{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:21:06Z","timestamp":1774938066836,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006502","name":"Defense Sciences Office, DARPA","doi-asserted-by":"publisher","award":["FA8750-15-2-0104, FA8750-16-C-0044"],"award-info":[{"award-number":["FA8750-15-2-0104, FA8750-16-C-0044"]}],"id":[{"id":"10.13039\/100006502","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["TWC-1409915,1664315, 1719175"],"award-info":[{"award-number":["TWC-1409915,1664315, 1719175"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134018","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"363-376","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":489,"title":["Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection"],"prefix":"10.1145","author":[{"given":"Xiaojun","family":"Xu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Qian","family":"Feng","sequence":"additional","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]},{"given":"Heng","family":"Yin","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Le","family":"Song","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mart\u00edn Abadi Paul Barham Jianmin Chen Zhifeng Chen Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Geoffrey Irving Michael Isard et almbox. TensorFlow: A system for large-scale machine learning."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2560217.2560219"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Mikhail Belkin and Partha Niyogi 2002. Laplacian eigenmaps and spectral techniques for embedding and clustering Advances in neural information processing systems. 585--591.","DOI":"10.7551\/mitpress\/1120.003.0080"},{"key":"e_1_3_2_1_5_1","volume-title":"BinSlayer: accurate comparison of binary executables Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop","author":"Bourquin Martial","unstructured":"Martial Bourquin, Andy King, and Edward Robbins. 2013. BinSlayer: accurate comparison of binary executables Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Jane Bromley Isabelle Guyon Yann LeCun Eduard Sickinger and Roopak Shah 1993. Signature Verification Using A \"Siamese\" Time Delay Neural Network NIPS.","DOI":"10.1142\/9789812797926_0003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Sang Kil Cha Maverick Woo and David Brumley. 2015. Program-adaptive mutational fuzzing. In Oakland. 10.1109\/SP.2015.50","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_8_1","unstructured":"Daming D. Chen Manuel Egele Maverick Woo and David Brumley 2016. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware NDSS."},{"key":"e_1_3_2_1_9_1","unstructured":"Kai Chen Peng Wang Yeonjoon Lee XiaoFeng Wang Nan Zhang Heqing Huang Wei Zou and Peng Liu. 2015. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale USENIX Security."},{"key":"e_1_3_2_1_10_1","unstructured":"Andrei Costin Jonas Zaddach Aur\u00e9lien Francillon and Davide Balzarotti 2014. A large-scale analysis of the security of embedded firmwares USENIX Security."},{"key":"e_1_3_2_1_11_1","unstructured":"Ang Cui Michael Costello and Salvatore J Stolfo. 2013. When Firmware Modifications Attack: A Case Study of Embedded Exploitation. NDSS."},{"key":"e_1_3_2_1_12_1","volume-title":"Discriminative Embeddings of Latent Variable Models for Structured Data International Conference on Machine Learning.","author":"Dai Hanjun","year":"2016","unstructured":"Hanjun Dai, Bo Dai, and Le Song 2016. Discriminative Embeddings of Latent Variable Models for Structured Data International Conference on Machine Learning."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594343"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Graph-based comparison of executable objects (English version)","volume":"5","author":"Dullien Thomas","year":"2005","unstructured":"Thomas Dullien and Rolf Rolles 2005. Graph-based comparison of executable objects (English version). SSTIC Vol. 5 (2005), 1--3.","journal-title":"SSTIC"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Sebastian Eschweiler Khaled Yakdan and Elmar Gerhards-Padilla 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code Symposium on Network and Distributed System Security (NDSS).","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_16_1","unstructured":"Eleazar Eskin Jason Weston William S Noble and Christina S Leslie 2003. Mismatch string kernels for SVM protein classification Advances in neural information processing systems. 1441--1448."},{"key":"e_1_3_2_1_17_1","volume-title":"Scalable Graph-based Bug Search for Firmware Images ACM Conference on Computer and Communications Security (CCS'16)","author":"Feng Qian","year":"2016","unstructured":"Qian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, and Heng Yin. 2016. Scalable Graph-based Bug Search for Firmware Images ACM Conference on Computer and Communications Security (CCS'16)."},{"key":"e_1_3_2_1_18_1","first-page":"4","article-title":"Visualizing social networks","volume":"1","author":"Freeman Linton C","year":"2000","unstructured":"Linton C Freeman. 