BinCodex: A comprehensive and multi-level dataset for evaluating binary code similarity detection techniques
The binary code similarity detection (BCSD) technique can quantitatively measure the differences between two given binaries and give matching results at predefined granularity (e.g., function), and has been widely used in multiple scenarios including software vulnerability search, security patch ana...
| Published in: | BenchCouncil Transactions on Benchmarks, Standards and Evaluations |
|---|---|
| Main Authors: | Peihua Zhang, Chenggang Wu, Zhe Wang |
| Format: | Article |
| Language: | English |
| Published: |
KeAi Communications Co. Ltd.
2024-06-01
|
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2772485924000152 |
Similar Items
Survey of Binary Code Similarity Detection Method
by: WEI Youyuan, SONG Jianhua, ZHANG Yan
Published: (2025-06-01)
by: WEI Youyuan, SONG Jianhua, ZHANG Yan
Published: (2025-06-01)
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
by: M. O. Shudrak, et al.
Published: (2012-12-01)
by: M. O. Shudrak, et al.
Published: (2012-12-01)
A Framework to Quantify the Quality of Source Code Obfuscation
by: Hongjoo Jin, et al.
Published: (2024-06-01)
by: Hongjoo Jin, et al.
Published: (2024-06-01)
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
by: Tomer Raitsis, et al.
Published: (2025-01-01)
by: Tomer Raitsis, et al.
Published: (2025-01-01)
Binary Code Representation With Well-Balanced Instruction Normalization
by: Hyungjoon Koo, et al.
Published: (2023-01-01)
by: Hyungjoon Koo, et al.
Published: (2023-01-01)
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
by: Jae Hyuk Suk, et al.
Published: (2020-01-01)
by: Jae Hyuk Suk, et al.
Published: (2020-01-01)
Diversified Compilation Method Based on LLVM
by: CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng
Published: (2025-07-01)
by: CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng
Published: (2025-07-01)
VoteSim: Voting-Based Binary Code Similarity Detection for Vulnerability Identification in IoT Firmware
by: Keda Sun, et al.
Published: (2025-09-01)
by: Keda Sun, et al.
Published: (2025-09-01)
IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations
by: Zhenhao Luo, et al.
Published: (2023-09-01)
by: Zhenhao Luo, et al.
Published: (2023-09-01)
C Source code Obfuscation using Hash Function and Encryption Algorithm
by: Sarah Rosdiana Tambunan, et al.
Published: (2023-07-01)
by: Sarah Rosdiana Tambunan, et al.
Published: (2023-07-01)
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, et al.
Published: (2022-12-01)
by: Yuqiang XIAO, et al.
Published: (2022-12-01)
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Published: (2022-12-01)
by: Yuqiang XIAO, Yunfei GUO, Yawen WANG
Published: (2022-12-01)
Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models
by: Norimitsu Ito, et al.
Published: (2023-01-01)
by: Norimitsu Ito, et al.
Published: (2023-01-01)
Adversarial Attacks Against Binary Similarity Systems
by: Gianluca Capozzi, et al.
Published: (2024-01-01)
by: Gianluca Capozzi, et al.
Published: (2024-01-01)
Binary Code Similarity Detection Method Based on Pre-training Assembly Instruction Representation
by: WANG Taiyan, PAN Zulie, YU Lu, SONG Jingbin
Published: (2023-04-01)
by: WANG Taiyan, PAN Zulie, YU Lu, SONG Jingbin
Published: (2023-04-01)
Study on Binary Code Similarity Detection Based on Jump-SBERT
by: YAN Yintong, YU Lu, WANG Taiyan, LI Yuwei, PAN Zulie
Published: (2024-05-01)
by: YAN Yintong, YU Lu, WANG Taiyan, LI Yuwei, PAN Zulie
Published: (2024-05-01)
BEDetector: A Two-Channel Encoding Method to Detect Vulnerabilities Based on Binary Similarity
by: Lu Yu, et al.
Published: (2021-01-01)
by: Lu Yu, et al.
Published: (2021-01-01)
BlockMatch: A Fine-Grained Binary Code Similarity Detection Approach Using Contrastive Learning for Basic Block Matching
by: Zhenhao Luo, et al.
Published: (2023-11-01)
by: Zhenhao Luo, et al.
Published: (2023-11-01)
Estimation of similarity between functions extracted from x86 executable files
by: Berta Katarina, et al.
Published: (2015-01-01)
by: Berta Katarina, et al.
Published: (2015-01-01)
Cross-Architecture Binary Code Similarity-Detection Method Based on Contextual Information
by: Xingyu Zeng, et al.
Published: (2025-08-01)
by: Xingyu Zeng, et al.
Published: (2025-08-01)
Optimizing RTL Code Obfuscation: New Methods Based on XML Syntax Tree
by: Hanwen Yi, et al.
Published: (2023-12-01)
by: Hanwen Yi, et al.
