{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:43:26Z","timestamp":1740120206350,"version":"3.37.3"},"reference-count":60,"publisher":"World Scientific Pub Co Pte Ltd","issue":"10","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272078"],"award-info":[{"award-number":["61272078"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032010"],"award-info":[{"award-number":["62032010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172201"],"award-info":[{"award-number":["62172201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008048","name":"Nanjing University","doi-asserted-by":"crossref","award":["202201B058"],"award-info":[{"award-number":["202201B058"]}],"id":[{"id":"10.13039\/501100008048","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:p> Function signature recovery is vital for many binary analysis tasks, led by control-flow integrity enhancement. To minimize human effort, existing works attempt to replace rule-based methods with learning-based methods. These works put a lot of work into improving the system\u2019s performance, but this had the unintended consequence of increasing resource usage. However, recovering the function signature is more about providing information for subsequent tasks, e.g. reverse engineering, so both efficiency and performance are significant. <\/jats:p><jats:p> To identify the fundamental factors that increase efficiency, we attempt to optimize data-driven systems throughout their lifecycle from a data perspective. To this end, we perform detailed data analysis on a carefully collected dataset. After analysis and exploration, selective input is adopted and a multi-task learning (MTL) structure is introduced for function feature recovery to make full use of mutual information, and the computing resource overhead is optimized based on the observation of information deviation and sub-task relationship. The resource usage of the entire process is significantly reduced by our suggested solution, named Nimbus++\u00a0for efficient function signature recovery, without sacrificing performance. Our test findings demonstrate that we even surpass the state-of-the-art method\u2019s prediction accuracy across all function signature recovery tasks by about 1% with just about 12.5% of the processing time. <\/jats:p>","DOI":"10.1142\/s0218194023500420","type":"journal-article","created":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T06:55:56Z","timestamp":1688021756000},"page":"1537-1565","source":"Crossref","is-referenced-by-count":0,"title":["Nimbus++: Revisiting Efficient Function Signature Recovery with Depth Data Analysis"],"prefix":"10.1142","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0076-3708","authenticated-orcid":false,"given":"Ligeng","family":"Chen","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]},{"given":"Yi","family":"Qian","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]},{"given":"Yuyang","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]},{"given":"Bing","family":"Mao","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]}],"member":"219","published-online":{"date-parts":[[2023,8,23]]},"reference":[{"key":"S0218194023500420BIB001","first-page":"1","volume-title":"Int. Conf. Information Systems Security","author":"Song D.","year":"2008"},{"key":"S0218194023500420BIB002","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/1572272.1572299","volume-title":"Proc. Eighteenth Int. Symp. Software Testing and Analysis","author":"Saxena P.","year":"2009"},{"key":"S0218194023500420BIB003","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/1572272.1572287","volume-title":"Proc. Eighteenth Int. Symp. Software Testing and Analysis","author":"S\u00e6bj\u00f8rnsen A.","year":"2009"},{"key":"S0218194023500420BIB004","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/1985441.1985453","volume-title":"Proc. 8th Working Conf. Mining Software Repositories","author":"Hemel A.","year":"2011"},{"key":"S0218194023500420BIB005","first-page":"299","volume-title":"Proc. 28th Annual Computer Security Applications Conference","author":"Wartell R.","year":"2012"},{"key":"S0218194023500420BIB006","first-page":"337","volume-title":"22nd USENIX Security Symposium","author":"Zhang M.","year":"2013"},{"key":"S0218194023500420BIB007","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/SP.2013.44","volume-title":"2013 IEEE Symp. Security and Privacy","author":"Zhang C.","year":"2013"},{"volume-title":"Symposium on Network and Distributed System Security","year":"2015","author":"Prakash A.","key":"S0218194023500420BIB008"},{"key":"S0218194023500420BIB009","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1109\/SP.2016.60","volume-title":"2016 IEEE Symp. Security and Privacy","author":"Veen