{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:08:32Z","timestamp":1746245312711,"version":"3.40.4"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819647309","type":"print"},{"value":"9789819647316","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-4731-6_16","type":"book-chapter","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T15:08:25Z","timestamp":1746198505000},"page":"319-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Attention-Based Decompilation Through Neural Machine Translation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8751-9918","authenticated-orcid":false,"given":"Ruigang","family":"Liang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1689-653X","authenticated-orcid":false,"given":"Ying","family":"Cao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2803-7166","authenticated-orcid":false,"given":"Peiwei","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5624-2987","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,3]]},"reference":[{"key":"16_CR1","unstructured":"Avast retargetable decompiler IDA plugin (2017). https:\/\/blog.fpmurphy.com\/2017\/12\/avast-retargetable-decompiler-ida-plugin.html"},{"key":"16_CR2","unstructured":"GMP (2019). https:\/\/gmplib.org\/"},{"key":"16_CR3","unstructured":"Libpcap (2019). https:\/\/www.tcpdump.org\/"},{"key":"16_CR4","unstructured":"cfile (2021). https:\/\/github.com\/cogu\/cfile"},{"key":"16_CR5","unstructured":"Hex-rays (2021). https:\/\/www.hex-rays.com\/products\/decompiler\/"},{"key":"16_CR6","unstructured":"Leetcode in pure c (2021). https:\/\/github.com\/begeekmyfriend\/leetcode"},{"key":"16_CR7","unstructured":"Math c++ library (2021). http:\/\/www.cplusplus.com\/reference\/cmath\/"},{"key":"16_CR8","unstructured":"Ghidra (2022). https:\/\/ghidra-sre.org\/"},{"key":"16_CR9","unstructured":"Openssl (2023). https:\/\/www.openssl.org\/"},{"key":"16_CR10","unstructured":"Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous systems (2015). http:\/\/tensorflow.org\/"},{"key":"16_CR11","unstructured":"Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools, 2nd edn. Addison-Wesley Longman Publishing Co., Inc, USA (2006)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Armengol-Estape, J., Woodruff, J., Cummins, C., O\u2019Boyle, M.F.P.: Slade: a portable small language model decompiler for optimized assembler (2023)","DOI":"10.1109\/CGO57630.2024.10444788"},{"key":"16_CR13","unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 (2014)"},{"key":"16_CR14","unstructured":"Brumley, D., Lee, J., Schwartz, E.J., Woo, M.: Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring. In: Presented as part of the 22nd $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 2013), pp. 353\u2013368 (2013)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Cao, Y., Liang, R., Chen, K., Hu, P.: Boosting neural networks to decompile optimized binaries. In: Proceedings of the 38th Annual Computer Security Applications Conference, pp. 508\u2013518 (2022)","DOI":"10.1145\/3564625.3567998"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Debin (2021). https:\/\/debin.ai\/","DOI":"10.1088\/1742-5468\/ac1f14"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Ding, S.H., Fung, B.C., Charland, P.: Asm2vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 472\u2013489. IEEE (2019)","DOI":"10.1109\/SP.2019.00003"},{"key":"16_CR18","unstructured":"Donnelly, J.K.: A decompiler for the countess computer. Navy Electronics Laboratory Technical Memorandum 427 (1960)"},{"key":"16_CR19","unstructured":"Fu, C., et al.: Coda: an end-to-end neural program decompiler. In: Advances in Neural Information Processing Systems, pp. 3703\u20133714 (2019)"},{"key":"16_CR20","unstructured":"Fu, C., Yang, K., Chen, X., Tian, Y., Zhao, J.: N-bref: a high-fidelity decompiler exploiting programming structures (2020)"},{"key":"16_CR21","unstructured":"Halstead, M.H.: Machine-Independent Computer Programming. Spartan Books (1962)"},{"key":"16_CR22","unstructured":"Hu, J., Ruder, S., Siddhant, A., Neubig, G., Firat, O., Johnson, M.: XTREME: a massively multilingual multi-task benchmark for evaluating cross-lingual generalization. CoRR abs\/2003.11080 (2020). https:\/\/arxiv.org\/abs\/2003.11080"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Katz, D.S., Ruchti, J., Schulte, E.: Using recurrent neural networks for decompilation. In: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 346\u2013356. IEEE (2018)","DOI":"10.1109\/SANER.2018.8330222"},{"key":"16_CR24","unstructured":"Katz, O., Olshaker, Y., Goldberg, Y., Yahav, E.: Towards neural decompilation. CoRR abs\/1905.08325 (2019). http:\/\/arxiv.org\/abs\/1905.08325"},{"key":"16_CR25","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"16_CR26","unstructured":"K\u0159oustek, J., Matula, P., Zemek, P.: Retdec: an open-source machine-code decompiler (2017)"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Lacomis, J., et al.: Dire: a neural approach to decompiled identifier naming. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 628\u2013639. IEEE (2019)","DOI":"10.1109\/ASE.2019.00064"},{"issue":"1","key":"16_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00070-0","volume":"4","author":"R Liang","year":"2021","unstructured":"Liang, R., Cao, Y., Hu, P., Chen, K.: Neutron: an attention-based neural decompiler. Cybersecurity 4(1), 1\u201313 (2021). https:\/\/doi.org\/10.1186\/s42400-021-00070-0","journal-title":"Cybersecurity"},{"key":"16_CR29","unstructured":"Pattis, R.E.: Karel the robot (2021). https:\/\/www.cs.mtsu.edu\/~untch\/karel\/index.html"},{"issue":"1","key":"16_CR30","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1145\/2490301.2451150","volume":"41","author":"E Schkufza","year":"2013","unstructured":"Schkufza, E., Sharma, R., Aiken, A.: Stochastic superoptimization. ACM SIGARCH Comput. Archit. News 41(1), 305\u2013316 (2013)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Shaw, P., Uszkoreit, J., Vaswani, A.: Self-attention with relative position representations. arXiv preprint arXiv:1803.02155 (2018)","DOI":"10.18653\/v1\/N18-2074"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Shoshitaishvili, Y., et al.: SoK: (state of) the art of war: offensive techniques in binary analysis. In: IEEE Symposium on Security and Privacy (2016)","DOI":"10.1109\/SP.2016.17"},{"key":"16_CR33","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Advances in Neural Information Processing Systems, pp. 3104\u20133112 (2014)"},{"key":"16_CR34","unstructured":"Van\u00a0Emmerik, M.J.: Static single assignment for decompilation. University of Queensland (2007)"},{"key":"16_CR35","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"16_CR36","unstructured":"Warren, H.S.: Hacker\u2019s delight. Pearson Education (2013)"},{"key":"16_CR37","unstructured":"Wu, Y., et al.: Google\u2019s neural machine translation system: bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144 (2016)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-4731-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T15:08:48Z","timestamp":1746198528000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-4731-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819647309","9789819647316"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-4731-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"3 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2024.github.io\/#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}