{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T02:13:34Z","timestamp":1773713614186,"version":"3.50.1"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSF","award":["CNS-2247652"],"award-info":[{"award-number":["CNS-2247652"]}]},{"name":"NSF","award":["CNS-2019340"],"award-info":[{"award-number":["CNS-2019340"]}]},{"name":"NSF","award":["ECCS-2140175"],"award-info":[{"award-number":["ECCS-2140175"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1109\/tdsc.2025.3637812","type":"journal-article","created":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T18:26:27Z","timestamp":1764613587000},"page":"3597-3611","source":"Crossref","is-referenced-by-count":0,"title":["Identifying Non-Control Security-Critical Data Through Program Dependence Learning"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0377-2213","authenticated-orcid":false,"given":"Zhilong","family":"Wang","sequence":"first","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8337-1488","authenticated-orcid":false,"given":"Haizhou","family":"Wang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6261-3190","authenticated-orcid":false,"given":"Hong","family":"Hu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5091-8464","authenticated-orcid":false,"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"ref3","first-page":"337","article-title":"Control flow integrity for COTS binaries","volume-title":"Proc. 22nd USENIX Secur. Symp.","author":"Zhang"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243797"},{"key":"ref6","article-title":"Control flow guard","author":"Corporation","year":"2016"},{"key":"ref7","article-title":"Clang control flow integrity","year":"2021"},{"key":"ref8","article-title":"Android control flow integrity","year":"2021"},{"key":"ref9","article-title":"Chromium control flow integrity","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"ref13","article-title":"The advanced Return-into-lib(C) exploits","year":"1985"},{"key":"ref14","first-page":"177","article-title":"Non-control-Data attacks are realistic threats","volume-title":"Proc. 14th USENIX Secur. Symp.","author":"Chen"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243739"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2019.00022"},{"key":"ref19","first-page":"1397","article-title":"VIPER: Spotting syscall-guard variables for data-only attacks","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Ye"},{"key":"ref20","first-page":"1433","article-title":"Not all data are created equal: Data and pointer prioritization for scalable protection against data-oriented attacks","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Ahmed"},{"key":"ref21","first-page":"147","article-title":"Securing software by enforcing data-flow integrity","volume-title":"Proc. 7th Symp. Operating Syst. Des. Implementation","author":"Castro"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"ref23","first-page":"1","volume-title":"Proc. 9th Int. Symp. Memory Manage.","author":"Nagarakatte"},{"key":"ref24","first-page":"275","article-title":"Cyclone: A safe dialect of C","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Jim","year":"2002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178446"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00041"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00082"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23218"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-140502"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref32","article-title":"GraphCodeBERT: Pre-training code representations with data flow","author":"Guo","year":"2020"},{"key":"ref33","article-title":"Learning to represent programs with graphs","author":"Allamanis","year":"2017"},{"key":"ref34","article-title":"Sparks of artificial general intelligence: Early experiments with GPT-4","author":"Bubeck","year":"2023"},{"key":"ref35","first-page":"99","article-title":"Neural nets can learn function type signatures from binaries","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Chua"},{"key":"ref36","first-page":"1787","article-title":"{DEEPVSA}: Facilitating value-set analysis with deep learning for postmortem program analysis","volume-title":"Proc. 28th USENIX Secur.","author":"Guo"},{"key":"ref37","first-page":"611","article-title":"Recognizing functions in binaries with neural networks","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Shin"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484587"},{"key":"ref39","first-page":"177","article-title":"Automatic generation of data-oriented exploits","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Hu"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473932"},{"key":"ref41","first-page":"813","article-title":"Dynamic hooks: Hiding control flow changes within non-control data","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Vogl"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"ref43","article-title":"Evaluating modern defenses against control flow hijacking","author":"Otgonbaatar","year":"2015"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3129743.3129748"},{"key":"ref45","first-page":"1","article-title":"Write once, pwn anywhere","volume-title":"Proc. Black Hat USA Brief.","author":"Yu"},{"key":"ref46","first-page":"1","article-title":"Look mom, I dont use shellcode","volume-title":"Proc. Hack Box Secur. Conf.","author":"Jodeit"},{"key":"ref47","article-title":"The power of data-oriented attacks: Bypassing memory mitigation using data-only exploitation technique","volume-title":"Proc. Black Hat Asia Brief.","author":"Sun"},{"key":"ref48","article-title":"The HeartBleed bug","year":"2015"},{"key":"ref49","volume-title":"C Primer Plus","author":"Waite","year":"1987"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1996.566449"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-1150"},{"key":"ref52","article-title":"American fuzzy lop (2.52b)","author":"Zalewski","year":"2021"},{"key":"ref53","first-page":"745","article-title":"{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Yun"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3512345"},{"key":"ref55","first-page":"3","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Newsome"},{"key":"ref56","first-page":"123","article-title":"DTA++: Dynamic taint analysis with targeted control-flow propagation","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Kang"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5747"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00717"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00049"},{"key":"ref61","article-title":"Gated graph sequence neural networks","author":"Li","year":"2015"},{"key":"ref62","article-title":"Tudataset: A collection of benchmark datasets for learning with graphs","author":"Morris","year":"2020","journal-title":"arXiv:2007.08663"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5803"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206723"},{"key":"ref65","article-title":"Which features are learned by codebert: An empirical study of the BERT-based source code representation learning","author":"Zhang","year":"2023"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8858\/11434575\/11271724-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11434575\/11271724.pdf?arnumber=11271724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T01:17:01Z","timestamp":1773710221000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11271724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":66,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3637812","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3]]}}}