V. V. D.","year":"2016"},{"key":"S0218194023500420BIB010","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/978-3-030-00470-5_20","volume-title":"Int. Symp. Research in Attacks, Intrusions, and Defenses","author":"Muntean P.","year":"2018"},{"key":"S0218194023500420BIB011","first-page":"3","volume-title":"Proc. 2019 ACM Asia Conf. Computer and Communications Security","author":"Lin Y.","year":"2019"},{"key":"S0218194023500420BIB012","first-page":"88","volume-title":"2020 50th Annual IEEE\/IFIP Int. Conf. Dependable Systems and Networks","author":"Chen L.","year":"2020"},{"key":"S0218194023500420BIB013","first-page":"1667","volume-title":"Proc. 2018 ACM SIGSAC Conf. Computer and Communications Security","author":"He J.","year":"2018"},{"key":"S0218194023500420BIB014","first-page":"845","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Bao T.","year":"2014"},{"key":"S0218194023500420BIB015","first-page":"611","volume-title":"24th USENIX security symposium (USENIX Security 15)","author":"Shin E. C. R.","year":"2015"},{"issue":"1","key":"S0218194023500420BIB016","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1609956.1609960","volume":"13","author":"Abadi M.","year":"2009","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"S0218194023500420BIB017","first-page":"1","volume-title":"Int. Workshop on Verification, Model Checking, and Abstract Interpretation","author":"Balakrishnan G.","year":"2007"},{"key":"S0218194023500420BIB019","first-page":"1","volume-title":"Proc. 11th Annual Information Security Symposium","author":"Lin Z.","year":"2010"},{"volume-title":"Proc. Network and Distributed System Security Symposium","year":"2011","author":"Lee J.","key":"S0218194023500420BIB020"},{"key":"S0218194023500420BIB021","first-page":"51","volume-title":"Proc. 34th ACM SIGPLAN Conf. Programming Language Design and Implementation","author":"ElWazeer K.","year":"2013"},{"key":"S0218194023500420BIB022","first-page":"99","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Chua Z. L.","year":"2017"},{"key":"S0218194023500420BIB023","first-page":"107","volume-title":"Proc. Twelveth ACM Conf. Data and Application Security and Privacy","author":"Lin Y.","year":"2022"},{"key":"S0218194023500420BIB024","first-page":"103","volume-title":"Proc. SSST-8, Eighth Workshop on Syntax, Semantics and Structure in Statistical Translation","author":"Cho K.","year":"2014"},{"issue":"1","key":"S0218194023500420BIB025","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1023\/A:1007379606734","volume":"28","author":"Caruana R.","year":"1997","journal-title":"Mach. Learn."},{"key":"S0218194023500420BIB026","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/SP40001.2021.00006","volume-title":"2021 IEEE Symp. Security and Privacy","author":"Lin Y.","year":"2021"},{"key":"S0218194023500420BIB027","first-page":"430","volume-title":"Int. Conf. Formal Engineering Methods","author":"Xu Z.","year":"2017"},{"key":"S0218194023500420BIB028","first-page":"288","volume-title":"Int. Conf. Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Maier A.","year":"2019"},{"key":"S0218194023500420BIB029","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1145\/1014052.1014105","volume-title":"Proc. Tenth ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining","author":"Kolter J. Z.","year":"2004"},{"key":"S0218194023500420BIB030","first-page":"798","volume-title":"Proc. 23rd National Conf. Artificial Intelligence \u2014 Volume 2","author":"Rosenblum N.","year":"2008"},{"key":"S0218194023500420BIB031","first-page":"611","volume-title":"Proc. 16th ACM Conf. Computer and Communications Security","author":"Hu X.","year":"2009"},{"key":"S0218194023500420BIB032","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1145\/2001420.2001433","volume-title":"Proc. 2011 Int. Symp. Software Testing and Analysis","author":"Rosenblum N.","year":"2011"},{"key":"S0218194023500420BIB033","first-page":"187","volume-title":"2013 USENIX Annual Technical Conference (USENIX ATC 13)","author":"Hu X.","year":"2013"},{"key":"S0218194023500420BIB034","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1145\/2664243.2664269","volume-title":"Proc. 30th Annual Computer Security Applications Conference","author":"Pewny J.","year":"2014"},{"key":"S0218194023500420BIB035","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1109\/SP.2015.49","volume-title":"2015 IEEE Symp. Security and Privacy","author":"Pewny J.","year":"2015"},{"key":"S0218194023500420BIB036","first-page":"480","volume-title":"Proc. 2016 ACM SIGSAC Conf. Computer and Communications Security","author":"Feng Q.","year":"2016"},{"key":"S0218194023500420BIB037","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/ASE.2019.00090","volume-title":"2019 34th IEEE\/ACM Int. Conf. Automated Software