2017
DOI: 10.1109/tse.2017.2655046
|View full text |Cite
|
Sign up to set email alerts
|

Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
37
0
2

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 94 publications
(39 citation statements)
references
References 43 publications
0
37
0
2
Order By: Relevance
“…For binaries, BinHunt [9] and its successor iBinHunt [10] relied on symbolic execution and a theorem prover to check the semantic equivalence between basic blocks. CoP [3] also used a theorem prover to detect the parts of cloned code. However, these methods require expensive computation and are not practical for large binary projects.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…For binaries, BinHunt [9] and its successor iBinHunt [10] relied on symbolic execution and a theorem prover to check the semantic equivalence between basic blocks. CoP [3] also used a theorem prover to detect the parts of cloned code. However, these methods require expensive computation and are not practical for large binary projects.…”
Section: Related Workmentioning
confidence: 99%
“…Code reuse has gradually become an uncontrollable issue. Some developers opportunistically plagiarize other software code [3], possibly causing GNU General Public License (GPL) infringements. In addition, code reuse has exacerbated security issues.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Binary clone detection. Various approaches have been proposed to measure the similarity of two binaries [28,30,33,60,73,90,98].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, it is a code containment problem. The problem has been emphasized by previous work [27], [37], [45], [66], [60], [61], [38], but the proposed solutions can only work for code of the same ISA. Resolving the cross-architecture code containment problem is a new and important endeavor.…”
Section: Introductionmentioning
confidence: 99%