{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:09:44Z","timestamp":1757617784801,"version":"3.44.0"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819645657"},{"type":"electronic","value":"9789819645664"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-4566-4_11","type":"book-chapter","created":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T00:34:49Z","timestamp":1743554089000},"page":"148-166","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automatic Software Vulnerability Detection in\u00a0Binary Code"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3122-6745","authenticated-orcid":false,"given":"Shigang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xinbo","family":"Ban","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Lerums, J.E., La\u2019Reshia, D.P., Dietz, J.E.: Simulation modeling cyber threats, risks, and prevention costs. In: 2018 IEEE International Conference on Electro\/Information Technology (EIT), pp. 0096\u20130101. IEEE (2018)","key":"11_CR1","DOI":"10.1109\/EIT.2018.8500240"},{"doi-asserted-by":"crossref","unstructured":"Bassi, D., Singh, H.: A systematic literature review on software vulnerability prediction models. IEEE Access (2023)","key":"11_CR2","DOI":"10.1109\/ACCESS.2023.3312613"},{"doi-asserted-by":"crossref","unstructured":"Amodei, A., Capriglione, D., Cerro, G., Ferrigno, L., Miele, G., Tomasso, G.: A measurement approach for inline intrusion detection of heartbleed-like attacks in IoT frameworks. IEEE Trans. Instrum. Meas. (2023)","key":"11_CR3","DOI":"10.1109\/TIM.2023.3282662"},{"doi-asserted-by":"crossref","unstructured":"Hammi, B., Zeadally, S., Nebhen, J.: Security threats, countermeasures, and challenges of digital supply chains. ACM Comput. Surv. 55 (2023)","key":"11_CR4","DOI":"10.1145\/3588999"},{"doi-asserted-by":"crossref","unstructured":"Bhuiyan, M.H.M., Parthasarathy, A.S., Vasilakis, N., Pradel, M., Staicu, C.-A.: SecBench. js: an executable security benchmark suite for server-side JavaScript. In: International Conference on Software Engineering (ICSE) (2023)","key":"11_CR5","DOI":"10.1109\/ICSE48619.2023.00096"},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"2539","DOI":"10.1109\/JIOT.2019.2944006","volume":"7","author":"G Xu","year":"2019","unstructured":"Xu, G., et al.: SoProtector: safeguard privacy for native so files in evolving mobile IoT applications. IEEE Internet Things J. 7(4), 2539\u20132552 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"11_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3486860","volume":"55","author":"S Alrabaee","year":"2022","unstructured":"Alrabaee, S., Debbabi, M., Wang, L.: A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features. ACM Comput. Surv. (CSUR) 55(1), 1\u201341 (2022)","journal-title":"ACM Comput. Surv. (CSUR)"},{"doi-asserted-by":"crossref","unstructured":"Eschweiler, S., Yakdan, K., Gerhards-Padilla, E.: discovRE: efficient cross-architecture identification of bugs in binary code. In: NDSS (2016)","key":"11_CR8","DOI":"10.14722\/ndss.2016.23185"},{"issue":"10s","key":"11_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3505243","volume":"54","author":"Y Yang","year":"2022","unstructured":"Yang, Y., Xia, X., Lo, D., Grundy, J.: A survey on deep learning for software engineering. ACM Comput. Surv. (CSUR) 54(10s), 1\u201373 (2022)","journal-title":"ACM Comput. Surv. (CSUR)"},{"doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: VulDeePecker: a deep learning-based system for vulnerability detection. In: 25th Annual Network and Distributed System Security Symposium (NDSS 2018), San Diego, California, USA, 18\u201321 February 2018 (EI\/CCF-A) (2018)","key":"11_CR10","DOI":"10.14722\/ndss.2018.23158"},{"issue":"7","key":"11_CR11","first-page":"1329","volume":"28","author":"S Liu","year":"2019","unstructured":"Liu, S., Lin, G., Han, Q.-L., Wen, S., Zhang, J., Xiang, Y.: DeepBalance: deep-learning and fuzzy oversampling for vulnerability detection. IEEE Trans. Fuzzy Syst. 28(7), 1329\u20131343 (2019)","journal-title":"IEEE Trans. Fuzzy Syst."},{"doi-asserted-by":"crossref","unstructured":"Grieco, G., Grinblat, G.L., Uzal, L., Rawat, S., Feist, J., Mounier, L.: Toward large-scale vulnerability discovery using machine learning. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 85\u201396. ACM (2016)","key":"11_CR12","DOI":"10.1145\/2857705.2857720"},{"unstructured":"Lee, Y.J., Choi, S.-H., Kim, C., Park, K.-W.: Learning binary code with deep learning to detect software weakness. In: KSII The 9th International Conference on Internet 2017 Symposium, pp. 245\u2013249 (2017)","key":"11_CR13"},{"unstructured":"Le, T., Nguyen, T., Le, T., Phung, D., Montague, P., De\u00a0Vel, O., Qu, L.: Maximal divergence sequential autoencoder for binary software vulnerability detection. In: International Conference on Learning Representations (2018)","key":"11_CR14"},{"issue":"3","key":"11_CR15","doi-asserted-by":"publisher","first-page":"2154","DOI":"10.1109\/TII.2019.2942800","volume":"16","author":"S Liu","year":"2019","unstructured":"Liu, S., Dibaei, M., Tai, Y., Chen, C., Zhang, J., Xiang, Y.: Cyber vulnerability intelligence for internet of things binary. IEEE Trans. Industr. Inf. 16(3), 2154\u20132163 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"doi-asserted-by":"crossref","unstructured":"Nguyen, T., et al.: Deep cost-sensitive kernel machine for binary software vulnerability detection. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 164\u2013177. Springer (2020)","key":"11_CR16","DOI":"10.1007\/978-3-030-47436-2_13"},{"doi-asserted-by":"crossref","unstructured":"Feng, Z., et\u00a0al.: CodeBERT: a pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155 (2020)","key":"11_CR17","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1109\/TIFS.2023.3326667","volume":"19","author":"S Hajra","year":"2024","unstructured":"Hajra, S., Alam, M., Saha, S., Picek, S., Mukhopadhyay, D.: On the instability of softmax attention-based deep learning models in side-channel analysis. IEEE Trans. Inf. Forensics Secur. 19, 514\u2013528 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Bookworm game: Automatic discovery of LTE vulnerabilities through documentation analysis. In: 2021 IEEE Symposium on Security and Privacy (SP). IEEE (2021)","key":"11_CR19","DOI":"10.1109\/SP40001.2021.00104"},{"doi-asserted-by":"crossref","unstructured":"Steenhoek, B., Rahman, M.M., Jiles, R., Le, W.: An empirical study of deep learning models for vulnerability detection. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 2237\u20132248. IEEE (2023)","key":"11_CR20","DOI":"10.1109\/ICSE48619.2023.00188"},{"doi-asserted-by":"crossref","unstructured":"Yang, S., et al.: Asteria-pro: Enhancing deep-learning based binary code similarity detection by incorporating domain knowledge. ACM Trans. Softw. Eng. Methodol. (2023)","key":"11_CR21","DOI":"10.1145\/3604611"},{"doi-asserted-by":"crossref","unstructured":"Jiang, L., et al.: BinaryAI: binary software composition analysis via intelligent binary source code matching. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, pp. 1\u201313 (2024)","key":"11_CR22","DOI":"10.1145\/3597503.3639100"},{"doi-asserted-by":"crossref","unstructured":"Li, X., Qu, Y., Yin, H.: PalmTree: learning an assembly language model for instruction embedding. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 3236\u20133251 (2021)","key":"11_CR23","DOI":"10.1145\/3460120.3484587"},{"doi-asserted-by":"crossref","unstructured":"Zuo, F., Li, X., Young, P., Luo, L., Zeng, Q., Zhang, Z.: Neural machine translation inspired binary code similarity comparison beyond function pairs (2019)","key":"11_CR24","DOI":"10.14722\/ndss.2019.23492"},{"doi-asserted-by":"crossref","unstructured":"Li, Z., Wang, J., Sun, M., Lui, J.C.S.: MirChecker: detecting bugs in rust programs via static analysis. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 2183\u20132196 (2021)","key":"11_CR25","DOI":"10.1145\/3460120.3484541"},{"issue":"20","key":"11_CR26","doi-asserted-by":"publisher","first-page":"14049","DOI":"10.1007\/s00521-021-06047-x","volume":"33","author":"C Batur \u015eahin","year":"2021","unstructured":"Batur \u015eahin, C., Abualigah, L.: A novel deep learning-based feature selection model for improving the static analysis of vulnerability detection. Neural Comput. Appl. 33(20), 14049\u201314067 (2021). https:\/\/doi.org\/10.1007\/s00521-021-06047-x","journal-title":"Neural Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Jiang, S., Fu, C., Qian, Y., He, S., Lv, J., Han, L.: IFAttn: binary code similarity analysis based on interpretable features with attention. Comput. Secur. 