{"id":"https://openalex.org/W4415117323","doi":"https://doi.org/10.32604/cmc.2025.070195","title":"Binary Code Similarity Detection: Retrospective Review and Future Directions","display_name":"Binary Code Similarity Detection: Retrospective Review and Future Directions","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415117323","doi":"https://doi.org/10.32604/cmc.2025.070195"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.070195","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.070195","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.070195","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Shengjia Chang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shengjia Chang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084818732","display_name":"Baojiang Cui","orcid":"https://orcid.org/0000-0001-6937-4068"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Baojiang Cui","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5000053534","display_name":"Shaocong Feng","orcid":"https://orcid.org/0009-0007-6503-944X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shaocong Feng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40699025,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"3","first_page":"4345","last_page":"4374"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9229999780654907,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.44589999318122864},{"id":"https://openalex.org/keywords/toolbox","display_name":"Toolbox","score":0.4392000138759613},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.4036000072956085},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.36809998750686646},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.36250001192092896},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.35690000653266907},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.3407000005245209},{"id":"https://openalex.org/keywords/transformative-learning","display_name":"Transformative learning","score":0.33880001306533813},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.32829999923706055}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7312999963760376},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5033000111579895},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.44589999318122864},{"id":"https://openalex.org/C2777655017","wikidata":"https://www.wikidata.org/wiki/Q1501161","display_name":"Toolbox","level":2,"score":0.4392000138759613},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.4036000072956085},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3935999870300293},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.36809998750686646},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.36250001192092896},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.35690000653266907},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3407000005245209},{"id":"https://openalex.org/C70587473","wikidata":"https://www.wikidata.org/wiki/Q7834111","display_name":"Transformative learning","level":2,"score":0.33880001306533813},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.32899999618530273},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.32829999923706055},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C2777561058","wikidata":"https://www.wikidata.org/wiki/Q2652119","display_name":"Program comprehension","level":4,"score":0.30799999833106995},{"id":"https://openalex.org/C130318100","wikidata":"https://www.wikidata.org/wiki/Q2268914","display_name":"Semantic similarity","level":2,"score":0.30630001425743103},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3001999855041504},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.2930000126361847},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.28600001335144043},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.28279998898506165},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.2615000009536743},{"id":"https://openalex.org/C161301231","wikidata":"https://www.wikidata.org/wiki/Q3478658","display_name":"Knowledge representation and reasoning","level":2,"score":0.25929999351501465},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.2563000023365021},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2540999948978424},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.070195","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.070195","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.070195","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.070195","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W844137998","https://openalex.org/W1663984431","https://openalex.org/W1967185446","https://openalex.org/W1990244497","https://openalex.org/W2559784535","https://openalex.org/W2620895032","https://openalex.org/W2790751137","https://openalex.org/W2971865858","https://openalex.org/W3010126799","https://openalex.org/W3011088748","https://openalex.org/W3098605233","https://openalex.org/W3108936298","https://openalex.org/W3127424491","https://openalex.org/W3139081114","https://openalex.org/W3153398259","https://openalex.org/W3170092793","https://openalex.org/W3177049011","https://openalex.org/W3198685994","https://openalex.org/W3217475099","https://openalex.org/W4221166942","https://openalex.org/W4244720976","https://openalex.org/W4389438812","https://openalex.org/W4394985008","https://openalex.org/W4404783570","https://openalex.org/W4408797770","https://openalex.org/W4411232016","https://openalex.org/W4414359713"],"related_works":[],"abstract_inverted_index":{"Binary":[0],"Code":[1],"Similarity":[2],"Detection":[3],"(BCSD)":[4],"is":[5,19,96,120],"vital":[6],"for":[7,155,184,240],"vulnerability":[8],"discovery,":[9],"malware":[10],"detection,":[11],"and":[12,30,45,59,75,84,114,131,149,163,170,176,181,212,242,250],"software":[13],"security,":[14],"especially":[15],"when":[16],"source":[17],"code":[18,57,157,203],"unavailable.":[20],"Yet,":[21],"it":[22],"faces":[23],"challenges":[24,180],"from":[25],"semantic":[26,61,112,169],"loss,":[27],"recompilation":[28],"variations,":[29],"obfuscation.":[31],"Recent":[32],"advances":[33],"in":[34,110,167,214,225],"artificial":[35,90],"intelligence\u2014particularly":[36],"natural":[37],"language":[38,47],"processing":[39],"(NLP),":[40],"graph":[41],"representation":[42,113],"learning":[43],"(GRL),":[44],"large":[46],"models":[48],"(LLMs)\u2014have":[49],"markedly":[50],"improved":[51],"accuracy,":[52,210],"enabling":[53],"better":[54],"recognition":[55],"of":[56,69,82,89,101,133,138,151,165,173,201],"variants":[58],"deeper":[60],"understanding.":[62],"This":[63,217],"paper":[64],"presents":[65],"a":[66,222,232,237],"comprehensive":[67],"review":[68,119,218],"82":[70],"studies":[71],"published":[72],"between":[73],"1975":[74],"2025,":[76],"systematically":[77],"tracing":[78],"the":[79,86,99,128,136,147,160,178,193,199,226],"historical":[80],"evolution":[81],"BCSD":[83,248],"analyzing":[85],"progressive":[87],"incorporation":[88],"intelligence":[91],"(AI)":[92],"techniques.":[93],"Particular":[94],"emphasis":[95],"placed":[97],"on":[98],"role":[100],"LLMs,":[102],"which":[103],"have":[104],"recently":[105],"emerged":[106],"as":[107,236],"transformative":[108],"tools":[109],"advancing":[111],"enhancing":[115],"detection":[116],"performance.":[117],"The":[118],"organized":[121],"around":[122],"five":[123],"central":[124],"research":[125],"questions:":[126],"(1)":[127],"chronological":[129],"development":[130],"milestones":[132],"BCSD;":[134],"(2)":[135],"construction":[137],"AI-driven":[139],"technical":[140],"roadmaps":[141],"that":[142],"chart":[143],"methodological":[144],"transitions;":[145],"(3)":[146],"design":[148],"implementation":[150],"general":[152],"analytical":[153],"workflows":[154],"binary":[156,174,202],"analysis;":[158],"(4)":[159],"applicability,":[161],"strengths,":[162],"limitations":[164],"LLMs":[166,197],"capturing":[168],"structural":[171],"features":[172],"code;":[175],"(5)":[177],"persistent":[179],"promising":[182],"directions":[183],"future":[185],"investigation.":[186],"By":[187],"synthesizing":[188],"insights":[189],"across":[190],"these":[191],"dimensions,":[192],"study":[194],"demonstrates":[195],"how":[196],"reshape":[198],"landscape":[200],"analysis,":[204],"offering":[205],"unprecedented":[206],"opportunities":[207],"to":[208,245],"improve":[209],"scalability,":[211],"adaptability":[213],"real-world":[215],"scenarios.":[216],"not":[219],"only":[220],"bridges":[221],"critical":[223],"gap":[224],"existing":[227],"literature":[228],"but":[229],"also":[230],"provides":[231],"forward-looking":[233],"perspective,":[234],"serving":[235],"valuable":[238],"reference":[239],"researchers":[241],"practitioners":[243],"aiming":[244],"advance":[246],"AI-powered":[247],"methodologies":[249],"applications.":[251]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-14T00:00:00"}
