A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

How machine learning is solving the binary function similarity problem

A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …

A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features

S Alrabaee, M Debbabi, L Wang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …

Deepbindiff: Learning program-wide code representations for binary diffing

Y Duan, X Li, J Wang, H Yin - 2020 - ink.library.smu.edu.sg
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …

Bingo: Cross-architecture cross-os binary search

M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho… - Proceedings of the …, 2016 - dl.acm.org
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …

The tangled genealogy of IoT malware

E Cozzi, PA Vervier, M Dell'Amico, Y Shen… - Proceedings of the 36th …, 2020 - dl.acm.org
The recent emergence of consumer off-the-shelf embedded (IoT) devices and the rise of
large-scale IoT botnets has dramatically increased the volume and sophistication of Linux …

Learning approximate execution semantics from traces for binary function similarity

K Pei, Z Xuan, J Yang, S Jana… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …

{BinSim}: Trace-based semantic binary diffing via system call sliced segment equivalence checking

J Ming, D Xu, Y Jiang, D Wu - 26th USENIX Security Symposium …, 2017 - usenix.org
Detecting differences between two binary executables (binary diffing), first derived from
patch analysis, have been widely employed in various software security analysis tasks, such …

Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned

D Kim, E Kim, SK Cha, S Son… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …

Buggraph: Differentiating source-binary code similarity with graph triplet-loss network

Y Ji, L Cui, HH Huang - Proceedings of the 2021 ACM Asia Conference …, 2021 - dl.acm.org
Binary code similarity detection, which answers whether two pieces of binary code are
similar, has been used in a number of applications, such as vulnerability detection and …