<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2023-9-6-68-82</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-530</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Методология реверс-инжиниринга машинного кода. Часть 2. Статическое исследование</article-title><trans-title-group xml:lang="en"><trans-title>Methodology for Machine Code Reverse Engineering. Part 2. Static Investigation</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-9412-5693</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Израилов</surname><given-names>К. Е.</given-names></name><name name-style="western" xml:lang="en"><surname>Izrailov</surname><given-names>K.</given-names></name></name-alternatives><bio xml:lang="ru"><p>кандидат технических наук, доцент, старший научный сотрудник лаборатории проблем компьютерной безопасности Санкт-Петербургского Федерального исследовательского центра Российской академии наук</p></bio><email xlink:type="simple">konstantin.izrailov@mail.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский Федеральный исследовательский центр Российской академии наук<country>Россия</country></aff><aff xml:lang="en">Saint-Petersburg Federal Research Center of the Russian Academy of Sciences<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>25</day><month>12</month><year>2023</year></pub-date><volume>9</volume><issue>6</issue><fpage>68</fpage><lpage>82</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Израилов К.Е., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Израилов К.Е.</copyright-holder><copyright-holder xml:lang="en">Izrailov K.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/530">https://tuzs.sut.ru/jour/article/view/530</self-uri><abstract><p>Изложены результаты создания единой методологии проведения реверс-инжиниринга машинного кода устройств. Данная, вторая часть цикла статей посвящена статическому исследованию кода с целью восстановления его метаинформации (исходного кода, алгоритмов, архитектуры, концептуальной модели), а также поиска в нем уязвимостей. Проводится обзор научных публикаций на тему существующих методов и средств статического анализа машинного кода. Дается детальное описание и формализация шагов этапа, а также примеры их применения на практике. Частичная схема предлагаемой методологии приводится в графическом виде с указанием получаемых основных и промежуточных результатов.</p></abstract><trans-abstract xml:lang="en"><p>The creating results a unified methodology for reverse engineering the machine code of devices are presented. This second part of the articles series is devoted to static research of code in order to restore its metainformation (source code, algorithms, architecture, conceptual model), as well as search for vulnerabilities in it. A scientific publications review on the topic of existing methods and tools for static analysis of machine code is carried out. A detailed description and formalization of the steps of the stage is given, as well as examples of their application in practice. A proposed methodology partial diagram is presented in graphical form, indicating the main and intermediate results obtained.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>реверс-инжиниринг</kwd><kwd>обратная разработка</kwd><kwd>программная инженерия</kwd><kwd>статический анализ</kwd><kwd>информационная безопасность</kwd><kwd>уязвимости</kwd><kwd>методология</kwd><kwd>схема</kwd></kwd-group><kwd-group xml:lang="en"><kwd>reverse engineering</kwd><kwd>backwards engineering</kwd><kwd>software engineering</kwd><kwd>static analysis</kwd><kwd>information security</kwd><kwd>vulnerabilities</kwd><kwd>methodology</kwd><kwd>scheme</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Израилов К.Е. Методология проведения реверс-инжиниринга машинного кода. Часть 1. Подготовка объекта исследования // Труды учебных заведений связи. 