{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:30:45Z","timestamp":1742913045133,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031459320"},{"type":"electronic","value":"9783031459337"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_15","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"244-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Decompilation Based Deep Binary-Source Function Matching"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9824-2543","authenticated-orcid":false,"given":"Xiaowei","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9494-7478","authenticated-orcid":false,"given":"Zimu","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8009-2252","authenticated-orcid":false,"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Liyan","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2194-3230","authenticated-orcid":false,"given":"Yican","family":"Yao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2659-4148","authenticated-orcid":false,"given":"Haiming","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7121-1196","authenticated-orcid":false,"given":"Wei","family":"Huo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"15_CR1","unstructured":"Langley, P.: Crafting papers on machine learning. In: Langley, P. (ed.) Proceedings of the 17th International Conference on Machine Learning (ICML 2000), pp. 1207\u20131216. Morgan Kaufmann, Stanford (2000)"},{"key":"15_CR2","unstructured":"Mitchell, T.M.: The need for biases in learning generalizations. Computer Science Department, Rutgers University, New Brunswick, MA, Technical Report (1980)"},{"key":"15_CR3","unstructured":"Kearns, M.J.: Computational complexity of machine learning. Ph.D. dissertation, Department of Computer Science, Harvard University (1989)"},{"volume-title":"Machine Learning: An Artificial Intelligence Approach","year":"1983","key":"15_CR4","unstructured":"Michalski, R.S., Carbonell, J.G., Mitchell, T.M. (eds.): Machine Learning: An Artificial Intelligence Approach, vol. I. Tioga, Palo Alto (1983)"},{"key":"15_CR5","volume-title":"Pattern Classification","author":"RO Duda","year":"2000","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley and Sons, Hoboken (2000)","edition":"2"},{"key":"15_CR6","unstructured":"Author, N.N.: Suppressed for anonymity (2021)"},{"key":"15_CR7","unstructured":"Newell, A., Rosenbloom, P.S.: Mechanisms of skill acquisition and the law of practice. In: Anderson, J.R. (ed.) Cognitive Skills and Their Acquisition, vol. 1, pp. 1\u201351. Lawrence Erlbaum Associates Inc., Hillsdale (1981)"},{"issue":"3","key":"15_CR8","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1147\/rd.33.0210","volume":"3","author":"AL Samuel","year":"1959","unstructured":"Samuel, A.L.: Some studies in machine learning using the game of checkers. IBM J. Res. Dev. 3(3), 211\u2013229 (1959)","journal-title":"IBM J. Res. Dev."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Feng, M., et al.: B2sfinder: detecting open-source software reuse in cots software. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1038\u20131049 (2019)","DOI":"10.1109\/ASE.2019.00100"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Ding, S.H.H., Fung, B., Charland, P.: Asm2vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 472\u2013489 (2019)","DOI":"10.1109\/SP.2019.00003"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Feng, Q., Zhou, R., Xu, C., Cheng, Y., Testa, B., Yin, H.: Scalable graph-based bug search for firmware images. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978370"},{"key":"15_CR12","unstructured":"Ida pro (2020). https:\/\/www.hex-rays.com\/products\/ida\/"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 590\u2013604 (2014)","DOI":"10.1109\/SP.2014.44"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Duan, R., Bijlani, A., Xu, M., Kim, T., Lee, W.: Identifying open-source license violation and 1-day security risk at large scale. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3134048"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, J., Beresford, A., Kollmann, S.A.: Libid: reliable identification of obfuscated third-party android libraries. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (2019)","DOI":"10.1145\/3293882.3330563"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Hemel, A., Kalleberg, K., Vermaas, R., Dolstra, E.: Finding software license violations through binary code clone detection. In: MSR 2011 (2011)","DOI":"10.1145\/1985441.1985453"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Zuo, F., Li, X., Zhang, Z., Young, P., Luo, L., Zeng, Q.: Neural machine translation inspired binary code similarity comparison beyond function pairs. ArXiv:1808.04706 (2019)","DOI":"10.14722\/ndss.2019.23492"},{"key":"15_CR18","unstructured":"Li, X.: Learning program-wide code representations for binary diffing. In: NDSS (2020)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Liu, B., et al.: $$\\alpha $$ diff: cross-version binary code similarity detection with dnn. In: 2018 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 667\u2013678 (2018)","DOI":"10.1145\/3238147.3238199"},{"key":"15_CR20","unstructured":"Yu, Z., Zheng, W., Wang, J., Tang, Q., Nie, S., Wu, S.: Codecmr: cross-modal retrieval for function-level binary source code matching. In: NeurIPS (2020)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Mou, L., Li, G., Zhang, L., Wang, T., Jin, Z.: Convolutional neural networks over tree structures for programming language processing. In: AAAI (2016)","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Fang, C., Liu, Z., Shi, Y., Huang, J., Shi, Q.: Functional code clone detection with syntax and semantics fusion learning. