[USENIX Security '17] BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking Aug 16, 2017ยท Jiang Ming , Dongpeng Xu , Yufei Jiang , Dinghao Wu ยท 0 min read Cite Type Conference paper Publication In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, August 16-18, 2017. (Acceptance rate 16.3%=85/522) Last updated on Aug 16, 2017 Computer Security Authors Jiang Ming Associate Professor of Computer Science ← [USENIX Security '18] Towards Predicting Efficient and Anonymous Tor Circuits Aug 16, 2018 [S&P '17] Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping May 22, 2017 →