2023. Т. 9. № 5. С. 79‒90. DOI:10.31854/1813-324X-2023-9-5-79-90</mixed-citation><mixed-citation xml:lang="en">Izrailov K. Methodology for Machine Code Reverse Engineering. Part 1. Preparation of the Research Object. Proceedings of the Telecommun. Univ. 2023;9(5):79–90. DOI:10.31854/1813-324X-2023-9-5-79-90</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Падарян В.А., Гетьман А.И., Соловьев М.А., Бакулин М.Г., Борзилов А.И., Каушан В.В. Методы и программные средства, поддерживающие комбинированный анализ бинарного кода // Труды Института системного программирования РАН. 2014. Т. 26. № 1. С. 251–276.</mixed-citation><mixed-citation xml:lang="en">Padaryan V.A., Getman A.I., Solovev M.A., Bakulin M.G., Borzilov A.I., Kaushan V.V. Methods and software tools supporting combined binary code analysis. Proceedings of ISP RAS. 2014;26(1):251–276.</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Бугеря А.Б., Ефимов В.Ю., Кулагин И.И., Падарян В.А., Соловьев М.А., Тихонов А.Ю. Программный комплекс для выявления недекларированных возможностей в условиях отсутствия исходного кода // Труды Института системного программирования РАН. 2019. Т. 31. № 6. С. 33–64. DOI:10.15514/ISPRAS-2019-31(6)-3</mixed-citation><mixed-citation xml:lang="en">Bugerya A.B., Yefimov V.Yu., Kulagin I.I., Padaryan V.A., Solovev M.A., Tikhonov A.Yu. Program complex for detecting undeclared capabilities in the absence of source code. Proceedings of ISP RAS. 2019;31(6):33–64. DOI:10.15514/ISPRAS-2019-31(6)-3</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Долгова К.Н., Чернов А.В., Деревенец Е.О. Методы и алгоритмы восстановления программ на языке ассемблера в программы на языке высокого уровня // Проблемы информационной безопасности. Компьютерные системы. 2008. № 3. С. 54–68.</mixed-citation><mixed-citation xml:lang="en">Dolgova K.N., Chernov A.V., Derevenets Ye.O. Methods and algorithms for restoring assembly language programs into high-level language programs. Information Security Problems. Computer Systems. 2008;3:54–68.</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Новиков В.А., Ломако А.Г., Еремеев М.А., Петренко А.С. Выявление и нейтрализация недекларированных возможностей программ // Proceedings of the 2017 Symposium on Cybersecurity of the Digital Economy (CDE'17, Иннополис, Россия, 19–20 сентября 2017). Санкт-Петербург: Издательский Дом «Афина», 2017. С. 284–287.</mixed-citation><mixed-citation xml:lang="en">Novikov V.A., Lomako A.G., Yeremeev M.A., Petrenko A.S. Identification and neutralization of undeclared program features. Proceedings of the 2017 Symposium on Cybersecurity of the Digital Economy, CDE'17, 19–20 September 2017, Innopolis, Russia. St. Petersburg: Afina Publ.; 2017. p.284–287.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Ревнивых А.В., Велижанин А.С. Методика автоматизированного формирования структуры дизассемблированного листинга // Кибернетика и программирование. 2019. № 2. С. 1–16. DOI:10.25136/2306-4196.2019.2.28272</mixed-citation><mixed-citation xml:lang="en">Revnivikh A.V., Velizhanin A.S. Automated Formation Methodology of disassembled listing structure. Cybernetics and Programming. 2019;2:1–16. DOI:10.25136/2306-4196.2019.2.28272</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Bhardwaj V., Kukreja V., Sharma C., Kansal I., Popali R. Reverse Engineering-A Method for Analyzing Malicious Code Behavior // Proceedings of the International Conference on Advances in Computing, Communication, and Control (ICAC3, Mumbai, India, 03–04 December 2021). IEEE, 2022. PP. 1–5. DOI:10.1109/ICAC353642.2021.9697150</mixed-citation><mixed-citation xml:lang="en">Bhardwaj V., Kukreja V., Sharma C., Kansal I., Popali R. Reverse Engineering-A Method for Analyzing Malicious Code Behavior. Proceedings of the International Conference on Advances in Computing, Communication, and Control, ICAC3, 03–04 December 2021, Mumbai, India. IEEE; 2022. p.1–5. DOI:10.1109/ICAC353642.2021.9697150</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Черчесов А.