{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:06:36Z","timestamp":1776783996712,"version":"3.51.2"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030220372","type":"print"},{"value":"9783030220389","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22038-9_15","type":"book-chapter","created":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T19:02:31Z","timestamp":1560106951000},"page":"309-329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":161,"title":["SAFE: Self-Attentive Function Embeddings for Binary Similarity"],"prefix":"10.1007","author":[{"given":"Luca","family":"Massarelli","sequence":"first","affiliation":[]},{"given":"Giuseppe Antonio","family":"Di Luna","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Petroni","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Baldoni","sequence":"additional","affiliation":[]},{"given":"Leonardo","family":"Querzoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,6]]},"reference":[{"key":"15_CR1","unstructured":"Abadi, M., et al.: TensorFlow: a system for large-scale machine learning. In: Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, (OSDI), pp. 265\u2013283 (2016)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Al-Maskari, A., Sanderson, M., Clough, P.: The relationship between IR effectiveness measures and user satisfaction. In: Proceedings of the 30th International ACM Conference on R&D in Information Retrieval, (SIGIR), pp. 773\u2013774 (2007)","DOI":"10.1145\/1277741.1277902"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"S61","DOI":"10.1016\/j.diin.2015.01.011","volume":"12","author":"S Alrabaee","year":"2015","unstructured":"Alrabaee, S., Shirani, P., Wang, L., Debbabi, M.: Sigma: a semantic integrated graph matching approach for identifying reused functions in binary code. Digit. Investig. 12, S61\u2013S71 (2015)","journal-title":"Digit. Investig."},{"key":"15_CR4","first-page":"25","volume-title":"Series in Machine Perception and Artificial Intelligence","author":"JANE BROMLEY","year":"1994","unstructured":"Bromley, J., Guyon, I., LeCun, Y., S\u00e4ckinger, E., Shah, R.: Signature verification using a \u201csiamese\u201d time delay neural network. In: Proceedings of the 6th International Conference on Neural Information Processing Systems, (NIPS), pp. 737\u2013744 (1994)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Cho, K., et al.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, (EMNLP) (2014)","DOI":"10.3115\/v1\/D14-1179"},{"key":"15_CR6","unstructured":"Chua, Z.L., Shen, S., Saxena, P., Liang, Z.: Neural nets can learn function type signatures from binaries. In: Proceedings of 26th USENIX Security Symposium, (USENIX Security), pp. 99\u2013116 (2017)"},{"key":"15_CR7","unstructured":"Dai, H., Dai, B., Song, L.: Discriminative embeddings of latent variable models for structured data. In: Proceedings of the 33rd International Conference on Machine Learning, (ICML), pp. 2702\u20132711 (2016)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"David, Y., Partush, N., Yahav, E.: Statistical similarity of binaries. In: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, (PLDI), pp. 266\u2013280 (2016)","DOI":"10.1145\/2980983.2908126"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/3140587.3062387","volume":"52","author":"Y David","year":"2017","unstructured":"David, Y., Partush, N., Yahav, E.: Similarity of binaries through re-optimization. ACM SIGPLAN Not. 52, 79\u201394 (2017)","journal-title":"ACM SIGPLAN Not."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"David, Y., Yahav, E.: Tracelet-based code search in executables. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, (PLDI), pp. 349\u2013360 (2014)","DOI":"10.1145\/2666356.2594343"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Ding, S.H., Fung, B.C., Charland, P.: Asm2Vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In: Proceedings of 40th Symposium on Security and Privacy, (SP) (2019, to appear)","DOI":"10.1109\/SP.2019.00003"},{"key":"15_CR12","unstructured":"Dullien, T., Rolles, R.: Graph-based comparison of executable objects. In: Proceedings of Symposium sur la s\u00e9curit\u00e9 des Technologies de l\u2019information et des Communications, (STICC) (2005)"},{"key":"15_CR13","unstructured":"Egele, M., Woo, M., Chapman, P., Brumley, D.: Blanket execution: dynamic similarity testing for program binaries and components. In: Proceedings of 23rd USENIX Security Symposium, (USENIX Security), pp. 303\u2013317 (2014)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Feng, Q., Wang, M., Zhang, M., Zhou, R., Henderson, A., Yin, H.: Extracting conditional formulas for cross-platform bug search. In: Proceedings of the 12th ACM on Asia Conference on Computer and Communications Security, (ASIA CCS), pp. 346\u2013359. ACM (2017)","DOI":"10.1145\/3052973.3052995"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Feng, Q., Zhou, R., Xu, C., Cheng, Y., Testa, B., Yin, H.: Scalable graph-based bug search for firmware images. In: Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security, (CCS), pp. 480\u2013491. ACM (2016)","DOI":"10.1145\/2976749.2978370"},{"issue":"1","key":"15_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/963770.963772","volume":"22","author":"JL Herlocker","year":"2004","unstructured":"Herlocker, J.L., et al.: Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst. 22(1), 5\u201353 (2004)","journal-title":"ACM Trans. Inf. Syst."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Khoo, W.M., Mycroft, A., Anderson, R.: Rendezvous: a search engine for binary code. In: Proceedings of the 10th Working Conference on Mining Software Repositories, (MSR), pp. 329\u2013338 (2013)","DOI":"10.1109\/MSR.2013.6624046"},{"key":"15_CR18","unstructured":"Le, Q.V., Mikolov, T.: Distributed representations of sentences and documents. In: Proceedings of the 31th International Conference on Machine Learning, (ICML), pp. 1188\u20131196 (2014)"},{"key":"15_CR19","unstructured":"Lin, Z., et al.: A structured self-attentive sentence embedding. arXiv:1703.03130 (2017)"},{"issue":"Nov","key":"15_CR20","first-page":"2579","volume":"9","author":"L Maaten van der","year":"2008","unstructured":"van der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(Nov), 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Massarelli, L., Di Luna, G.A., Petroni, F., Querzoni, L., Baldoni, R.: Investigating graph embedding neural networks with unsupervised features extraction for binary analysis. In: Proceedings of the 2nd Workshop on Binary Analysis Research (BAR) (2019)","DOI":"10.14722\/bar.2019.23020"},{"key":"15_CR22","unstructured":"Mikolov, T., et al.: Distributed representations of words and phrases and their compositionality. In: Proceedings of the 26th International Conference on Neural Information Processing Systems, (NIPS), pp. 3111\u20133119 (2013)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Pewny, J., Garmany, B., Gawlik, R., Rossow, C., Holz, T.: Cross-architecture bug search in binary executables. In: Proceedings of the 34th IEEE Symposium on Security and Privacy, (SP), pp. 709\u2013724 (2015)","DOI":"10.1109\/SP.2015.49"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Pewny, J., Schuster, F., Bernhard, L., Holz, T., Rossow, C.: Leveraging semantic signatures for bug search in binary programs. In: Proceedings of the 30th Annual Computer Security Applications Conference, (ACSAC), pp. 406\u2013415. ACM (2014)","DOI":"10.1145\/2664243.2664269"},{"key":"15_CR25","unstructured":"Shin, E.C.R., Song, D., Moazzezi, R.: Recognizing functions in binaries with neural networks. In: Proceedings of the 24th USENIX Conference on Security Symposium, (USENIX Security), pp. 611\u2013626 (2015)"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Shoshitaishvili, Y., et al.: SOK: (state of) the art of war: offensive techniques in binary analysis. In: Proceedings of the 37th IEEE Symposium on Security and Privacy, (SP), pp. 138\u2013157 (2016)","DOI":"10.1109\/SP.2016.17"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., Song, D.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications Security, (CCS), pp. 363\u2013376 (2017)","DOI":"10.1145\/3133956.3134018"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Zuo, F., Li, X., Zhang, Z., Young, P., Luo, L., Zeng, Q.: Neural machine translation inspired binary code similarity comparison beyond function pairs. arXiv preprint arXiv:1808.04706 (2018)","DOI":"10.14722\/ndss.2019.23492"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22038-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T01:58:57Z","timestamp":1574906337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22038-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030220372","9783030220389"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22038-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dimva2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"dimca2019.hotcrp.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}