{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:24:59Z","timestamp":1761812699686,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032081230","type":"print"},{"value":"9783032081247","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08124-7_27","type":"book-chapter","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:22:53Z","timestamp":1761812573000},"page":"474-493","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ali2Vul: Binary Vulnerability Dataset Expansion via\u00a0Cross-Modal Alignment"],"prefix":"10.1007","author":[{"given":"Xinyu","family":"Bai","sequence":"first","affiliation":[]},{"given":"Yisen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiajun","family":"Du","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Siyuan","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Zirui","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Jiang, L., et al.: Binaryai: binary software composition analysis via intelligent binary source code matching (2024). arXiv:2401.11161","DOI":"10.1145\/3597503.3639100"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Luo, Z., et al.: Cross-architecture vulnerability detection with entropy-based binary code search. In NDSS, Vulhawk (2023)","DOI":"10.14722\/ndss.2023.24415"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Aslanyan, H., Movsisyan, H., Arutunian, M., Sargsyan, S.: Bin2source: matching binary to source code. In: 2021 Ivannikov Ispras Open Conference (ISPRAS), pp. 3\u20137 (2021)","DOI":"10.1109\/ISPRAS53967.2021.00006"},{"key":"27_CR4","unstructured":"Chen, L.: Cvebinarysheet: a comprehensive pre-built binaries database for IOT vulnerability analysis. arXiv preprint arXiv:2501.08840 (2025)"},{"key":"27_CR5","unstructured":"Yu, Z., Zheng, W., Wang, J., Tang, Q., Nie, S., Wu, S.: Codecmr: cross-modal retrieval for function-level binary source code matching. In: Proceedings of the 34th International Conference on Neural Information Processing Systems, NIPS 2020, Curran Associates Inc, Red Hook (2020)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Gui, Y., et al.: Cross-language binary-source code matching with intermediate representations. In: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 601\u2013612 (2022)","DOI":"10.1109\/SANER53432.2022.00077"},{"key":"27_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106289","volume":"123","author":"J Tian","year":"2020","unstructured":"Tian, J., Xing, W., Li, Z.: Bvdetector: a program slice-based binary code vulnerability intelligent detection system. Inf. Softw. Technol. 123, 106289 (2020)","journal-title":"Inf. Softw. Technol."},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Gao, J., Yang, X., Fu, Y., Jiang, Y., Sun, J.: Vulseeker: a semantic learning based vulnerability seeker for cross-platform binary. In: 2018 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 896\u2013899 (2018)","DOI":"10.1145\/3238147.3240480"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Xu, Y., Xu, Z., Chen, B., Song, F., Liu, Y., Liu,T.: Patch based vulnerability matching for binary programs. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2020, page 376\u2013387. Association for Computing Machinery, New York (2020)","DOI":"10.1145\/3395363.3397361"},{"key":"27_CR10","unstructured":"Frome, A., et al.: Devise: a deep visual-semantic embedding model. In: Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2, NIPS 2013, pp. 2121\u20132129. Curran Associates Inc, Red Hook (2013)"},{"key":"27_CR11","unstructured":"Radford, A., et\u00a0al.: Learning transferable visual models from natural language supervision. In: International Conference on Machine Learning, pp. 8748\u20138763. PMLR (2021)"},{"key":"27_CR12","unstructured":"Li, J., Selvaraju, R.R., Gotmare, A.D., Joty, S., Xiong, C., Hoi, S.C.H.: Align before fuse: vision and language representation learning with momentum distillation. In: Proceedings of the 35th International Conference on Neural Information Processing Systems, NIPS 2021, Curran Associates Inc, Red Hook, NY, USA, (2021)"},{"key":"27_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2025.112365","volume":"223","author":"Z Tian","year":"2025","unstructured":"Tian, Z., Qiu, R., Teng, Y., Sun, J., Chen, Y., Chen, L.: Towards cost-efficient vulnerability detection with cross-modal adversarial reprogramming. J. Syst. Softw. 223, 112365 (2025)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"27_CR14","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1137\/0105003","volume":"5","author":"J Munkres","year":"1957","unstructured":"Munkres, J.: Algorithms for the assignment and transportation problems. J. Soc. Ind. Appl. Math. 5(1), 32\u201338 (1957)","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"27_CR15","unstructured":"Xu, K., Hu, W., Leskovec, J., Jegelka, S.: How powerful are graph neural networks? (2019). arXiv:1810.00826"},{"key":"27_CR16","unstructured":"Miyani, D., Huang, Z., Lie, D.: Binpro: a tool for binary source code provenance (2017). arXiv:1711.00830"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: Clap: learning transferable binary code representations with natural language supervision. In: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2024, pp. 503\u2013515. Association for Computing Machinery, New York (2024)","DOI":"10.1145\/3650212.3652145"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: Jtrans: jump-aware transformer for binary code similarity detection. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 1\u201313 (2022)","DOI":"10.1145\/3533767.3534367"},{"key":"27_CR19","unstructured":"Touvron, H., Lavril, T., Izacard, G.,et\u00a0al.: Llama: open and efficient foundation language models (2023). arXiv:2302.13971"},{"key":"27_CR20","unstructured":"DeepSeek-AI, Guo, G., Yang, D., Zhang, H., et\u00a0al.: Deepseek-r1: incentivizing reasoning capability in LLMs via reinforcement learning (2025). arXiv:2501.12948"},{"key":"27_CR21","unstructured":"Hex-Rays. IDA Pro: Interactive disassembler and debugger. Product webpage (2024). https:\/\/hex-rays.com\/ida-pro. Accessed 10 June 2025"},{"key":"27_CR22","unstructured":"joernio. Joern: Open-source code analysis platform. GitHub repository (2023). https:\/\/github.com\/joernio\/joern"},{"key":"27_CR23","unstructured":"Shellphish, The Computer Security Lab at UC Santa Barbara, SEFCOM at Arizona State University, and Rhelmot. angr: A powerful and user-friendly binary analysis platform. GitHub repository (2024). https:\/\/github.com\/angr\/angr"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Chen, J., Xiao, S., Zhang, P., Luo, K., Lian, D., Liu, Z.: Bge m3-embedding: multi-lingual, multi-functionality, multi-granularity text embeddings through self-knowledge distillation (2024). arXiv:2402.03216","DOI":"10.18653\/v1\/2024.findings-acl.137"},{"key":"27_CR25","unstructured":"Guo, D., Ren, S., Lu, S., et\u00a0al.: Graphcodebert: pre-training code representations with data flow (2021). arXiv:2009.08366"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08124-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:01Z","timestamp":1761812581000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08124-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,31]]},"ISBN":["9783032081230","9783032081247"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08124-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,31]]},"assertion":[{"value":"31 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc25.skku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}