[41] J. Jang, D. Brumley, and S. Venkataraman. Bitshred: feature hashing malware
for scalable triage and semantic analysis. In ACM Conference on Computer and
Communications Security (CCS’11), Chicago, IL, USA, Oct. 2011.
[42] J. Jang, M. Woo, and D. Brumley. Towards automatic software lineage inference.
In USENIX Security Symposium, Washington, DC, USA, Aug. 2013.
[43] W. Jin, C. Cohen, J. Gennari, C. Hines, S. Chaki, A. Gurfinkel, J. Havrilla, and
P. Narasimhan. Recovering C++ objects from binaries using inter-procedural
data-flow analysis. In Program Protection and Reverse Engineering Workshop
(PPREW’14), San Diego, CA, USA, Jan. 2014.
[44] C. K. Roy and J. R. Cordy. An empirical study of function clones in open source
software. In Working Conference on Reverse Engineering (WCRE’08), Antwerp,
Belgium, Oct. 2008.
[45] T. Kamiya, S. Kusumoto, and K. Inoue. Ccfinder: A multilinguistic token-based
code clone detection system for large scale source code. IEEE Transactions on
Software Engineering, 28(7):654–670, Aug. 2002.
[46] W. M. Khoo, A. Mycroft, and R. Anderson. Rendezvous: A search engine for
binary code. In Working Conference on Mining Software Repositories (MSR’13),
Piscataway, NJ, USA, May 2013.
[47] R. Komondoor and S. Horwitz. Using slicing to identify duplication in source
code. In International Symposium on Static Analysis (SAS’01). Springer, Paris,
France, July 2001.
[48] C. Lattner. LLVM and clang: Next generation compiler technology. In The BSD
Conference, Ottawa, ON, Canada, May 2008. http://clang.llvm.org.
[49] C. Lattner and V. Adve. LLVM: A compilation framework for lifelong program
analysis transformation. In Code Generation and Optimization (CGO’04), Palo
Alto, CA, USA, Mar. 2004. http://llvm.org.
[50] F. Leder. RE-Google. Online article (2009). http://regoogle.carnivore.
it.
[51] F. Leder. RE-Google plugin documentation. Readme file. https://www.hex-
rays.com/contests/2009/REGoogle/README.TXT.
[52] J. Lee, T. Avgerinos, and D. Brumley. TIE: Principled reverse engineering of
types in binary programs. In Network and Distributed System Security Sympo-
sium (NDSS’11), San Diego, CA, USA, Feb. 2011.
[53] Z. Lin, X. Zhang, and D. Xu. Automatic reverse engineering of data structures
from binary execution. In Network and Distributed System Security Symposium
(NDSS’12), San Diego, CA, USA, Mar. 2010.
86