Published: (2023-12-01)
Identifying Compiler and Optimization Level in Binary Code From Multiple Architectures
by: Davide Pizzolotto, et al.
Published: (2021-01-01)
by: Davide Pizzolotto, et al.
Published: (2021-01-01)
Code4ML: a large-scale dataset of annotated Machine Learning code
by: Anastasia Drozdova, et al.
Published: (2023-02-01)
by: Anastasia Drozdova, et al.
Published: (2023-02-01)
GBsim: A Robust GCN-BERT Approach for Cross-Architecture Binary Code Similarity Analysis
by: Jiang Du, et al.
Published: (2025-04-01)
by: Jiang Du, et al.
Published: (2025-04-01)
ToolPhet: Inference of Compiler Provenance From Stripped Binaries With Emerging Compilation Toolchains
by: Hohyeon Jang, et al.
Published: (2024-01-01)
by: Hohyeon Jang, et al.
Published: (2024-01-01)
Review of path branch obfuscation
by: Pu GENG, et al.
Published: (2020-04-01)
by: Pu GENG, et al.
Published: (2020-04-01)
On the Automatic Analysis of the Practical Resistance of Obfusting Transformations
by: Petr D. Borisov, et al.
Published: (2019-09-01)
by: Petr D. Borisov, et al.
Published: (2019-09-01)
Anti-semantic Analysis Script Fusion Technology
by: TIAN Bowen, YANG Ju, XIONG Xiaobing, DUAN Shuang, WEI Ran
Published: (2025-01-01)
by: TIAN Bowen, YANG Ju, XIONG Xiaobing, DUAN Shuang, WEI Ran
Published: (2025-01-01)
Binary Fuzzy Codes and Some Properties of Hamming Distance of Fuzzy Codes
by: Mezgebu Manmekto Gereme, et al.
Published: (2023-03-01)
by: Mezgebu Manmekto Gereme, et al.
Published: (2023-03-01)
A Lower Bound on the Success Probability of Binary Random Linear Network Codes Aided by Noise Decoding
by: Ioannis Chatzigeorgiou
Published: (2025-01-01)
by: Ioannis Chatzigeorgiou
Published: (2025-01-01)
A Serial Concatenation of Binary-Input Nonbinary-Output Convolutional Code and Recursive Convolutional Lattice Code
by: Toshiki Matsumine, et al.
Published: (2018-01-01)
by: Toshiki Matsumine, et al.
Published: (2018-01-01)
New Results on Binary Codes Obtained by Doubling Construction
by: Davydov Alexander A., et al.
Published: (2018-05-01)
by: Davydov Alexander A., et al.
Published: (2018-05-01)
OLP—A RESTful Open Low-Code Platform
by: Mauro A. A. da Cruz, et al.
Published: (2021-09-01)
by: Mauro A. A. da Cruz, et al.
Published: (2021-09-01)
Augmented LT codes over binary extension fields with increased ratio of full‐degree columns
by: Changyue Jiang, et al.
Published: (2024-03-01)
by: Changyue Jiang, et al.
Published: (2024-03-01)
AnnotationGym: A Generic Framework for Automatic Source Code Annotation
by: Hafsah Shahzad, et al.
Published: (2025-01-01)
by: Hafsah Shahzad, et al.
Published: (2025-01-01)
CGGNet: Compiler-Guided Generation Network for Smart Contract Data Augmentation
by: Seon-Jin Hwang, et al.
Published: (2024-01-01)
by: Seon-Jin Hwang, et al.
Published: (2024-01-01)
Codex Theresianus of 1766: Codification Works, Structure, main Content and Significance of Roman Law Reception during its Conclusion Process
by: Roman Savuliak
Published: (2023-11-01)
by: Roman Savuliak
Published: (2023-11-01)
Codex Theresianus of 1766: Codification Works, Structure, main Content and Significance of Roman Law Reception during its Conclusion Process
by: Roman Savuliak
Published: (2023-11-01)
by: Roman Savuliak
Published: (2023-11-01)
Exploring the Boundaries Between LLM Code Clone Detection and Code Similarity Assessment on Human and AI-Generated Code
by: Zixian Zhang, et al.
Published: (2025-02-01)
by: Zixian Zhang, et al.
Published: (2025-02-01)
Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based similarity model
by: Salha M. Alzahrani, et al.
Published: (2015-07-01)
by: Salha M. Alzahrani, et al.
Published: (2015-07-01)
Similar Items
-
Survey of Binary Code Similarity Detection Method
by: WEI Youyuan, SONG Jianhua, ZHANG Yan
Published: (2025-06-01) -
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
by: M. O. Shudrak, et al.
Published: (2012-12-01) -
A Framework to Quantify the Quality of Source Code Obfuscation
by: Hongjoo Jin, et al.
Published: (2024-06-01) -
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
by: Tomer Raitsis, et al.
Published: (2025-01-01) -
Binary Code Representation With Well-Balanced Instruction Normalization
by: Hyungjoon Koo, et al.
Published: (2023-01-01)