Engineering (ASE)","author":"Mu D.","year":"2019"},{"volume-title":"Proc. 2021 Network and Distributed System Security Symposium","year":"2021","author":"Pei K.","key":"S0218194023500420BIB038"},{"key":"S0218194023500420BIB039","first-page":"224","volume-title":"2021 51st Annual IEEE\/IFIP Int. Conf. Dependable Systems and Networks","author":"Yang S.","year":"2021"},{"key":"S0218194023500420BIB040","first-page":"1","volume-title":"Proc. 31st ACM SIGSOFT Int. Symp. on Software Testing and Analysis","author":"Wang H.","year":"2022"},{"key":"S0218194023500420BIB041","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-030-58536-5_10","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Mao C.","year":"2020"},{"key":"S0218194023500420BIB042","first-page":"3994","volume-title":"Proc. IEEE Conf. Computer Vision and Pattern Recognition","author":"Misra I.","year":"2016"},{"key":"S0218194023500420BIB043","first-page":"1593","volume-title":"Advances in Neural Information Processing Systems","volume":"30","author":"Long M.","year":"2017"},{"key":"S0218194023500420BIB044","first-page":"2956","volume-title":"Proc. 35th Int. Conf. Machine Learning, Proceedings of Machine Learning Research","volume":"80","author":"Lee H. B.","year":"2018"},{"issue":"1","key":"S0218194023500420BIB045","first-page":"216","volume":"33","author":"Ma J.","year":"2019","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"S0218194023500420BIB046","first-page":"5014","volume-title":"2015 IEEE Int. Conf. Acoustics, Speech and Signal Processing","author":"Giri R.","year":"2015"},{"key":"S0218194023500420BIB047","first-page":"2101","volume-title":"Proc. 2017 Conf. Empirical Methods in Natural Language Processing","author":"Isonuma M.","year":"2017"},{"key":"S0218194023500420BIB048","first-page":"87","volume-title":"Proc. 2018 World Wide Web Conference","author":"Zou B.","year":"2018"},{"key":"S0218194023500420BIB049","doi-asserted-by":"crossref","first-page":"565","DOI":"10.18653\/v1\/W19-5368","volume-title":"Proc. Fourth Conf. Machine Translation (Volume 2: Shared Task Papers, Day 1)","author":"Zhou S.","year":"2019"},{"key":"S0218194023500420BIB050","first-page":"1091","volume-title":"Proc. 43rd Int. ACM SIGIR Conf. Research and Development in Information Retrieval","author":"Meng W.","year":"2020"},{"key":"S0218194023500420BIB051","first-page":"48","volume-title":"2021 IEEE Int, Conf. Software Analysis, Evolution and Reengineering","author":"Wang D.","year":"2021"},{"key":"S0218194023500420BIB052","first-page":"138","volume-title":"2021 IEEE\/ACM 29th Int. Conf. Program Comprehension","author":"Xie R.","year":"2021"},{"key":"S0218194023500420BIB053","first-page":"7282","volume-title":"Proc. IEEE\/CVF Conf. Computer Vision and Pattern Recognition","author":"Huang Z.","year":"2021"},{"key":"S0218194023500420BIB054","first-page":"717","volume-title":"2021 36th IEEE\/ACM Int. Conf. Automated Software Engineering","author":"Le T. H. M.","year":"2021"},{"key":"S0218194023500420BIB056","first-page":"454","volume-title":"2022 IEEE 22nd Int. Conf. Software Quality, Reliability and Security","author":"Qian Y.","year":"2022"},{"issue":"302","key":"S0218194023500420BIB058","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/14786440009463897","volume":"50","author":"Pearson F. R. S. K.","year":"1900","journal-title":"Philos. Mag."},{"key":"S0218194023500420BIB059","first-page":"3111","volume-title":"NIPS\u201913: Proc. 26th Int. Conf. Neural Information Processing Systems","author":"Mikolov T.","year":"2013"},{"key":"S0218194023500420BIB060","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"Bojanowski P.","year":"2017","journal-title":"Trans. Assoc. Comput. Linguist."},{"issue":"8","key":"S0218194023500420BIB061","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"Hochreiter S.","year":"1997","journal-title":"Neural Comput."},{"volume-title":"3rd Int. Conf. Learning Representations","year":"2015","author":"Kingma D. P.","key":"S0218194023500420BIB062"},{"issue":"1","key":"S0218194023500420BIB063","first-page":"1929","volume":"15","author":"Srivastava N.","year":"2014","journal-title":"J. Mach. Learn. Res."}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194023500420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T06:50:11Z","timestamp":1697179811000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218194023500420"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,23]]},"references-count":60,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["10.1142\/S0218194023500420"],"URL":"https:\/\/doi.org\/10.1142\/s0218194023500420","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"type":"print","value":"0218-1940"},{"type":"electronic","value":"1793-6403"}],"subject":[],"published":{"date-parts":[[2023,8,23]]}}}