{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:12:35Z","timestamp":1772039555647,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/K035584\/1"],"award-info":[{"award-number":["EP\/K035584\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427265","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"373-385","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Probabilistic Naming of Functions in Stripped Binaries"],"prefix":"10.1145","author":[{"given":"James","family":"Patrick-Evans","sequence":"first","affiliation":[{"name":"Royal Holloway University of London"}]},{"given":"Lorenzo","family":"Cavallaro","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"given":"Johannes","family":"Kinder","sequence":"additional","affiliation":[{"name":"Bundeswehr University Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Saed Alrabaee Lingyu Wang and Mourad Debbabi. 2016. BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs).Digital Investigation 18(2016) S11\u2013S22.  Saed Alrabaee Lingyu Wang and Mourad Debbabi. 2016. BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs).Digital Investigation 18(2016) S11\u2013S22.","DOI":"10.1016\/j.diin.2016.04.002"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.11"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Bao Tiffany","year":"2014"},{"key":"e_1_3_2_1_4_1","unstructured":"Eli Bendersky. 2018. PyELFTools - A Python Library for parsing ELF files. https:\/\/github.com\/eliben\/pyelftools.  Eli Bendersky. 2018. PyELFTools - A Python Library for parsing ELF files. https:\/\/github.com\/eliben\/pyelftools."},{"key":"e_1_3_2_1_5_1","unstructured":"Brian\u00a0N. Bershad and Jeffrey\u00a0C. Mogul (Eds.). 2006. Operating Systems Design and Implementation (OSDI).USENIX Association.  Brian\u00a0N. Bershad and Jeffrey\u00a0C. Mogul (Eds.). 2006. Operating Systems Design and Implementation (OSDI).USENIX Association."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978422"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/0916069"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_10_1","volume-title":"Claripy: An abstraction layer for constraint solvers.","author":"UC\u00a0Santa\u00a0Barbra Computer Security\u00a0Lab and Arizona State\u00a0University SEFCOM.","year":"2020"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.50"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 33nd International Conference on Machine Learning, ICML 2016","author":"Dai Hanjun","year":"2016"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236059"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Egele Manuel","year":"2014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_17_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016","author":"TensorFlow Mart\u00edn\u00a0Abadi","year":"2016"},{"key":"e_1_3_2_1_18_1","volume-title":"BinClone: Detecting Code Clones in Malware. In Eighth International Conference on Software Security and Reliability, SERE 2014","author":"Farhadi Mohammad\u00a0Reza","year":"2014"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_20_1","volume-title":"GI SIG SIDAR Workshop, Ulrich Flegel and Michael Meier (Eds.), Vol.\u00a0P-46","author":"Flake Halvar","year":"2004"},{"key":"e_1_3_2_1_21_1","volume-title":"The impact of nlp techniques in the multilabel text classification problem.In Intelligent Information Processing and Web Mining","author":"Gon\u00e7alves Teresa"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190258"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243866"},{"key":"e_1_3_2_1_24_1","volume-title":"BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis. In 2018 IEEE International Conference on Software Maintenance and Evolution, ICSME 2018","author":"Hu Yikun","year":"2018"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024569.2024571"},{"key":"e_1_3_2_1_26_1","unstructured":"James Patrick-Evans Lorenzo Cavallaro and Johannes Kinder. 2020. Feature Embeddings for Binary Symbols with Symbol2Vec.https:\/\/www.github.com\/punstrip\/symbol2vec.  James Patrick-Evans Lorenzo Cavallaro and Johannes Kinder. 2020. Feature Embeddings for Binary Symbols with Symbol2Vec.https:\/\/www.github.com\/punstrip\/symbol2vec."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115648"},{"key":"e_1_3_2_1_29_1","volume-title":"Probabilistic Graphical Models: Principles and Techniques","author":"Koller Daphne"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1078"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542485"},{"key":"e_1_3_2_1_33_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space.CoRR abs\/1301.3781(2013).  Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space.CoRR abs\/1301.3781(2013)."},{"key":"e_1_3_2_1_34_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Gregory\u00a0S. Corrado and Jeffrey Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality.. In Advances in Neural Information Processing Systems. 3111\u20133119.  Tomas Mikolov Ilya Sutskever Kai Chen Gregory\u00a0S. Corrado and Jeffrey Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality.. In Advances in Neural Information Processing Systems. 3111\u20133119."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"George\u00a0A. Miller. 1995. WordNet: A Lexical Database for English.. In Communications of the ACM Vol.\u00a0Vol. 38 No. 11:. 39\u201341.  George\u00a0A. Miller. 1995. WordNet: A Lexical Database for English.. In Communications of the ACM Vol.\u00a0Vol. 38 No. 11:. 39\u201341.","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_1_36_1","unstructured":"Kevin\u00a0P. Murphy Yair Weiss and Michael\u00a0I. Jordan. 2013. Loopy Belief Propagation for Approximate Inference: An Empirical Study.CoRR abs\/1301.6725(2013).  Kevin\u00a0P. Murphy Yair Weiss and Michael\u00a0I. Jordan. 2013. Loopy Belief Propagation for Approximate Inference: An Empirical Study.CoRR abs\/1301.6725(2013)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362621"},{"key":"e_1_3_2_1_38_1","volume-title":"Expose: Discovering Potential Binary Code Re-use. In 37th Annual IEEE Computer Software and Applications Conference, COMPSAC 2013","author":"Ng Beng\u00a0Heng","year":"2013"},{"key":"e_1_3_2_1_39_1","volume-title":"Capstone: Next-Gen Disassembly Framework.. In BlackHat USA.","author":"Anh\u00a0Quynh Coseinc Nguyen","year":"2014"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_41_1","volume-title":"Cross-Architecture Bug Search in Binary Executables. In 2015 IEEE Symposium on Security and Privacy, SP 2015","author":"Pewny Jannik","year":"2015"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, AAAI 2008","author":"Rosenblum E.","year":"2008"},{"key":"e_1_3_2_1_44_1","volume-title":"Weisfeiler-Lehman Graph Kernels.Journal of Machine Learning Research 12","author":"Shervashidze Nino","year":"2011"},{"key":"e_1_3_2_1_45_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Chul\u00a0Richard Shin Eui","year":"2015"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_14"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christopher Salls Nick Stephens Mario Polino Andrew Dutcher John Grosen Siji Feng Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2015. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. (2015).  Yan Shoshitaishvili Ruoyu Wang Christopher Salls Nick Stephens Mario Polino Andrew Dutcher John Grosen Siji Feng Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2015. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. (2015).","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_49_1","volume-title":"Sutton and Andrew McCallum","author":"A.","year":"2012"},{"key":"e_1_3_2_1_50_1","volume-title":"Numerical methods for the solution of ill-posed problems. Vol.\u00a0328","author":"Tikhonov Andre\u00a0Nikolaevich"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_52_1","unstructured":"Zynamics. 2019. Using BinDiff v1.6 for Malware analysis.(2019). https:\/\/www.zynamics.com\/downloads\/bindiff_malware-1.pdf  Zynamics. 2019. Using BinDiff v1.6 for Malware analysis.(2019). https:\/\/www.zynamics.com\/downloads\/bindiff_malware-1.pdf"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427265","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427265"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":52,"alternative-id":["10.1145\/3427228.3427265","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427265","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}