Э. Фазы загрузки UEFI и способы контроля исполняемых образов // Вопросы защиты информации. 2018. № 2(121). С. 51–53.</mixed-citation><mixed-citation xml:lang="en">Cherchesov A.E. UEFI boot phases and how to control executable images. Voprosy zashchity informatsii. 2018;2(121):51–53.</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Zhang D., Zhang Z., Jiang B., Tse T.H. The Impact of Lightweight Disassembler on Malware Detection: An Empirical Study // Proceedings of the 42nd Annual Computer Software and Applications Conference (Tokyo, Japan, 23–27 July 2018). IEEE, 2018. PP. 620–629. DOI:10.1109/COMPSAC.2018.00094</mixed-citation><mixed-citation xml:lang="en">Zhang D., Zhang Z., Jiang B., Tse T.H. The Impact of Lightweight Disassembler on Malware Detection: An Empirical Study. Proceedings of the 42nd Annual Computer Software and Applications Conference, 23–27 July 2018, Tokyo, Japan. IEEE; 2018. p.620–629. DOI:10.1109/COMPSAC.2018.00094</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">David A.P. Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems. UK: Packt Publishing Ltd, 2021. 322 p.</mixed-citation><mixed-citation xml:lang="en">David A.P. Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems. Packt Publishing Ltd; 2021. 322 p.</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Буйневич М.В., Израилов К.Е. Автоматизированное средство алгоритмизации машинного кода телекоммуникационных устройств // Телекоммуникации. 2013. № 6. С. 2–9.</mixed-citation><mixed-citation xml:lang="en">Buinevich M.V., Izrailov K.E. Automated tool for machine code algorithmization of telecommunication devices. Telekommunikatsii. 2013;6:2–9.</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Буйневич М.В., Израилов К.Е. Метод алгоритмизации машинного кода телекоммуникационных устройств // Телекоммуникации. 2012. № 12. C. 2–6.</mixed-citation><mixed-citation xml:lang="en">Buinevich M.V., Izrailov K.E. Algorithmization method for machine code of telecommunication devices. Telekommunikatsii. 2012;12:2–6.</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Селиверстова И.А. Разработка программного обеспечения построения XML описания кода // Современные научные исследования и инновации. 2016. № 2(58). С. 102–104.</mixed-citation><mixed-citation xml:lang="en">Seliverstova I.A. Development of software for building XML code description. Modern scientific researches and innovations. 2016;2(58):102–104.</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Митькин С.Б. Автоматное программирование на языке Дракон // Программная инженерия. 2019. Т. 10. № 1. С. 3–13. DOI:10.17587/prin.10.3-13</mixed-citation><mixed-citation xml:lang="en">Mitkin S.B. Automata programming in the Dragon language. Software Engineering. 2019;10(1):3–13. DOI:10.17587/prin.10.3-13</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Вохмин А.А., Евдокимова О.А., Малявко А.А. Визуально-графическая система программирования на основе разработки блок-схем алгоритмов. Конвертирование текстов программ на различных языках программирования в блок-схемы и обратно // Южно-Сибирский научный вестник. 2021. № 3(37). С. 49–57. DOI:10.25699/SSSB.2021.37.3.013</mixed-citation><mixed-citation xml:lang="en">Vokhmin A.A., Yevdokimova O.A., Malyavko A.A. Visual-graphical programming system based on the development of algorithm flowcharts. Converting program texts in different programming languages into flowcharts and back again. South-Siberian Scientific Bulletin. 2021;3(37):49–57. DOI:10.25699/SSSB.2021.37.3.013</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Pakonen A. Obfuscation of function block diagrams // Proceedings of the 28th International Conference on Emerging Technologies and Factory Automation (ETFA, Sinaia, Romania, 12–15 September 2023). IEEE, 2023. PP. 1–7. DOI:10.1109/ETFA54631.2023.10275363</mixed-citation><mixed-citation xml:lang="en">Pakonen A. Obfuscation of function block diagrams. Proceedings of the 28th International Conference on Emerging Technologies and Factory Automation, ETFA, 12–15 September 2023, Sinaia, Romania. IEEE; 2023. p.1–7. DOI:10.1109/ETFA54631.2023.10275363</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Ипатов П.