“…Penetrating the characteristics of a machine-interpretable binary code has a wide range of real-world applications including i) code clone (software plagiarism) or similarity detection [14,15,17,18,40,43,55,67,68,69,71,74], ii) malware family classification [28], detection [5,6,35], and analysis [32,36,72], iii) authorship prediction [31,37], iv) known bug discovery (code search) [7,8,9,19,38,42,51,52,57,58], v) patching analysis [20,29,64], and vi) toolchain provenance [48,56]. Most of these applications pertain to binary similarity comparison.…”