Confidential — Stefan Michaelcheck Only

Android Binary XV Diffing Code and Data

2026resource releaseapplicationdataset

Zenodo (CERN European Organization for Nuclear Research)

https://doi.org/10.5281/zenodo.18396268OpenAlex: W7125944642
1
URLs Found
0
Internal Citations
0
Authors
usable
Abstract Quality
GPT-5.5 Abstract Analysis

Problems Identified (5)

Android binary cross-version diffing: The paper addresses high-precision cross-version diffing for Android binaries.

Obfuscated function-level change detection: The paper targets identifying function-level changes in Android binaries even under heavy obfuscation.

Cross-version security-property reasoning: The paper addresses reasoning over app versions to detect functional changes and security-property evolution.

Android binary cross-version diffing: The paper addresses high-precision cross-version diffing for Android binaries.

Obfuscated function-level change detection: The paper targets identifying function-level changes in Android binaries even under heavy obfuscation.

Proposed Solutions (5)

XvDiff Android binary diffing: XvDiff is a cross-version Android binary diffing tool combining structural code-feature similarity with LLM-based semantic reasoning.

XvCKG multi-version code knowledge graph: XvCKG is a multi-version Android code knowledge graph that combines version-specific information with cross-version differential information.

Agentic RAG analysis framework: The paper develops an automated analysis framework using agentic retrieval-augmented generation for cross-version reasoning.

XvDiff Android binary diffing: XvDiff is a cross-version Android binary diffing tool combining structural code-feature similarity with LLM-based semantic reasoning.

XvCKG multi-version code knowledge graph: XvCKG is a multi-version Android code knowledge graph that combines version-specific information with cross-version differential information.

Results (3)

High-precision high-performance diffing:

Obfuscation-robust change identification:

Outperforms state-of-the-art diffing:

Research Domain

Android binary analysis and cross-version diffing

← Back to all papers