С. Технологии межпрограммных интерфейсов // Science Time. 2016. № 9(33). С. 115–118.</mixed-citation><mixed-citation xml:lang="en">Ipatov P.S. Technologies of interprogram interfaces. Science Time. 2016;9(33):115–118.</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Буйневич М.В., Ганов Г.А., Израилов К.Е. Интеллектуальный метод визуализации взаимодействий программ в интересах аудита информационной безопасности операционной системы // Информатизация и связь. 2020. № 4. С. 67–74.</mixed-citation><mixed-citation xml:lang="en">Buinevich M.V., Ganov G.A., Izrailov K.E. An intelligent method for visualizing program interactions in the interest of operating system information security auditing. Informatization and communication. 2020;4:67–74.</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Yang J., Cheng C., Shen S., Yang S. Comparison of complex network analysis software: Citespace, SCI2 and Gephi // Proceedings of the 2nd International Conference on Big Data Analysis (Beijing, China, 10–12 March 2017). IEEE, 2017. PP. 169–172. DOI:10.1109/ICBDA.2017.8078800</mixed-citation><mixed-citation xml:lang="en">Yang J., Cheng C., Shen S., Yang S. Comparison of complex network analysis software: Citespace, SCI2 and Gephi. Proceedings of the 2nd International Conference on Big Data Analysis Beijing, 10–12 March 2017, Beijing, China. IEEE; 2017. p.169–172. DOI:10.1109/ICBDA.2017.8078800</mixed-citation></citation-alternatives></ref><ref id="cit20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Gardazi S.U., Shahid A.A. Survey of software architecture description and usage in software industry of Pakistan // Proceedings of the International Conference on Emerging Technologies (Islamabad, Pakistan, 19–20 October 2009). IEEE, 2009. PP. 395–402. DOI:10.1109/ICET.2009.5353137</mixed-citation><mixed-citation xml:lang="en">Gardazi S.U., Shahid A.A. Survey of software architecture description and usage in software industry of Pakistan. Proceedings of the International Conference on Emerging Technologies, 19–20 October 2009, Islamabad, Pakistan. IEEE; 2009. p.395–402. DOI:10.1109/ICET.2009.5353137</mixed-citation></citation-alternatives></ref><ref id="cit21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">Sharma K., Dubey S.K., Gaurav P., Prachi. Functionality Assessment of Software System using Fuzzy Approach // Proceedings of the 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO, Noida, India, 04–05 June 2020). IEEE, 2020. PP. 1206–1209. DOI:10.1109/ICRITO48877.2020.9197795</mixed-citation><mixed-citation xml:lang="en">Sharma K., Dubey S.K., Gaurav P., Prachi Functionality Assessment of Software System using Fuzzy Approach. Proceedings of the 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO, 04–05 June 2020, Noida, India. IEEE; 2020. p.1206–1209. DOI:10.1109/ICRITO48877.2020.9197795</mixed-citation></citation-alternatives></ref><ref id="cit22"><label>22</label><citation-alternatives><mixed-citation xml:lang="ru">Kotenko I., Izrailov K., Buinevich M., Saenko I., Shorey R. Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities // Energies. 2023. Vol. 16. Iss. 13. P. 5111. DOI:10.3390/en16135111</mixed-citation><mixed-citation xml:lang="en">Kotenko I., Izrailov K., Buinevich M., Saenko I., Shorey R. Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities. Energies. 2023:16(13):5111. DOI:10.3390/en16135111</mixed-citation></citation-alternatives></ref><ref id="cit23"><label>23</label><citation-alternatives><mixed-citation xml:lang="ru">Израилов К.Е., Покусов В.В. Создание программной объектно-ориентированной платформы для разработки UEFI модулей // X международная научно-техническая и научно-методическая конференция «Актуальные проблемы инфотелекоммуникаций в науке и образовании» (АПИНО 2021, Санкт-Петербург, Россия, 24–25 февраля 2021). Санкт-Петербург: СПбГУТ. 