Vestige: Identifying Binary Code Provenance for Vulnerability Detection

Yuede Ji, Lei Cui, H. Howie Huang. Vestige: Identifying Binary Code Provenance for Vulnerability Detection. In Kazue Sako, Nils Ole Tippenhauer, editors, Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II. Volume 12727 of Lecture Notes in Computer Science, pages 287-310, Springer, 2021. [doi]

@inproceedings{JiCH21,
  title = {Vestige: Identifying Binary Code Provenance for Vulnerability Detection},
  author = {Yuede Ji and Lei Cui and H. Howie Huang},
  year = {2021},
  doi = {10.1007/978-3-030-78375-4_12},
  url = {https://doi.org/10.1007/978-3-030-78375-4_12},
  researchr = {https://researchr.org/publication/JiCH21},
  cites = {0},
  citedby = {0},
  pages = {287-310},
  booktitle = {Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II},
  editor = {Kazue Sako and Nils Ole Tippenhauer},
  volume = {12727},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-030-78375-4},
}