2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC) 2017
DOI: 10.1109/icpc.2017.22
|View full text |Cite
|
Sign up to set email alerts
|

Binary Code Clone Detection across Architectures and Compiling Configurations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 65 publications
(36 citation statements)
references
References 24 publications
0
36
0
Order By: Relevance
“…use the control flow graph and hashed signatures of its basic blocks, as created by statically analyzing their input/output behavior, to find buggy or vulnerable code clones in binary code across architectures [24]. Similarly, semantic signatures are extracted for functions by emulating their execution in [25], to detect cloned functions in binary code. Instrumentation is used in [26] to create dynamic instruction graphs, which are searched for isomorphic subgraphs to find function clones.…”
Section: ) Semantic Methods: Instead Of Comparing Syntacticalmentioning
confidence: 99%
“…use the control flow graph and hashed signatures of its basic blocks, as created by statically analyzing their input/output behavior, to find buggy or vulnerable code clones in binary code across architectures [24]. Similarly, semantic signatures are extracted for functions by emulating their execution in [25], to detect cloned functions in binary code. Instrumentation is used in [26] to create dynamic instruction graphs, which are searched for isomorphic subgraphs to find function clones.…”
Section: ) Semantic Methods: Instead Of Comparing Syntacticalmentioning
confidence: 99%
“…The accuracy of CACompare thus affects the performance of BINPATCH. CACompare cannot locate the inlined functions, which is still an issue for the topic [9], [17], [27], [55]. As a result, BINPATCH is unable to patch the binary functions which are inlined into their callers.…”
Section: B Function Inliningmentioning
confidence: 99%
“…Therefore, they are ineffective in comparing code compiled with different configurations in this paper. More recently, BinGo [9], CACompare [27], and IMF-sim [71] are proposed to detect similar binary code as well. Besides, BinShape [61] and BinSequence [28] are proposed to measure the similarity of binary function accurately and efficiently.…”
Section: B Binary Code Similarity Comparisonmentioning
confidence: 99%
“…Multi-MH [34], discovRE [12], Genius [13] are proposed to detect known vulnerabilities and bugs in multiarchitecture binaries via code clone analysis. BinGo [6] and CACompare [19] are proposed to analyze the similarity of binary code across architectures as well. However, discovRE and Genius still depend heavily on the CFG of a binary function.…”
Section: Related Workmentioning
confidence: 99%