“…In today's computing environment, encountering binary-only software is common including commodity or proprietary programs, system software like firmware and device drivers. Accordingly, binary analysis is essential in implementing a wide range of popular use cases [11,13,21,65]: e.g., detecting code clone or software plagiarism to protect against intellectual property infringement [17,40,67], discovering vulnerabilities in distributed software [7,8,14,15,19,38,42,51,52,57,58], detecting [5,6,35] and classifying [28,34] malware, and analyzing program repairs or patches [20,29,64], and establishing toolchain provenance [48,56] for digital forensics purposes.…”