{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:54:02Z","timestamp":1771952042393,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T00:00:00Z","timestamp":1676592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61902374,62272442,U1736208,61872386"],"award-info":[{"award-number":["61902374,62272442,U1736208,61872386"]}]},{"name":"the Innovation Funding of ICT, CAS","award":["E161040"],"award-info":[{"award-number":["E161040"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,17]]},"DOI":"10.1145\/3579990.3580007","type":"proceedings-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T10:27:10Z","timestamp":1677061630000},"page":"55-67","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques"],"prefix":"10.1145","author":[{"given":"Peihua","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Computing Technology at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Chenggang","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China \/ Zhongguancun Laboratory, China"}]},{"given":"Mingfan","family":"Peng","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Kai","family":"Zeng","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Ding","family":"Yu","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Yuanming","family":"Lai","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Yan","family":"Kang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology at Chinese Academy of Sciences, China"}]},{"given":"Zhe","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology at Chinese Academy of Sciences, China \/ Zhongguancun Laboratory, China"}]}],"member":"320","published-online":{"date-parts":[[2023,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Oberhumer and L\u00e1szl\u00f3 Moln\u00e1r and John F. Reiser","author":"Markus","year":"2022","unstructured":"Markus F.X.J. Oberhumer and L\u00e1szl\u00f3 Moln\u00e1r and John F. Reiser.. 2022. The Ultimate Packer for eXecutables.. https:\/\/linproxy.fan.workers.dev:443\/https\/upx.github.io\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(78)90105-X"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3175492"},{"key":"e_1_3_2_1_4_1","volume-title":"26th USENIX security symposium (USENIX Security 17). 1093\u20131110.","author":"Antonakakis Manos","unstructured":"Manos Antonakakis. 2017. Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17). 1093\u20131110."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991114"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_8_1","unstructured":"Zoe Chen Paul O\u2019Donnell Eric Ottman Steven Trieu and Alan J Michaels. 2020. An Invisible Insider Threat: The Risks of Implanted Medical Devices in Secure Spaces."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420997"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCL.1998.674154"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Ang Cui Michael Costello and Salvatore Stolfo. 2013. When firmware modifications attack: A case study of embedded exploitation. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.7916\/D8P55NKB 10.7916\/D8P55NKB","DOI":"10.7916\/D8P55NKB"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177157"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594343"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052995"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.50"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.22"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00019"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052974"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.38"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.008"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516713"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/357062.357071"},{"key":"e_1_3_2_1_32_1","unstructured":"LLVM Project.. 2022. LLVM Block Frequency Terminology.. https:\/\/linproxy.fan.workers.dev:443\/https\/llvm.org\/docs\/BlockFrequencyTerminology.html."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_15"},{"key":"e_1_3_2_1_35_1","unstructured":"microsoft. 2021. New Security Signals study shows firmware attacks on the rise.. https:\/\/linproxy.fan.workers.dev:443\/https\/www.microsoft.com\/security\/blog\/2021\/03\/30\/new-security-signals-study-shows-firmware-attacks-on-the-rise-heres-how-microsoft-is-working-to-help-eliminate-this-entire-class-of-threats\/."},{"key":"e_1_3_2_1_36_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Ming Jiang","year":"2017","unstructured":"Jiang Ming, Dongpeng Xu, Yufei Jiang, and Dinghao Wu. 2017. $BinSim$: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. In 26th USENIX Security Symposium (USENIX Security 17). 253\u2013270."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813617"},{"key":"e_1_3_2_1_38_1","unstructured":"MNEMONIC LABS. 2020. Uncovering vulnerabilities in pacemakers.. https:\/\/linproxy.fan.workers.dev:443\/https\/www.mnemonic.no\/blog\/uncovering-vulnerabilities-in-pacemakers\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/242857.242869"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359812"},{"key":"e_1_3_2_1_41_1","unstructured":"Oreans Technologies.. 2022. Themida Overview.. https:\/\/linproxy.fan.workers.dev:443\/https\/www.oreans.com\/themida.php."},{"key":"e_1_3_2_1_42_1","volume-title":"Encyclopedia of computer science","author":"Ralston Anthony","unstructured":"Anthony Ralston, Edwin D Reilly, and David Hemmendinger. 2000. Encyclopedia of computer science. Grove\u2019s Dictionaries Inc.."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454035"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522972"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2886012"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.27"},{"key":"e_1_3_2_1_47_1","unstructured":"statista. 2020. Number of Connected IoT Devices Worldwide.. https:\/\/linproxy.fan.workers.dev:443\/https\/www.statista.com\/statistics\/1101442\/iot-number-of-connected-devices-worldwide\/."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/263867.263872"},{"key":"e_1_3_2_1_49_1","unstructured":"Tencent Blade Team. 2021. Exploiting Qualcomm WLAN and Modem Over The Air.. https:\/\/linproxy.fan.workers.dev:443\/https\/blade.tencent.com\/en\/advisories\/qualpwn\/."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884620"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.46"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3149240"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","unstructured":"Hao Wang Wenjie Qu Gilad Katz Wenyu Zhu Zeyu Gao Han Qiu Jianwei Zhuge and Chao Zhang. 2022. jTrans: Jump-Aware Transformer for Binary Code Similarity. arXiv preprint arXiv:2205.12713 https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.48550\/arXiv.2205.12713","DOI":"10.48550\/arXiv.2205.12713"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3041655"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115645"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970312"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00073"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00084"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397361"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2827379"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","unstructured":"Peihua Zhang. 2022. Khaos. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.5281\/zenodo.7496594 10.5281\/zenodo.7496594","DOI":"10.5281\/zenodo.7496594"},{"key":"e_1_3_2_1_62_1","unstructured":"zynamics GmbH and Google LLC. 2022. BinDiff Manual.. https:\/\/linproxy.fan.workers.dev:443\/http\/www.zynamics.com\/bindiff\/manual\/index.html."}],"event":{"name":"CGO '23: 21st ACM\/IEEE International Symposium on Code Generation and Optimization","location":"Montr\u00e9al QC Canada","acronym":"CGO '23","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","SIGPLAN ACM Special Interest Group on Programming Languages","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 21st ACM\/IEEE International Symposium on Code Generation and Optimization"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3579990.3580007","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3579990.3580007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:19Z","timestamp":1750183699000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3579990.3580007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,17]]},"references-count":62,"alternative-id":["10.1145\/3579990.3580007","10.1145\/3579990"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3579990.3580007","relation":{},"subject":[],"published":{"date-parts":[[2023,2,17]]},"assertion":[{"value":"2023-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}