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis (2020)","DOI":"10.1145\/3395363.3397362"},{"key":"15_CR23","unstructured":"Bui, N.D.Q., Yu, Y., Jiang, L.: Treecaps: tree-based capsule networks for source code processing. ArXiv:2009.09777 (2020)"},{"key":"15_CR24","unstructured":"Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In: NeurIPS (2019)"},{"key":"15_CR25","unstructured":"Xiao, Y., et al.: $$\\{$$MVP$$\\}$$: detecting vulnerabilities using patch-enhanced vulnerability signatures. In: 29th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 20), pp. 1165\u20131182 (2020)"},{"key":"15_CR26","unstructured":"Vaswani, A., et al.: Attention is all you need. In: NIPS (2017)"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., Song, D.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 363\u2013376 (2017)","DOI":"10.1145\/3133956.3134018"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Feng, Q., Zhou, R., Xu, C., Cheng, Y., Testa, B., Yin, H.: Scalable graph-based bug search for firmware images. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 480\u2013491 (2016)","DOI":"10.1145\/2976749.2978370"},{"issue":"12","key":"15_CR29","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1109\/TSE.2017.2655046","volume":"43","author":"L Luo","year":"2017","unstructured":"Luo, L., Ming, J., Wu, D., Liu, P., Zhu, S.: Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection. IEEE Trans. Softw. Eng. 43(12), 1157\u20131177 (2017)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Xu, D.,\u00a0Ming, J.,\u00a0Wu, D.: Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 921\u2013937. IEEE (2017)","DOI":"10.1109\/SP.2017.56"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Zuo, F., Li, X., Young, P., Luo, L., Zeng, Q., Zhang, Z.: Neural machine translation inspired binary code similarity comparison beyond function pairs. arXiv preprint arXiv:1808.04706 (2018)","DOI":"10.14722\/ndss.2019.23492"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"David, Y., Partush, N., Yahav, E.: Similarity of binaries through re-optimization. In: Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 79\u201394 (2017)","DOI":"10.1145\/3062341.3062387"},{"key":"15_CR33","unstructured":"Ramos, J., et al.: Using TF-IDF to determine word relevance in document queries. In: Proceedings of the First Instructional Conference on Machine Learning, vol. 242, no. 1, pp. 29\u201348. Citeseer (2003)"},{"key":"15_CR34","unstructured":"Lin, Z., et al.: A structured self-attentive sentence embedding. In: International Conference on Learning Representations (2017)"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"15_CR36","unstructured":"Ba, J.L., Kiros, J.R., Hinton, G.E.: Layer normalization. arXiv preprint arXiv:1607.06450 (2016)"},{"issue":"1","key":"15_CR37","first-page":"1","volume":"10","author":"H Larochelle","year":"2009","unstructured":"Larochelle, H., Bengio, Y., Louradour, J., Lamblin, P.: Exploring strategies for training deep neural networks. J. Mach. Learn. Res. 10(1), 1\u201340 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Hadsell, R., Chopra, S., LeCun, Y.: Dimensionality reduction by learning an invariant mapping. In: 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2006), vol. 2, pp. 1735\u20131742. IEEE (2006)","DOI":"10.1109\/CVPR.2006.100"},{"issue":"1","key":"15_CR39","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10479-005-5724-z","volume":"134","author":"P-T De Boer","year":"2005","unstructured":"De Boer, P.-T., Kroese, D.P., Mannor, S., Rubinstein, R.Y.: A tutorial on the cross-entropy method. Ann. Oper. Res. 134(1), 19\u201367 (2005)","journal-title":"Ann. Oper. Res."},{"key":"15_CR40","unstructured":"Bromley, J., Guyon, I., LeCun, Y., S\u00e4ckinger, E., Shah, R.: Signature verification using a \u201csiamese\u201d time delay neural network. In: Proceedings of the 6th International Conference on Neural Information Processing Systems, pp. 737\u2013744 (1993)"},{"issue":"8","key":"15_CR41","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1746\u20131751 (2014)","DOI":"10.3115\/v1\/D14-1181"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Johnson, R., Zhang, T.: Deep pyramid convolutional neural networks for text categorization. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, vol. 1: Long Papers, pp. 562\u2013570 (2017)","DOI":"10.18653\/v1\/P17-1052"},{"key":"15_CR44","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T06:56:42Z","timestamp":1730530602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}