Bin2Vec: Interpretable and Auditable Multi-View Binary Analysis for Code Plagiarism Detection

Reading time: 6 minute
...

📝 Original Info

  • Title: Bin2Vec: Interpretable and Auditable Multi-View Binary Analysis for Code Plagiarism Detection
  • ArXiv ID: 2512.02197
  • Date: 2025-12-01
  • Authors: Moussa Moussaoui, Tarik Houichime, Abdelalim Sadiq

📝 Abstract

We introduce Bin2Vec, a new framework that helps compare software programs in a clear and explainable way. Instead of focusing only on one type of information, Bin2Vec combines what a program looks like (its built-in functions, imports, and exports) with how it behaves when it runs (its instructions and memory usage). This gives a more complete picture when deciding whether two programs are similar or not. Bin2Vec represents these different types of information as views that can be inspected separately using easy-to-read charts, and then brings them together into an overall similarity score. Bin2Vec acts as a bridge between binary representations and machine learning techniques by generating feature representations that can be efficiently processed by machine-learning models. We tested Bin2Vec on multiple versions of two well-known Windows programs, PuTTY and 7-Zip. The primary results strongly confirmed that our method compute an optimal and visualization-friendly representation of the analyzed software. For example, PuTTY versions showed more complex behavior and memory activity, while 7-Zip versions focused more on performance-related patterns. Overall, Bin2Vec provides decisions that are both reliable and explainable to humans. Because it is modular and easy to extend, it can be applied to tasks like auditing, verifying software origins, or quickly screening large numbers of programs in cybersecurity and reverse-engineering work.

💡 Deep Analysis

Deep Dive into Bin2Vec: Interpretable and Auditable Multi-View Binary Analysis for Code Plagiarism Detection.

We introduce Bin2Vec, a new framework that helps compare software programs in a clear and explainable way. Instead of focusing only on one type of information, Bin2Vec combines what a program looks like (its built-in functions, imports, and exports) with how it behaves when it runs (its instructions and memory usage). This gives a more complete picture when deciding whether two programs are similar or not. Bin2Vec represents these different types of information as views that can be inspected separately using easy-to-read charts, and then brings them together into an overall similarity score. Bin2Vec acts as a bridge between binary representations and machine learning techniques by generating feature representations that can be efficiently processed by machine-learning models. We tested Bin2Vec on multiple versions of two well-known Windows programs, PuTTY and 7-Zip. The primary results strongly confirmed that our method compute an optimal and visualization-friendly representation of th

📄 Full Content

This is the authors’ original preprint version of a paper accepted for publication at the 8th International Conference on Advanced Communication Technologies and Networking (CommNet 2025), Rabat, Morocco, December 3–5, 2025. The final version will be published and made available via IEEE Xplore. Bin2Vec: Interpretable and Auditable Multi-View Binary Analysis for Code Plagiarism Detection Moussa MOUSSAOUI1, Tarik HOUICHIME2, and Abdelalim SADIQ3 1,3Computer Science Research Laboratory(LaRI), Faculty of Science, Ibn Tofail University, Kenitra, 14000, Morocco 2LRIT, Faculty of Science, Mohammed V University In Rabat, Rabat, 10112, Morocco Emails: 1 moussa.moussaoui@uit.ac.ma, 2 tarik_houichime@um5.ac.ma, 3 a.sadiq@uit.ac.ma Abstract—We introduce Bin2Vec, a new framework that helps compare software programs in a clear and explainable way. Instead of focusing only on one type of information, Bin2Vec com- bines what a program looks like (its built-in functions, imports, and exports) with how it behaves when it runs (its instructions and memory usage). This gives a more complete picture when deciding whether two programs are similar or not. Bin2Vec represents these different types of information as views that can be inspected separately using easy-to-read charts, and then brings them together into an overall similarity score. Bin2Vec acts as a bridge between binary representations and machine learning techniques by generating feature representations that can be efficiently processed by machine-learning models. We tested Bin2Vec on multiple versions of two well-known Windows programs, PuTTY and 7-Zip. The primary results strongly confirmed that our method compute an optimal and visualization- friendly representation of the analyzed software. For example, PuTTY versions showed more complex behavior and memory activity, while 7-Zip versions focused more on performance- related patterns. Overall, Bin2Vec provides decisions that are both reliable and explainable to humans. Because it is modular and easy to extend, it can be applied to tasks like auditing, verifying software origins, or quickly screening large numbers of programs in cybersecurity and reverse-engineering work. Index Terms—Binary similarity, embeddings, dynamic traces, software forensics, plagiarism detection, interpretability, au- ditability, xAI I. INTRODUCTION Binary code similarity (BCS) forms the base for various critical tasks, such as hunting security flaws and examining software patches, tracing malware origins and grouping them, detecting code sources or plagiarism in multiple releases, and scanning vast code repositories. Though highly useful, BCS remains inherently challenging: compilers and linkers modify instruction and data flows; removing identifiers eliminates meaningful indicators of code intent; deliberate obfuscation distorts the overall structure; and comparisons across diverse architectures or optimization variants produce significant struc- tural variations. In practical settings, these approaches must expand from identifying differences in small code segments to retrieving matches over entire programs within hundreds of thousands of artifacts. Graph-based methodologies translate code functions into semantic vector encodings, enabling robust similarity detection despite compiler-induced variations. While this structural- semantic approach captures deep programmatic logic, it is computationally intensive and struggles with significant code obfuscation or cross-architectural comparisons. An alternative, high-performance approach scales function-level vector encod- ings for rapid, real-time matching, trading explanatory power for build resilience and speed. Massive-scale comparisons are achieved by further compressing entire programs into compact, fixed-size representations, which introduces a trade- off between search velocity and the potential for detail loss. These static alignment techniques optimize for cross-variant matching speed and quality, but they remain vulnerable to structural obfuscation and are fundamentally incapable of capturing dynamic runtime behavior. To address this gap, we introduced Bin2Vec (Binary to Vectors), a modular trace-centric methodology. Which con- structs compact, comparable embeddings from multiple com- plementary signals that are readily available or derivable in practical reverse engineering work-flows. We capture the dynamic behaviour using x64dbg alongside static informations from Ghidra [73], [74]. This multi-view design aims to be robust to single-signal brittleness while maintaining inter- pretability. We also provide a reproducible end-to-end pipeline that curates and merges traces, derives per-signal embeddings with deterministic fallback, computes per-feature and global similarities. By explicitly incorporating behavioral analysis via execution traces and register usage, Bin2Vec complements graph and hashing-based approaches [10], [15], [38], [62], [71]. Its practical advantages are transpare

…(Full text truncated)…

📸 Image Gallery

bars_exports.png bars_exports.webp bars_functions.png bars_functions.webp bars_imports.png bars_imports.webp bars_registers.png bars_registers.webp bars_traces.png bars_traces.webp methodology.jpg methodology.webp radar_exports.png radar_exports.webp radar_functions.png radar_functions.webp radar_imports.png radar_imports.webp radar_registers.png radar_registers.webp radar_traces.png radar_traces.webp

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut