🇨🇿 Czech parliamentary elections are happening 3–4 Oct 2025, with Andrej Babiš’s ANO likely to return.

We’re hosting a roundtable with experts on Czech politics, society & public opinion to unpack the results and what they mean for democracy and Europe.

🗓 9 Oct | 🕕 6pm | Online & in-person @ SSEES, UCL

Join the conversation! #CzechElections #CentralEurope #SSEES #BCSA

https://www.ucl.ac.uk/arts-humanities/events/2025/oct/democracy-crossroads-czech-parliamentary-elections-and-their-implications

Democracy at a crossroads? The Czech parliamentary elections and their implications

A roundtable discussion organised by the SSEESing NOW seminar series, co-sponsored by the British Czech and Slovak Association (BCSA)

Faculty of Arts and Humanities

This paper looks promising: "SIGMADIFF: Semantics-Aware Deep Graph Matching for Pseudocode Diffing".

https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=9671&context=sis_research

#SigmaDiff #Pseudocode #Diffing #BinaryDiffing #BCSA

Today I realised that the oldest technology developed by me integrated into #Diaphora dates from 2009.

In case you are curious, it's #DeepToad, a Python library for doing fuzzy hashing. This simplistic library calculates a set of 3 different hashes using a configurable block size (in opposite to, say, ssdeep, that doesn't work for this).

https://github.com/joxeankoret/deeptoad

#FuzzyHashing
#DeepToad
#Diaphora
#BinDiffing
#ProgramDiffing
#BCSA

GitHub - joxeankoret/deeptoad: DeepToad is a library and a tool to clusterize similar files using fuzzy hashing

DeepToad is a library and a tool to clusterize similar files using fuzzy hashing - GitHub - joxeankoret/deeptoad: DeepToad is a library and a tool to clusterize similar files using fuzzy hashing

GitHub

One question regarding #bindiffing: Have you ever used a tool called #DeepBinDiff? I am not talking about "BinDiff" but rather about "DeepBinDiff".

#BinaryDiffing #BinaryCodeSimilarityAnalysis #BCSA

Yes
0%
No
14.3%
I didn't even know it
76.2%
I heard about it, but never used it
9.5%
Poll ended at .
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned

Binary code similarity analysis (BCSA) is widely used for diverse security applications, including plagiarism detection, software license violation detection, and vulnerability discovery. Despite the surging research interest in BCSA, it is significantly challenging to perform new research in this field for several reasons. First, most existing approaches focus only on the end results, namely, increasing the success rate of BCSA, by adopting uninterpretable machine learning. Moreover, they utilize their own benchmark, sharing neither the source code nor the entire dataset. Finally, researchers often use different terminologies or even use the same technique without citing the previous literature properly, which makes it difficult to reproduce or extend previous work. To address these problems, we take a step back from the mainstream and contemplate fundamental research questions for BCSA. Why does a certain technique or a certain feature show better results than the others? Specifically, we conduct the first systematic study on the basic features used in BCSA by leveraging interpretable feature engineering on a large-scale benchmark. Our study reveals various useful insights on BCSA. For example, we show that a simple interpretable model with a few basic features can achieve a comparable result to that of recent deep learning-based approaches. Furthermore, we show that the way we compile binaries or the correctness of underlying binary analysis tools can significantly affect the performance of BCSA. Lastly, we make all our source code and benchmark public and suggest future directions in this field to help further research.

arXiv.org

Dear everyone in the academia using "Machine Learning" for Binary Code Similarity Analysis (ie, bindiffing): AI is bad for anything that requires exact results. It will generate a huge amount of false positives mixed with a varying degree of similar results and is pretty hard to understand its output.

#bindiffing #BinaryDiffing #ProgramDiffing #MachineLearning #BCSA #ArtificialIntelligence

@alkarterri @urtziurkizu
...eta munduko gauzarik normalena balitz bezala onartzen dugu!! 😡
Urkulluren Basque Country S.A. ( #BCSA ) indartu ahala doa Euskal Herria ahultzen... 😢