102804 (2022)","key":"11_CR27","DOI":"10.1016\/j.cose.2022.102804"},{"key":"11_CR28","doi-asserted-by":"publisher","first-page":"103023","DOI":"10.1016\/j.cose.2022.103023","volume":"125","author":"Y Wang","year":"2023","unstructured":"Wang, Y., Jia, P., Peng, X., Huang, C., Liu, J.: BinVulDet: detecting vulnerability in binary program via decompiled pseudo code and biLSTM-attention. Comput. Secur. 125, 103023 (2023)","journal-title":"Comput. Secur."},{"unstructured":"Pei, K., Xuan, Z., Yang, J., Jana, S., Ray, B.: Trex: learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680 (2020)","key":"11_CR29"},{"key":"11_CR30","first-page":"103247","volume":"130","author":"Y Fan","year":"2023","unstructured":"Fan, Y., Wan, C., Cai, F., Han, L., Hao, X.: VDoTR: detection based on tensor representation of comprehensive code graphs. Comput. Sevulnerabil. Cur. 130, 103247 (2023)","journal-title":"Comput. Sevulnerabil. Cur."},{"issue":"20","key":"11_CR31","doi-asserted-by":"publisher","first-page":"13287","DOI":"10.1007\/s00521-021-05954-3","volume":"33","author":"G Lin","year":"2021","unstructured":"Lin, G., Xiao, W., Zhang, L.Y., Gao, S., Tai, Y., Zhang, J.: Deep neural-based vulnerability discovery demystified: data, model and performance. Neural Comput. Appl. 33(20), 13287\u201313300 (2021)","journal-title":"Neural Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Mashhadi, E., Hemmati, H.: Applying codeBERT for automated program repair of java simple bugs. arXiv preprint arXiv:2103.11626 (2021)","key":"11_CR32","DOI":"10.1109\/MSR52588.2021.00063"},{"issue":"7","key":"11_CR33","doi-asserted-by":"publisher","first-page":"3289","DOI":"10.1109\/TII.2018.2821768","volume":"14","author":"G Lin","year":"2018","unstructured":"Lin, G., et al.: Cross-project transfer representation learning for vulnerable function discovery. IEEE Trans. Industr. Inf. 14(7), 3289\u20133297 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"11_CR34","doi-asserted-by":"publisher","first-page":"100723","DOI":"10.1016\/j.margen.2019.100723","volume":"51","author":"MC Cieslak","year":"2020","unstructured":"Cieslak, M.C., Castelfranco, A.M., Roncalli, V., Lenz, P.H., Hartline, D.K.: t-distributed stochastic neighbor embedding (t-SNE): a tool for eco-physiological transcriptomic analysis. Marine Genom. 51, 100723 (2020)","journal-title":"Marine Genom."},{"doi-asserted-by":"crossref","unstructured":"Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., Song, D.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 363\u2013376. ACM (2017)","key":"11_CR35","DOI":"10.1145\/3133956.3134018"},{"doi-asserted-by":"crossref","unstructured":"Massarelli, L., Di\u00a0Luna, G.A., Petroni, F., Baldoni, R., Querzoni, L.: SAFE: self-attentive function embeddings for binary similarity. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 309\u2013329. Springer (2019)","key":"11_CR36","DOI":"10.1007\/978-3-030-22038-9_15"},{"issue":"3","key":"11_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3585386","volume":"26","author":"L Li","year":"2023","unstructured":"Li, L., et al.: VulAnalyzer: explainable binary vulnerability detection with multi-task learning and attentional graph convolution. ACM Trans. Priv. Secur. 26(3), 1\u201325 (2023)","journal-title":"ACM Trans. Priv. Secur."},{"issue":"13s","key":"11_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3583558","volume":"55","author":"M Nauta","year":"2023","unstructured":"Nauta, M., et al.: From anecdotal evidence to quantitative evaluation methods: a systematic review on evaluating explainable AI. ACM Comput. Surv. 55(13s), 1\u201342 (2023)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-4566-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T08:54:34Z","timestamp":1757148874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-4566-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819645657","9789819645664"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-4566-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/ml4cs2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}