Sept. 4, 2023, 1:10 a.m. | Tristan Benoit, Jean-Yves Marion, Sébastien Bardin

cs.CR updates on arXiv.org arxiv.org

We consider the problem of program clone search, i.e. given a target program
and a repository of known programs (all in executable format), the goal is to
find the program in the repository most similar to the target program - with
potential applications in terms of reverse engineering, program clustering,
malware lineage and software theft detection. Recent years have witnessed a
blooming in code similarity techniques, yet most of them focus on
function-level similarity and function clone search, while we …

analysis applications clustering engineering find problem program repository reverse reverse engineering search spectral target terms

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)

Vice President, Cyber Operations Engineer

@ BlackRock | LO9-London - Drapers Gardens