{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:29:41Z","timestamp":1730291381357,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/qrs57517.2022.00061","type":"proceedings-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T17:37:55Z","timestamp":1679333875000},"page":"537-548","source":"Crossref","is-referenced-by-count":0,"title":["PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph"],"prefix":"10.1109","author":[{"given":"Yuntao","family":"Zhang","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of Education,Beijing,China"}]},{"given":"Yanhao","family":"Wang","sequence":"additional","affiliation":[{"name":"QI-ANXIN Technology Group Inc.,Beijing,China"}]},{"given":"Yuwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Software,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Zhengyuan","family":"Pang","sequence":"additional","affiliation":[{"name":"Beijing DigApis Technology Co., Ltd,Beijing,China"}]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of Education,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.18"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.21"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.49"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102607"},{"key":"ref8","article-title":"University of New South Wales. Department of Computer Science, University of New South Wales. School of Electrical Engineering, and Computer Science","author":"Whale","year":"1988","journal-title":"Plague: Plagiarism Detection Using Program Structure. DCS report. School of Electrical Engineering and Computer Science, University of New South Wales"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3446371"},{"key":"ref10","article-title":"Codecmr: Cross-modal retrieval for function-level binary source code matching","volume":"33","author":"Yu","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"article-title":"Retdec: An open-source machine-code decompiler","year":"2017","author":"K\u0159oustek","key":"ref16"},{"article-title":"Finding bugs using your own code: Detecting functionally-similar yet inconsistent code","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Ahmadi","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3177157"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-x_31"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2022.3187689"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23020"},{"volume-title":"Relative change and difference \u2014 wikipedia, the free encyclopedia","year":"2018","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/75308.75328"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1561\/2500000014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/113445.113447"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/567067.567085"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.75"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59152-6_33"},{"key":"ref36","article-title":"LLVM: An infrastructure for multi-stage optimization","volume-title":"PhD thesis","author":"Arthur Lattner","year":"2002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4064\/fm-49-2-129-141"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"journal-title":"How machine learning is solving the binary function similarity problem","author":"Marcelli","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_8"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052974"},{"article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","year":"2018","author":"Devlin","key":"ref45"}],"event":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","start":{"date-parts":[[2022,12,5]]},"location":"Guangzhou, China","end":{"date-parts":[[2022,12,9]]}},"container-title":["2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10061851\/10061812\/10062362.pdf?arnumber=10062362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T12:14:35Z","timestamp":1707826475000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10062362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/qrs57517.2022.00061","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]}}}