Fool Me If You Can: On the Robustness of Binary Code Similarity Detection Models against Semantics-preserving Transformations
Authors/Creators
- 1. Sungkyunkwan University
- 2. Stony Brook University
Description
This artifact supports the claims made in the FSE ’26 paper, Fool Me If You Can: On the Robustness of Binary Code Similarity Detection Models against Semantics-Preserving Transformations. It includes the datasets, pre-trained models, and evaluation scripts necessary to reproduce the paper’s empirical results on the robustness of six binary code similarity detection (BCSD) models under semantics-preserving transformations. The artifact provides pre-built evaluation datasets for eight semantics-preserving transformations across two attack scenarios: false-negative triggering perturbation and false-positive triggering perturbations. It also includes pre-trained weights for all six evaluated BCSD models, along with a Conda environment and corresponding Docker containers to ensure reproducible execution. Inference and evaluation scripts are provided to run all six models on the included datasets and compute the evaluation metrics reported in the paper. Additionally, optional dataset generation scripts allow users to regenerate binary variants from source code and reproduce the greedy method for generating false-positive triggering perturbations.
Files
asmfool_artifact.zip
Files
(27.9 GB)
| Name | Size | Download all |
|---|---|---|
|
md5:687ec1f91120384727ee19fff4e2c283
|
22.9 GB | Preview Download |
|
md5:65a3494248f0b9330a955021c6dfd237
|
5.0 GB | Preview Download |
Additional details
Dates
- Updated
-
2026-04-10