-
Notifications
You must be signed in to change notification settings - Fork 0
/
refs.bib
124 lines (103 loc) · 4.43 KB
/
refs.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
@inproceedings {usenix,
author = {Andrea Marcelli and Mariano Graziano and Xabier Ugarte-Pedrero and Yanick Fratantonio and Mohamad Mansouri and Davide Balzarotti},
title = {How Machine Learning Is Solving the Binary Function Similarity Problem},
booktitle = {31st USENIX Security Symposium (USENIX Security 22)},
year = {2022},
isbn = {978-1-939133-31-1},
address = {Boston, MA},
pages = {2099--2116},
url = {https://www.usenix.org/conference/usenixsecurity22/presentation/marcelli},
publisher = {USENIX Association},
month = aug,
}
@inproceedings{elie,
author = {Elie Mengin and
Fabrice Rossi},
title = {Binary Diffing as a Network Alignment Problem via Belief Propagation},
booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
{ASE} 2021, Melbourne, Australia, November 15-19, 2021},
pages = {967--978},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/ASE51524.2021.9678782},
doi = {10.1109/ASE51524.2021.9678782},
timestamp = {Mon, 24 Jan 2022 17:59:41 +0100},
biburl = {https://dblp.org/rec/conf/kbse/MenginR21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{trex,
title={Trex: Learning execution semantics from micro-traces for binary similarity},
author={Pei, Kexin and Xuan, Zhou and Yang, Junfeng and Jana, Suman and Ray, Baishakhi},
journal={arXiv preprint arXiv:2012.08680},
year={2020}
}
@article{Kim_2023,
doi = {10.1109/tse.2022.3187689},
url = {https://doi.org/10.1109%2Ftse.2022.3187689},
year = 2023,
month = {apr},
publisher = {Institute of Electrical and Electronics Engineers ({IEEE})},
volume = {49},
number = {4},
pages = {1661--1682},
author = {Dongkwan Kim and Eunsoo Kim and Sang Kil Cha and Sooel Son and Yongdae Kim},
title = {Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned},
journal = {{IEEE} Transactions on Software Engineering}
}
@inproceedings{massarelli2019investigating,
title={Investigating graph embedding neural networks with unsupervised features extraction for binary analysis},
author={Massarelli, Luca and Di Luna, Giuseppe A and Petroni, Fabio and Querzoni, Leonardo and Baldoni, Roberto and others},
booktitle={Proceedings of the 2nd Workshop on Binary Analysis Research (BAR)},
pages={1--11},
year={2019}
}
@inproceedings{gmn,
title={Graph matching networks for learning the similarity of graph structured objects},
author={Li, Yujia and Gu, Chenjie and Dullien, Thomas and Vinyals, Oriol and Kohli, Pushmeet},
booktitle={International conference on machine learning},
pages={3835--3845},
year={2019},
organization={PMLR}
}
@article{bindiffnn,
title={BinDiff NN: Learning Distributed Representation of Assembly for Robust Binary Diffing against Semantic Differences},
author={Ullah, Sami and Oh, Heekuck},
journal={IEEE Transactions on Software Engineering},
volume={48},
number={9},
pages={3442--3466},
year={2021},
publisher={IEEE}
}
@inproceedings{binshape,
title={Binshape: Scalable and robust binary library function identification using function shape},
author={Shirani, Paria and Wang, Lingyu and Debbabi, Mourad},
booktitle={International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment},
pages={301--324},
year={2017},
organization={Springer}
}
@article{luo2017semantics,
title={Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection},
author={Luo, Lannan and Ming, Jiang and Wu, Dinghao and Liu, Peng and Zhu, Sencun},
journal={IEEE Transactions on Software Engineering},
volume={43},
number={12},
pages={1157--1177},
year={2017},
publisher={IEEE}
}
@inproceedings{deepbindiff,
title={Deepbindiff: Learning program-wide code representations for binary diffing},
author={Duan, Yue and Li, Xuezixiang and Wang, Jinghan and Yin, Heng},
booktitle={Network and distributed system security symposium},
year={2020}
}
@inproceedings{asm2vec,
title={Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization},
author={Ding, Steven HH and Fung, Benjamin CM and Charland, Philippe},
booktitle={2019 IEEE Symposium on Security and Privacy (SP)},
pages={472--489},
year={2019},
organization={IEEE}
}