[1]Khoo W M, Mycroft A, Anderson R. Rendezvous: A search engine for binary code[C] Proc of the 10th Working Conf on Mining Software Repositories (MSR). Piscataway, NJ: IEEE, 2013: 329338[2]Meng X. Finegrained binary code authorship identification[C] Proc of the 24th ACM SIGSOFT Int Symp on Foundations of Software Engineering. New York: ACM, 2016: 10971099[3]Yang C, Xu Z, Chen H, et al. ModX: Binary level partially imported thirdparty library detection via program modularization and semantic matching[C] Proc of the 44th Int Conf on Software Engineering. New York: ACM, 2022: 13931405[4]Karande V, Chandra S, Lin Z, et al. BCD: Decomposing binary code into components using graphbased clustering[C] Proc of the 2018 on Asia Conf on Computer and Communications Security. New York: ACM, 2018: 393398[5]Caballero J, Johnson N M, McCamant S, et al. Binary code extraction and interface identification for security applications[C] Proc of the Network and Distributed System Security. New York: ACM, 2010: 391408[6]Rosenblum N, Zhu X, Miller B P. Who wrote this code? identifying the authors of program binaries[G] LNCS 6879: Proc of the 16th European Symp on Research in Computer Security. Berlin: Springer, 2011: 172189[7]Mancoridis S, Mitchell B S, Chen Y, et al. Bunch: A clustering tool for the recovery and maintenance of software system structures[C] Proc of IEEE Int Conf on Software Maintenance (ICSM’99). Piscataway, NJ: IEEE, 1999: 5059[8]Sarhan Q I, Ahmed B S, Bures M, et al. Software module clustering: An indepth literature analysis[J]. IEEE Trans on Software Engineering, 2020, 48(6): 19051928[9]Newman M E J. Fast algorithm for detecting community structure in networks[J]. Physical Review E—Statistical, Nonlinear, and Soft Matter Physics, 2004, 69(6): 66133[10]Lutellier T, Chollak D, Garcia J, et al. Measuring the impact of code dependencies on software architecture recovery techniques[J].IEEE Trans on Software Engineering, 2018, 44(99): 159181[11]Fan M, Liu J, Luo X, et al. Android malware familial classification and representative sample selection via frequent subgraph analysis[J]. IEEE Trans on Information Forensics and Security, 2018, 13(8): 18901905[12]Collberg C, Thomborson C, Low D. A taxonomy of obfuscating transformations[R]. Auckland, New Zealand: Department of Computer Science, The University of Auckland, 1997[13]Averbuch A, Kiperberg M, Zaidenberg N J. Trulyprotect: An efficient VMbased software protection[J]. IEEE Systems Journal, 2013, 7(3): 455466 |