{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T06:56:15Z","timestamp":1764399375769,"version":"3.46.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,25]]},"DOI":"10.1109\/snpd65828.2025.11252836","type":"proceedings-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:40:29Z","timestamp":1764355229000},"page":"899-906","source":"Crossref","is-referenced-by-count":0,"title":["Deep Learning-based Binary Analysis for Vulnerability Detection in x86-64 Machine Code"],"prefix":"10.1109","author":[{"given":"Mitchell","family":"Petingola","sequence":"first","affiliation":[{"name":"Algoma University,Department of Computer Science and Mathematics,Sault Ste Marie,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2016.11"},{"key":"ref2","first-page":"698","article-title":"Detecting false alarms from automatic static analysis tools: How far are we?","volume-title":"Proceedings of the 44th International Conference on Software Engineering","author":"Kang"},{"author":"De Silva","key":"ref3","article-title":"A comparative analysis of static and dynamic code analysis techniques"},{"article-title":"On the generation of disassembly ground truth and the evaluation of disassemblers","author":"Li","key":"ref4","doi-asserted-by":"crossref","DOI":"10.1145\/3411502.3418429"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00121"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-024-10496-y"},{"issue":"2","key":"ref7","first-page":"265","article-title":"A survey of static analysis methods for identifying security vulnerabilities in software systems","volume":"46","author":"Pistoia"},{"key":"ref8","first-page":"1025","article-title":"Dead store elimination (still) considered harmful","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Yang"},{"year":"2025","key":"ref9","article-title":"Ghidra"},{"year":"2024","key":"ref10","article-title":"Binary Ninja"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00088-4"},{"key":"ref12","first-page":"472","article-title":"Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization","volume-title":"2019 IEEE Symposium on Security and Privacy (SP)","author":"Ding"},{"key":"ref13","article-title":"Common weakness enumeration (CWE)"},{"issue":"10","key":"ref14","first-page":"88","article-title":"Juliet 1.1 c\/c++ and java test suite","volume":"45","author":"Boland"},{"author":"Mikolov","key":"ref15","article-title":"Efficient estimation of word representations in vector space"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484587"},{"volume-title":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual.","year":"1997","author":"Corporation","key":"ref17"},{"article-title":"Convolutional neural networks for sentence classification","author":"Kim","key":"ref18","doi-asserted-by":"crossref","DOI":"10.3115\/v1\/D14-1181"},{"author":"Vaswani","key":"ref19","article-title":"Attention is all you need"},{"author":"Kipf","key":"ref20","article-title":"Semi-supervised classification with graph convolutional networks"},{"author":"Cangea","key":"ref21","article-title":"Towards sparse hierarchical graph classifiers"},{"article-title":"Exploring the impact of temperature scaling in softmax for classification and adversarial robustness","year":"2025","author":"Xuan","key":"ref22"},{"issue":"2","key":"ref23","first-page":"47","article-title":"How secure is AI-generated code: A large-scale comparison of large language models","volume":"30","author":"Tihanyi"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240481"},{"key":"ref25","first-page":"219","article-title":"The NiCad clone detector","volume-title":"2011 IEEE 19th International Conference on Program Comprehension.","author":"Cordy"},{"key":"ref26","article-title":"GCC optimization options: Compiler documentation"},{"author":"Cong","key":"ref27","article-title":"On provable benefits of depth in training graph convolutional networks"},{"key":"ref28","first-page":"317","article-title":"All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)","volume-title":"2010 IEEE Symposium on Security and Privacy.","author":"Schwartz"}],"event":{"name":"2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2025,6,25]]},"location":"Busan, Korea, Republic of","end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11251382\/11252538\/11252836.pdf?arnumber=11252836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T06:51:45Z","timestamp":1764399105000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11252836\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,25]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/snpd65828.2025.11252836","relation":{},"subject":[],"published":{"date-parts":[[2025,6,25]]}}}