{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T19:40:03Z","timestamp":1720640403534},"reference-count":7,"publisher":"World Scientific Pub Co Pte Ltd","issue":"09","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2018,9]]},"abstract":"<jats:p>Due to increasing use of third-party libraries because of the increasing complexity of software development, the lack of management of legacy code and the nature of embedded software, the use of third-party libraries which have no source code is increasing. Without the source code, it is difficult to analyze these libraries for vulnerabilities. Therefore, to analyze weaknesses inherent in binary code, various studies have been conducted to perform static analysis using intermediate code. The conversion from binary code to intermediate language differs depending on the execution environment. In this paper, we propose a deep learning-based analysis method to reconstruct missing data types during the compilation process from binary code to intermediate language, and propose a method to generate supervised learning data for deep learning.<\/jats:p>","DOI":"10.1142\/s0218194018400156","type":"journal-article","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T05:55:21Z","timestamp":1537854921000},"page":"1267-1286","source":"Crossref","is-referenced-by-count":2,"title":["A Type Information Reconstruction Scheme Based on Long Short-Term Memory for Weakness Analysis in Binary File"],"prefix":"10.1142","volume":"28","author":[{"given":"Junho","family":"Jeong","sequence":"first","affiliation":[{"name":"Electronic Commerce Institute, Dongguk University, 123 Dongdae-ro, Gyeongju 38066, Republic of Korea"}]},{"given":"Yangsun","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Seokyeong University, 124 Seokyeong-ro, Sungbuk-Ku, Seoul 02713, Republic of Korea"}]},{"given":"Uduakobong George","family":"Offong","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Dongguk University, 30 Phildong-ro 1gil, Jung-Gu, Seoul 04620, Republic of Korea"}]},{"given":"Yunsik","family":"Son","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Dongguk University, 30 Phildong-ro 1gil, Jung-Gu, Seoul 04620, Republic of Korea"}]}],"member":"219","published-online":{"date-parts":[[2018,9,24]]},"reference":[{"key":"S0218194018400156BIB009","first-page":"81","volume-title":"A Taxonomy of Software Security Errors","author":"Tsipenyuk K.","year":"2005"},{"key":"S0218194018400156BIB021","first-page":"208","volume-title":"Lecture Notes in Computer Science","author":"Mycroft A.","year":"1999"},{"key":"S0218194018400156BIB022","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462165"},{"key":"S0218194018400156BIB025","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"S0218194018400156BIB027","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-0-387-30164-8_66","volume-title":"Encyclopedia of Machine Learning","author":"Orbanz P.","year":"2011"},{"key":"S0218194018400156BIB029","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"S0218194018400156BIB030","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2582924"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194018400156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T18:29:55Z","timestamp":1720636195000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194018400156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":7,"journal-issue":{"issue":"09","published-online":{"date-parts":[[2018,9,24]]},"published-print":{"date-parts":[[2018,9]]}},"alternative-id":["10.1142\/S0218194018400156"],"URL":"https:\/\/doi.org\/10.1142\/s0218194018400156","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}