{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:10Z","timestamp":1763468170011,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/msr.2013.6624046","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T17:46:58Z","timestamp":1382032018000},"page":"329-338","source":"Crossref","is-referenced-by-count":61,"title":["Rendezvous: A search engine for binary code"],"prefix":"10.1109","author":[{"given":"Wei Ming","family":"Khoo","sequence":"first","affiliation":[]},{"given":"Alan","family":"Mycroft","sequence":"additional","affiliation":[]},{"given":"Ross","family":"Anderson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572287"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985453"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1348250.1348256"},{"key":"13","first-page":"45","article-title":"Practical graph isomorphism","volume":"30","author":"mckay","year":"1981","journal-title":"Congressus Numerantium"},{"journal-title":"Similarity (Lucene 3 6 2 API)","year":"0","key":"14"},{"key":"11","first-page":"207","article-title":"Polymorphic worm detection using structural information of executables","author":"kru?gel","year":"2005","journal-title":"RAID"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1177\/109434200001400404"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"journal-title":"Software Plagiarism Detection with PEGs","year":"2011","author":"gautier","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"23","first-page":"20","article-title":"CP-miner: A tool for finding copy-paste and related bugs in operating system code","volume":"6","author":"li","year":"2004","journal-title":"Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.06.044"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227178"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421004"},{"key":"27","first-page":"64","article-title":"Fileprints: Identifying file types by n-gram analysis","author":"li","year":"2005","journal-title":"2005 IEEE Workshop on Information Assurance"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.016865"},{"key":"29","article-title":"Graph-based comparison of executable objects","author":"dullien","year":"2005","journal-title":"Proceedings of Symposium sur la Se?curite? des Technologies de L'information et des Communications (SSTIC'05)"},{"journal-title":"Current Developments in GPL Compliance","year":"2012","author":"welte","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2007.10"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"year":"0","key":"1"},{"key":"30","article-title":"Scalable, behavior-based malware clustering","author":"bayer","year":"2009","journal-title":"Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS'09)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"6","first-page":"13","article-title":"Dynamic analysis from the bottom up","author":"mock","year":"2003","journal-title":"Proc 1st ICSE Int Workshop on Dynamic Analysis (WODA)"},{"journal-title":"The Open Source Network","year":"0","key":"5"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066753"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173063"}],"event":{"name":"2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)","start":{"date-parts":[[2013,5,18]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,5,19]]}},"container-title":["2013 10th Working Conference on Mining Software Repositories (MSR)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6597024\/6623991\/06624046.pdf?arnumber=6624046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:19:51Z","timestamp":1490228391000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6624046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":30,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/msr.2013.6624046","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}