6. (940).

    https://www.mdpi.com/2079-9292/11/6/940

  • Liu Z. (2021). Binary Code Similarity Detection 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE). 10.1109/ASE51524.2021.9678518. 978-1-6654-0337-5. (1056-1060).

    https://ieeexplore.ieee.org/document/9678518/

  • Hu Y, Wang H, Zhang Y, Li B and Gu D. A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison. IEEE Transactions on Software Engineering. 10.1109/TSE.2019.2918326. 47:6. (1241-1258).

    https://ieeexplore.ieee.org/document/8721093/

  • Pangestu M and Simon . (2021). Work in Progress: An Automated Management System for References in Programming Code 2021 IEEE Global Engineering Education Conference (EDUCON). 10.1109/EDUCON46332.2021.9454112. 978-1-7281-8478-4. (1301-1305).

    https://ieeexplore.ieee.org/document/9454112/

  • Wang Y, Wang R, Jing J, Wang H and Shi W. (2021). Implementing a high-efficiency similarity analysis approach for firmware code. PLOS ONE. 10.1371/journal.pone.0245098. 16:1. (e0245098).

    https://dx.plos.org/10.1371/journal.pone.0245098

  • Chung C and Wang P. Version-Wide Software Birthmark via Machine Learning. IEEE Access. 10.1109/ACCESS.2021.3103186. 9. (110811-110825).

    https://ieeexplore.ieee.org/document/9509024/

  • Akabane S and Okamoto T. (2021). Identification of toolchains used to build IoT malware with statically linked libraries. Procedia Computer Science. 10.1016/j.procs.2021.09.291. 192. (5130-5138).

    https://linkinghub.elsevier.com/retrieve/pii/S1877050921020305

  • Jang H, Yang K, Lee G, Na Y, Seideman J, Luo S, Lee H and Dietrich S. (2021). QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection. ICT Systems Security and Privacy Protection. 10.1007/978-3-030-78120-0_5. (66-82).

    https://link.springer.com/10.1007/978-3-030-78120-0_5

  • Cozzi E, Vervier P, Dell'Amico M, Shen Y, Bilge L and Balzarotti D. The Tangled Genealogy of IoT Malware. Proceedings of the 36th Annual Computer Security Applications Conference. (1-16).

    https://doi.org/10.1145/3427228.3427256

  • Zhang Y, Xu A and Jiang Y. (2020). Scalable and Accurate Binary Code Search Method Based on Simhash and Partial Trace 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 10.1109/TrustCom50675.2020.00111. 978-1-6654-0392-4. (818-826).

    https://ieeexplore.ieee.org/document/9343136/

  • Saieva A and Kaiser G. Binary Quilting to Generate Patched Executables without Compilation. Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation. (3-8).

    https://doi.org/10.1145/3411502.3418424

  • Jiang Z, Zhang Y, Xu J, Wen Q, Wang Z, Zhang X, Xing X, Yang M and Yang Z. PDiff: Semantic-based Patch Presence Testing for Downstream Kernels. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. (1149-1163).

    https://doi.org/10.1145/3372297.3417240

  • Zhu X, Li Q, Chen Z, Zhang G and Shan P. Research on Security Detection Technology for Internet of Things Terminal Based on Firmware Code Genes. IEEE Access. 10.1109/ACCESS.2020.3017088. 8. (150226-150241).

    https://ieeexplore.ieee.org/document/9169679/

  • Akabane S and Okamoto T. (2020). Identification of library functions statically linked to Linux malware without symbols. Procedia Computer Science. 10.1016/j.procs.2020.09.053. 176. (3436-3445).

    https://linkinghub.elsevier.com/retrieve/pii/S1877050920319487

  • Alrabaee S, Debbabi M, Shirani P, Wang L, Youssef A, Rahimian A, Nouh L, Mouheb D, Huang H and Hanna A. (2020). Introduction. Binary Code Fingerprinting for Cybersecurity. 10.1007/978-3-030-34238-8_1. (1-6).

    http://link.springer.com/10.1007/978-3-030-34238-8_1

  • Calleja A, Tapiador J and Caballero J. The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. IEEE Transactions on Information Forensics and Security. 10.1109/TIFS.2018.2885512. 14:12. (3175-3190).

    https://ieeexplore.ieee.org/document/8568018/

  • Ding S, Fung B and Charland P. (2019). Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization 2019 IEEE Symposium on Security and Privacy (SP). 10.1109/SP.2019.00003. 978-1-5386-6660-9. (472-489).

    https://ieeexplore.ieee.org/document/8835340/

  • Zhu X, Li Q, Zhang P and chen z. A Firmware Code Gene Extraction Technology for IoT Terminal. IEEE Access. 10.1109/ACCESS.2019.2959089. 7. (179591-179604).

    https://ieeexplore.ieee.org/document/8931782/

  • Hu Y, Zhang Y and Gu D. Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions. IEEE Access. 10.1109/ACCESS.2019.2901951. 7. (28170-28184).

    https://ieeexplore.ieee.org/document/8653831/

  • Shirani P, Collard L, Agba B, Lebel B, Debbabi M, Wang L and Hanna A. (2018). BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. Detection of Intrusions and Malware, and Vulnerability Assessment. 10.1007/978-3-319-93411-2_6. (114-138).

    http://link.springer.com/10.1007/978-3-319-93411-2_6

  • Shirani P, Wang L and Debbabi M. (2017). BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. Detection of Intrusions and Malware, and Vulnerability Assessment. 10.1007/978-3-319-60876-1_14. (301-324).

    http://link.springer.com/10.1007/978-3-319-60876-1_14

  • Nouh L, Rahimian A, Mouheb D, Debbabi M and Hanna A. (2017). BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables. ICT Systems Security and Privacy Protection. 10.1007/978-3-319-58469-0_23. (341-355).

    http://link.springer.com/10.1007/978-3-319-58469-0_23