2000. Visualizing social networks. Journal of social structure Vol. 1, 1 (2000), 4.","journal-title":"Journal of social structure"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Debin Gao Michael K Reiter and Dawn Song 2008. Binhunt: Automatically finding semantic differences in binary programs. Information and Communications Security.","DOI":"10.1007\/978-3-540-88625-9_16"},{"key":"e_1_3_2_1_20_1","volume-title":"Graph Embedding Techniques, Applications, and Performance: A Survey. arXiv preprint arXiv:1705.02801","author":"Goyal Palash","year":"2017","unstructured":"Palash Goyal and Emilio Ferrara 2017. Graph Embedding Techniques, Applications, and Performance: A Survey. arXiv preprint arXiv:1705.02801 (2017)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_22_1","volume-title":"ISMB","volume":"99","author":"Jaakkola Tommi S","year":"1999","unstructured":"Tommi S Jaakkola, Mark Diekhans, and David Haussler. 1999. Using the Fisher kernel method to detect remote protein homologies. ISMB, Vol. Vol. 99. 149--158."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1005332.1016786"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624046"},{"key":"e_1_3_2_1_26_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik","year":"2014","unstructured":"Diederik Kingma and Jimmy Ba 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_28_1","volume-title":"iBinHunt: binary hunting with inter-procedural control flow. Information Security and Cryptology","author":"Ming Jiang","unstructured":"Jiang Ming, Meng Pan, and Debin Gao 2012. iBinHunt: binary hunting with inter-procedural control flow. Information Security and Cryptology. Springer, 92--109."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_30_1","volume-title":"Cross-Architecture Bug Search in Binary Executables 2015 IEEE Symposium on Security and Privacy (Oakland'15)","author":"Pewny Jannik","year":"2015","unstructured":"Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, and Thorsten Holz. 2015. Cross-Architecture Bug Search in Binary Executables 2015 IEEE Symposium on Security and Privacy (Oakland'15). IEEE."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Jannik Pewny Felix Schuster Lukas Bernhard Thorsten Holz and Christian Rossow 2014. Leveraging semantic signatures for bug search in binary programs ACSAC.","DOI":"10.1145\/2664243.2664269"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the first international workshop on mining graphs, trees and sequences. 65--74","author":"Ramon Jan","year":"2003","unstructured":"Jan Ramon and Thomas G\u00e4rtner 2003. Expressivity versus efficiency of graph kernels. Proceedings of the first international workshop on mining graphs, trees and sequences. 65--74."},{"key":"e_1_3_2_1_33_1","volume-title":"Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley 2014. Optimizing Seed Selection for Fuzzing. In USENIX Security."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2008.04.004"},{"key":"e_1_3_2_1_35_1","volume-title":"Nonlinear dimensionality reduction by locally linear embedding. science","author":"Roweis Sam T","year":"2000","unstructured":"Sam T Roweis and Lawrence K Saul 2000. Nonlinear dimensionality reduction by locally linear embedding. science, Vol. 290, 5500 (2000), 2323--2326."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_2_1_37_1","volume-title":"Learning with kernels","author":"Sch\u00f6lkopf Bernhard","year":"2002","unstructured":"Bernhard Sch\u00f6lkopf and Alexander J Smola 2002. Learning with kernels. 2002. (2002)."},{"key":"e_1_3_2_1_38_1","volume-title":"Kernel methods in computational biology","author":"Sch\u00f6lkopf Bernhard","unstructured":"Bernhard Sch\u00f6lkopf, Koji Tsuda, and Jean-Philippe Vert. 2004. Kernel methods in computational biology. MIT press."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078187"},{"key":"e_1_3_2_1_40_1","unstructured":"Nino Shervashidze SVN Vishwanathan Tobias Petri Kurt Mehlhorn and Karsten Borgwardt. 2009. Efficient graphlet kernels for large graph comparison Artificial Intelligence and Statistics. 488--495."},{"key":"e_1_3_2_1_41_1","unstructured":"Eui Chul Richard Shin Dawn Song and Reza Moazzezi. 2015. Recognizing Functions in Binaries with Neural Networks. USENIX Security. 611--626."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2015. Firmalice-Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. NDSS. 10.14722\/ndss.2015.23294","DOI":"10.14722\/ndss.2015.23294"},{"key":"e_1_3_2_1_43_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution NDSS.","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, and Ruoyu Wang. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution NDSS."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_1_45_1","first-page":"3221","article-title":"Accelerating t-SNE using tree-based algorithms","volume":"15","author":"Der Maaten Laurens Van","year":"2014","unstructured":"Laurens Van Der Maaten. 2014. Accelerating t-SNE using tree-based algorithms. Journal of machine learning research Vol. 15, 1 (2014), 3221--3245.","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_46_1","volume-title":"Revisiting semi-supervised learning with graph embeddings. arXiv preprint arXiv:1603.08861","author":"Yang Zhilin","year":"2016","unstructured":"Zhilin Yang, William W Cohen, and Ruslan Salakhutdinov. 2016. Revisiting semi-supervised learning with graph embeddings. arXiv preprint arXiv:1603.08861 (2016)."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134018","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134018","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:27Z","timestamp":1750212807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":45,"alternative-id":["10.1145\/3133956.3134018","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134018","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}