{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T00:01:31Z","timestamp":1752192091722,"version":"3.41.2"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"14","license":[{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2023603C043"],"award-info":[{"award-number":["JCKY2023603C043"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019033","name":"Key Research and Development Plan of Heilongjiang Province","doi-asserted-by":"publisher","award":["2022ZX01C01"],"award-info":[{"award-number":["2022ZX01C01"]}],"id":[{"id":"10.13039\/501100019033","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,7,15]]},"DOI":"10.1109\/jiot.2025.3562205","type":"journal-article","created":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T13:38:32Z","timestamp":1744983512000},"page":"27291-27306","source":"Crossref","is-referenced-by-count":0,"title":["UDA: Unified Pretraining for Multiarchitecture Binary Disassembly"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8624-8557","authenticated-orcid":false,"given":"Xunzhi","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5748-5438","authenticated-orcid":false,"given":"Shen","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2786-8526","authenticated-orcid":false,"given":"Yuxin","family":"Gong","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0571-3194","authenticated-orcid":false,"given":"Li","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]},{"given":"Tingyue","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]},{"given":"Xiangzhan","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science, Harbin Institute of Technology, Harbin, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3318988"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_31"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3036232"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3299492"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104029"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3436903"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653736"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3312152"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3310578"},{"key":"ref10","first-page":"95","article-title":"A large-scale analysis of the security of embedded firmwares","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Costin"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2022.3187811"},{"article-title":"Hex-Rays","volume-title":"IDA pro","year":"2008","key":"ref12"},{"volume-title":"Ghidra","year":"2019","author":"Agency","key":"ref13"},{"key":"ref14","first-page":"1","article-title":"XDA: Accurate, robust disassembly with transfer learning","volume-title":"Proc. 28th Annu. Netw. Distrib. Syst. Secur. Symp. (NDSS)","author":"Pei"},{"key":"ref15","first-page":"845","article-title":"BYTEWEIGHT: Learning to recognize functions in binary code","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Bao"},{"article-title":"Objdump","volume-title":"man7.org","year":"1991","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2016.17"},{"key":"ref18","first-page":"1","article-title":"Driller: Augmenting fuzzing through selective symbolic execution","volume-title":"Proc. 23rd Annu. Netw. Distrib. Syst. Secur. Symp. (NDSS)","author":"Stephens"},{"key":"ref19","first-page":"1","article-title":"Firmalice\u2014Automatic detection of authentication bypass vulnerabilities in binary firmware","volume-title":"Proc. 22nd Annu. Netw. Distrib. Syst. Secur. Symp. (NDSS)","author":"Shoshitaishvili"},{"volume-title":"Binary Ninja","year":"2015","key":"ref20"},{"key":"ref21","first-page":"2709","article-title":"DeepDi: Learning a relational graph convolutional network model on instructions for fast and accurate disassembly","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Yu"},{"key":"ref22","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguist., Human Lang. Technol. (NAACL-HLT)","author":"Devlin"},{"key":"ref23","first-page":"8024","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inf. Process. Syst. 32nd Annu. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Paszke"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2022.3187689"},{"volume-title":"BinKit","year":"2020","author":"Lab","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616366"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/spro.2015.10"},{"volume-title":"Obfuscator","year":"2017","author":"Wyseur","key":"ref28"},{"article-title":"CodeLabyrinth","volume-title":"Codetronik","year":"2024","key":"ref29"},{"article-title":"Goron","volume-title":"Amimo","year":"2018","key":"ref30"},{"article-title":"Covirt","volume-title":"Dmaivel","year":"2024","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2939255"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2021.00.139"},{"volume-title":"LoongArch","year":"2021","key":"ref34"},{"article-title":"Loongson GNU compilation tool chain","volume-title":"Loongson","year":"2021","key":"ref35"},{"article-title":"Radare2: Libre reversing framework for unix geeks","volume-title":"Radareorg","year":"2014","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931047"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2017.11"},{"key":"ref41","first-page":"131","article-title":"Rev.ng: A unified binary analysis framework to recover CFGs and function boundaries","volume-title":"Proc. 26th Int. Conf. Compil. Constr.","author":"Federico"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/dsn.2017.29"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/dsn53405.2022.00061"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23808-6_34"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06608-0_23"},{"key":"ref46","first-page":"611","article-title":"Recognizing functions in binaries with neural networks","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Shin"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/icsme.2017.59"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11074249\/10970005.pdf?arnumber=10970005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T23:22:13Z","timestamp":1752103333000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10970005\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,15]]},"references-count":48,"journal-issue":{"issue":"14"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3562205","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2025,7,15]]}}}