Sept. 4, 2023, 1:10 a.m. | Tristan Benoit, Jean-Yves Marion, Sébastien Bardin

cs.CR updates on arXiv.org arxiv.org

We consider the problem of program clone search, i.e. given a target program
and a repository of known programs (all in executable format), the goal is to
find the program in the repository most similar to the target program - with
potential applications in terms of reverse engineering, program clustering,
malware lineage and software theft detection. Recent years have witnessed a
blooming in code similarity techniques, yet most of them focus on
function-level similarity and function clone search, while we …

analysis applications clustering engineering find problem program repository reverse reverse engineering search spectral target terms

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)