Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of binary code similarity
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Software clone detection: A systematic review
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …
development. The duplicated code is known as a software clone and the activity is known as …
Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
Deep learning code fragments for code clone detection
Code clone detection is an important problem for software maintenance and evolution. Many
approaches consider either structure or identifiers, but none of the existing detection …
approaches consider either structure or identifiers, but none of the existing detection …
Oreo: Detection of clones in the twilight zone
Source code clones are categorized into four types of increasing difficulty of detection,
ranging from purely textual (Type-1) to purely semantic (Type-4). Most clone detectors …
ranging from purely textual (Type-1) to purely semantic (Type-4). Most clone detectors …
Bingo: Cross-architecture cross-os binary search
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …
eg, plagiarism detection, malware detection and software vulnerability auditing. However …
Neural detection of semantic code clones via tree-based convolution
Code clones are similar code fragments that share the same semantics but may differ
syntactically to various degrees. Detecting code clones helps reduce the cost of software …
syntactically to various degrees. Detecting code clones helps reduce the cost of software …
Checking smart contracts with structural code embedding
Smart contracts have been increasingly used together with blockchains to automate
financial and business transactions. However, many bugs and vulnerabilities have been …
financial and business transactions. However, many bugs and vulnerabilities have been …
{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures
Recurring vulnerabilities widely exist and remain undetected in real-world systems, which
are often resulted from reused code base or shared code logic. However, the potentially …
are often resulted from reused code base or shared code logic. However, the potentially …
Blanket execution: Dynamic similarity testing for program binaries and components
Matching function binaries—the process of identifying similar functions among binary
executables—is a challenge that underlies many security applications such as malware …
executables—is a challenge that underlies many security applications such as malware …