“…To help resolve these code-reuse-related issues, many binary code similarity analysis works are proposed and have been applied in various applications, including code search [29,30,37,63,79,81], OSS reuse detection [19,31,35,36,43,53,68,71,77], vulnerability detection [25,26,38,76] and patch presence test [51,61,74,78,82]. They usually regard the vulnerable functions or reused functions as the query functions and the functions in the commercial software as the target functions and produce the detection results by calculating the similarity between query functions and target functions.…”