{"id":"https://openalex.org/W4383221378","doi":"https://doi.org/10.1145/3579856.3582818","title":"Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures","display_name":"Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221378","doi":"https://doi.org/10.1145/3579856.3582818"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3582818","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3582818","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079598483","display_name":"Abdullah Qasem","orcid":"https://orcid.org/0000-0001-8284-4458"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Abdullah Qasem","raw_affiliation_strings":["Security Research Centre, Concordia University, Canada"],"affiliations":[{"raw_affiliation_string":"Security Research Centre, Concordia University, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028605138","display_name":"Mourad Debbabi","orcid":"https://orcid.org/0000-0003-3015-3043"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mourad Debbabi","raw_affiliation_strings":["Security Research Centre, Concordia University, Canada"],"affiliations":[{"raw_affiliation_string":"Security Research Centre, Concordia University, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087855812","display_name":"Bernard Lebel","orcid":"https://orcid.org/0000-0002-8287-2587"},"institutions":[{"id":"https://openalex.org/I4210095320","display_name":"Thales (Canada)","ror":"https://ror.org/00nnd3206","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210095320","https://openalex.org/I4210140930"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Bernard Lebel","raw_affiliation_strings":["Thales Canada, Thales Research &amp; Technologies, Canada"],"affiliations":[{"raw_affiliation_string":"Thales Canada, Thales Research &amp; Technologies, Canada","institution_ids":["https://openalex.org/I4210095320"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075761726","display_name":"Marthe Kassouf","orcid":"https://orcid.org/0000-0002-3007-2350"},"institutions":[{"id":"https://openalex.org/I47099075","display_name":"Hydro-Qu\u00e9bec","ror":"https://ror.org/01nhzsw25","country_code":"CA","type":"government","lineage":["https://openalex.org/I47099075"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Marthe Kassouf","raw_affiliation_strings":["Hydro-Qu\u00e9bec Research Institute, Hydro-Qu\u00e9bec, Canada"],"affiliations":[{"raw_affiliation_string":"Hydro-Qu\u00e9bec Research Institute, Hydro-Qu\u00e9bec, Canada","institution_ids":["https://openalex.org/I47099075"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079598483"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":3.2668,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.93126761,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"443","last_page":"456"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8406147956848145},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7496918439865112},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6629860997200012},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.46828505396842957},{"id":"https://openalex.org/keywords/optimizing-compiler","display_name":"Optimizing compiler","score":0.4447484612464905},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3861531615257263},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15886333584785461}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8406147956848145},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7496918439865112},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6629860997200012},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.46828505396842957},{"id":"https://openalex.org/C190902152","wikidata":"https://www.wikidata.org/wiki/Q1325106","display_name":"Optimizing compiler","level":3,"score":0.4447484612464905},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3861531615257263},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15886333584785461},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3579856.3582818","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3582818","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1554663460","https://openalex.org/W2514974017","https://openalex.org/W2532962075","https://openalex.org/W2577142429","https://openalex.org/W2585469747","https://openalex.org/W2749008552","https://openalex.org/W2886694146","https://openalex.org/W2888320512","https://openalex.org/W2897937925","https://openalex.org/W2926178846","https://openalex.org/W2946142792","https://openalex.org/W2963408280","https://openalex.org/W2997915791","https://openalex.org/W3084708231","https://openalex.org/W3098380913","https://openalex.org/W3105926539","https://openalex.org/W3109206613","https://openalex.org/W4205550683","https://openalex.org/W4239035626","https://openalex.org/W4247464060","https://openalex.org/W4285586654"],"related_works":["https://openalex.org/W2357088637","https://openalex.org/W2759596553","https://openalex.org/W4245435048","https://openalex.org/W2806976167","https://openalex.org/W2328675598","https://openalex.org/W2963598554","https://openalex.org/W2002505081","https://openalex.org/W2083681681","https://openalex.org/W2577630842","https://openalex.org/W1172579163"],"abstract_inverted_index":{"Binary":[0],"function":[1,24,43,58,104],"clone":[2,164,200],"search":[3,165,201],"is":[4,189,207],"an":[5],"essential":[6],"capability":[7],"that":[8,113,128],"enables":[9],"multiple":[10],"applications":[11],"and":[12,38,48,90,120,151,161,178],"use":[13],"cases,":[14],"including":[15],"reverse":[16],"engineering,":[17],"patch":[18],"security":[19],"inspection,":[20],"threat":[21],"analysis,":[22],"vulnerable":[23],"detection,":[25],"etc.":[26],"As":[27],"such,":[28],"a":[29,92,98,108,137,208],"surge":[30],"of":[31,110],"interest":[32],"has":[33,68],"been":[34,69],"expressed":[35],"in":[36,56],"designing":[37],"implementing":[39],"techniques":[40],"to":[41,71,82,101,116,159,192,198],"address":[42],"similarity":[44],"on":[45,107],"binary":[46,66,103,199],"executables":[47],"firmware":[49],"images.":[50],"Although":[51],"existing":[52],"approaches":[53,132],"have":[54],"merit":[55],"fingerprinting":[57],"clones,":[59],"they":[60],"present":[61],"limitations":[62],"when":[63],"the":[64,169,190,203],"target":[65],"code":[67,73,118],"subjected":[70],"significant":[72],"transformation":[74],"resulting":[75],"from":[76],"obfuscation,":[77],"compiler":[78,121,162],"optimization,":[79],"and/or":[80],"cross-compilation":[81],"multiple-CPU":[83],"architectures.":[84],"In":[85],"this":[86],"regard,":[87],"we":[88],"design":[89],"implement":[91],"system":[93],"named":[94],"BinFinder,":[95],"which":[96,206],"employs":[97],"neural":[99],"network":[100],"learn":[102],"embeddings":[105],"based":[106],"set":[109],"extracted":[111],"features":[112],"are":[114],"resilient":[115],"both":[117],"obfuscation":[119,160],"optimization":[122,163],"techniques.":[123],"Our":[124],"experimental":[125],"evaluation":[126],"indicates":[127],"BinFinder":[129,167],"outperforms":[130,168],"state-of-the-art":[131],"for":[133],"multi-CPU":[134],"architectures":[135],"by":[136],"large":[138],"margin,":[139],"with":[140,175,183,196],"46%":[141],"higher":[142,147,153,176,184],"Recall":[143,148,154,177],"against":[144,149,155],"Gemini,":[145],"55%":[146],"SAFE,":[150],"28%":[152],"GMN.":[156],"With":[157],"respect":[158,197],"approaches,":[166],"asm2vec":[170],"(single":[171],"CPU":[172],"architecture":[173,181],"approach)":[174,182],"BinMatch":[179],"(multi-CPU":[180],"Recall.":[185],"Finally,":[186],"our":[187],"work":[188],"first":[191],"provide":[193],"noteworthy":[194],"results":[195],"over":[202],"tigress":[204],"obfuscator,":[205],"well-established":[209],"open-source":[210],"obfuscator.":[211]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
