H. Huang, A. Youssef, and M. Debbabi, BinSequence, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, 2017.
DOI : 10.1145/1572272.1572287

S. Alrabaee, P. Shirani, M. Debbabi, and W. Lingyu, On the Feasibility of Malware Authorship Attrubution, International Symposium on Foundations and Practice of Security, pp.256-272, 2016.

S. Alrabaee, P. Shirani, W. Lingyu, and M. Debbabi, SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code, Digital Investigation, pp.61-71, 2015.
DOI : 10.1016/j.diin.2015.01.011

. Diaphora, A Program Diffing Plugin for IDA Pro, https://github

A. Andoni and P. Indyk, Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions, Communications of the ACM, vol.51, issue.1, pp.117-122, 2008.
DOI : 10.1145/1327452.1327494

G. Bonfante, J. Marion, F. Sabatier, and A. Thierry, Code Synchronization by Morphological Analysis. Malicious and Unwanted Software, pp.112-119, 2012.
DOI : 10.1109/malware.2012.6461016

URL : https://hal.archives-ouvertes.fr/hal-00764286

M. Bourquin, A. King, and E. Robbins, BinSlayer, Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop on, PPREW '13, pp.1-410, 2013.
DOI : 10.1145/2430553.2430557

S. Cesare, Y. Xiang, and W. Zhou, Control Flow-Based Malware Variant Detection. Dependable and Secure Computing, IEEE Transactions, vol.11, pp.307-317, 2014.

S. Chaki, C. Cohen, and A. Gurfinkel, Supervised learning for provenance-similarity of binaries, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.15-23, 2011.
DOI : 10.1145/2020408.2020419

J. R. Cordy and C. K. Roy, DebCheck: Efficient Checking for Open Source Code Clones in Software Systems, 2011 IEEE 19th International Conference on Program Comprehension, pp.217-218, 2011.
DOI : 10.1109/ICPC.2011.27

URL : http://research.cs.queensu.ca/home/cordy/Papers/CR-DebCheck-Tool-ICPC11.pdf

Y. David and E. Yahav, Tracelet-Based Code Search in Executables, Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. PLDI '14, pp.349-360, 2014.
DOI : 10.1145/2666356.2594343

T. Dullien and R. Rolles, Graph-Based Comparison of Executable Objects (english version), SSTIC, vol.5, pp.1-3, 2005.

R. Elva and G. Leavens, Semantic clone detection using method IOE-behavior, 2012 6th International Workshop on Software Clones (IWSC), pp.80-81, 2012.
DOI : 10.1109/IWSC.2012.6227874

M. R. Farhadi, B. C. Fung, P. Charland, and M. Debbabi, BinClone: Detecting Code Clones in Malware, 2014 Eighth International Conference on Software Security and Reliability, pp.78-87, 2014.
DOI : 10.1109/SERE.2014.21

H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck, Structural detection of android malware using embedded call graphs, Proceedings of the 2013 ACM workshop on Artificial intelligence and security, AISec '13, pp.45-54, 2013.
DOI : 10.1145/2517312.2517315

. Hex-rays, Fast Library Identifiation and Recognition Technology: In-Depth, https

E. R. Jacobson, N. Rosenblum, and B. P. Miller, Labeling library functions in stripped binaries, Proceedings of the 10th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools, PASTE '11, pp.1-8, 2011.
DOI : 10.1145/2024569.2024571

W. Jin, S. Chaki, C. Cohen, A. Gurfinkel, J. Havrilla et al., Binary Function Clustering Using Semantic Hashes, 2012 11th International Conference on Machine Learning and Applications, pp.386-391, 2012.
DOI : 10.1109/ICMLA.2012.70

P. Junod, J. Rinaldini, J. Wehrli, and J. Michielin, Obfuscator-LLVM -- Software Protection for the Masses, 2015 IEEE/ACM 1st International Workshop on Software Protection, pp.3-9, 2015.
DOI : 10.1109/SPRO.2015.10

I. Keivanloo, J. Rilling, and P. Charland, Internet-scale Real-time Code Clone Search Via Multi-level Indexing, 2011 18th Working Conference on Reverse Engineering, pp.23-27, 2011.
DOI : 10.1109/WCRE.2011.13

W. M. Khoo, A. Mycroft, and R. Anderson, Rendezvous: A search engine for binary code, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.329-338, 2013.
DOI : 10.1109/MSR.2013.6624046

URL : http://www.cl.cam.ac.uk/~wmk26/rendezvous/msr13.pdf

J. Kinable and O. Kostakis, Malware classification based on call graph clustering, Journal in Computer Virology, vol.2, issue.1, pp.233-245, 2011.
DOI : 10.1109/TCBB.2007.358301

URL : http://arxiv.org/pdf/1008.4365.pdf

A. Lakhotia, M. D. Preda, and R. Giacobazzi, Fast location of similar code fragments using semantic 'juice', Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop on, PPREW '13, pp.1-5, 2013.
DOI : 10.1145/2430553.2430558

J. Milletary, Citadel Trojan Malware Analysis, Dell SecureWorks Counter Threat Unit Intelligence Services, 2012.

B. H. Ng and A. Prakash, Expose: Discovering Potential Binary Code Re-use, 2013 IEEE 37th Annual Computer Software and Applications Conference, pp.492-501, 2013.
DOI : 10.1109/COMPSAC.2013.83

A. Rahimian, R. Ziarati, S. Preda, and M. Debbabi, On the Reverse Engineering of the Citadel Botnet, Foundations and Practice of Security (LNCS), pp.408-425, 2014.
DOI : 10.1007/978-3-319-05302-8_25

A. Rajaraman and J. D. Ullman, Mining of Massive Datasets, 2014.
DOI : 10.1017/CBO9781139058452

Y. Ye, D. Wang, T. Li, and Q. Jiang, An intelligent PE-malware detection system based on association mining, Journal in Computer Virology, vol.51, issue.8, pp.323-334, 2008.
DOI : 10.1007/s11416-008-0082-4

URL : http://users.cis.fiu.edu/%7Etaoli/pub/imds-journal-jv2008.pdf