2021. Т. 2. С. 246–250.</mixed-citation><mixed-citation xml:lang="en">Izrailov K.E., Pokusov V.V. Creation of software object-oriented platform for UEFI modules development. Proceedings of the X International Scientific-Technical and Scientific-Methodical Conference on Actual Problems of Infotelecommunications in Science and Education, 24–25 February 2021, St. Petersburg, Russia. St. Petersburg: The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Publ.; 2021. vol.2. p.246–250.</mixed-citation></citation-alternatives></ref><ref id="cit24"><label>24</label><citation-alternatives><mixed-citation xml:lang="ru">Yu S.-Y., Achamyeleh Y.G., Wang C., Kocheturov A., Eisen P., Al Faruque M.A. CFG2VEC: Hierarchical Graph Neural Network for Cross-Architectural Software Reverse Engineering // Proceedings of the 45th International Conference on Software Engineering: Software Engineering in Practice (Melbourne, Australia, 14–20 May 2023). IEEE, 2023. PP. 281–291. DOI:10.1109/ICSE-SEIP58684.2023.00031</mixed-citation><mixed-citation xml:lang="en">Yu S.-Y., Achamyeleh Y.G., Wang C., Kocheturov A., Eisen P., Al Faruque M.A. CFG2VEC: Hierarchical Graph Neural Network for Cross-Architectural Software Reverse Engineering. Proceedings of the 45th International Conference on Software Engineering: Software Engineering in Practice, 14–20 May 2023, Melbourne, Australia. IEEE; 2023. p.281–291. DOI:10.1109/ICSE-SEIP58684.2023.00031</mixed-citation></citation-alternatives></ref><ref id="cit25"><label>25</label><citation-alternatives><mixed-citation xml:lang="ru">Израилов К.Е. Концепция генетической декомпиляции машинного кода телекоммуникационных устройств // Труды учебных заведений связи. 2021. Т. 7. № 4. С. 95‒109. DOI:10.31854/1813-324X-2021-7-4-95-109</mixed-citation><mixed-citation xml:lang="en">Izrailov K.E. The concept of genetic decompilation machine code telecommunication devices. Proceedings of the Telecommun. Univ. 2021;7(4):95‒109. DOI:10.31854/1813-324X-2021-7-4-95-109</mixed-citation></citation-alternatives></ref><ref id="cit26"><label>26</label><citation-alternatives><mixed-citation xml:lang="ru">Израилов К.Е., Умаралиев И.В. Гипотетический метод восстановления модулей архитектуры машинного кода с целью выявления высокоуровневых уязвимостей // XII международная научно-техническая и научно-методическая конференция Актуальные проблемы инфотелекоммуникаций в науке и образовании (АПИНО 2023, Санкт-Петербург, Россия, 28 февраля – 01 марта 2023). Санкт-Петербург: СПбГУТ, 2023. Т. 1. С. 577‒581.</mixed-citation><mixed-citation xml:lang="en">Izrailov K.E., Umaraliev I.V. Hypothetical method of restoring machine code architecture modules in order to detect high-level vulnerabilities. Proceedings of the XII International Scientific-Technical and Scientific-Methodical Conference on Actual Problems of Infotelecommunications in Science and Education, 28 February – 01 March 2023, St. Petersburg, Russia. St. Petersburg: The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Publ.; 2023. vol.1. p.577–581.</mixed-citation></citation-alternatives></ref><ref id="cit27"><label>27</label><citation-alternatives><mixed-citation xml:lang="ru">Wang R., Shi Y. Research on application of article recommendation algorithm based on Word2Vec and Tfidf // The Proceedings of International Conference on Electrical Engineering, Big Data and Algorithms (Changchun, China, 25–27 February 2022). IEEE, 2022. PP. 454–457. DOI:10.1109/EEBDA53927.2022.97448244</mixed-citation><mixed-citation xml:lang="en">Wang R., Shi Y. Research on application of article recommendation algorithm based on Word2Vec and Tfidf. Proceedings of the International Conference on Electrical Engineering, Big Data and Algorithms, 25–27 February 2022, Changchun, China. IEEE; 2022. p.454–457. DOI:10.1109/EEBDA53927.2022.9744824</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
