{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:14:37Z","timestamp":1763968477117,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation, Singapore; National University of Singapore through its National Satellite of Excellence in Trustworthy Software Systems (NSOE-TSS) office under the Trustworthy Software Systems - Core Technologies Grant (TSSCTG)","award":["NSOE-TSS2019-02"],"award-info":[{"award-number":["NSOE-TSS2019-02"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511502","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"107-118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["ReSIL"],"prefix":"10.1145","author":[{"given":"Yan","family":"Lin","sequence":"first","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium. 845--860","author":"Bao Tiffany","year":"2014","unstructured":"Tiffany Bao , Jonathan Burket , Maverick Woo , Rafael Turner , and David Brumley . 2014 . BYT EW E IGHT : Learning to recognize functions in binary code . In Proceedings of the 23rd USENIX Security Symposium. 845--860 . Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. BYT EW E IGHT : Learning to recognize functions in binary code. In Proceedings of the 23rd USENIX Security Symposium. 845--860."},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium. 353--368","author":"Brumley David","year":"2013","unstructured":"David Brumley , JongHyup Lee , Edward J Schwartz , and Maverick Woo . 2013 . Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring . In Proceedings of the 22nd USENIX Security Symposium. 353--368 . David Brumley, JongHyup Lee, Edward J Schwartz, and Maverick Woo. 2013. Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring. In Proceedings of the 22nd USENIX Security Symposium. 353--368."},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 22nd Network and Distributed System Security Symposium.","author":"Caliskan Aylin","year":"2015","unstructured":"Aylin Caliskan , Fabian Yamaguchi , Edwin Dauber , Richard Harang , Konrad Rieck , Rachel Greenstadt , and Arvind Narayanan . 2015 . When coding style survives compilation: De-anonymizing programmers from executable binaries . In Proceedings of the 22nd Network and Distributed System Security Symposium. Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, and Arvind Narayanan. 2015. When coding style survives compilation: De-anonymizing programmers from executable binaries. In Proceedings of the 22nd Network and Distributed System Security Symposium."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00028"},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the 26th USENIX Security Symposium. 99--116","author":"Chua Zheng Leong","year":"2017","unstructured":"Zheng Leong Chua , Shiqi Shen , Prateek Saxena , and Zhenkai Liang . 2017 . Neural nets can learn function type signatures from binaries . In Proceedings of the 26th USENIX Security Symposium. 99--116 . Zheng Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang. 2017. Neural nets can learn function type signatures from binaries. In Proceedings of the 26th USENIX Security Symposium. 99--116."},{"key":"e_1_3_2_2_7_1","unstructured":"DWARF Debugging Information Format Committee et al. 2010. DWARF debugging information format version 4. Free Standards Group (2010).  DWARF Debugging Information Format Committee et al. 2010. DWARF debugging information format version 4. Free Standards Group (2010)."},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 8th USENIX conference on Operating systems design and implementation","volume":"8","author":"Cozzie Anthony","year":"2008","unstructured":"Anthony Cozzie , Frank Stratton , Hui Xue , and Samuel T King . 2008 . Digging for Data Structures . In Proceedings of the 8th USENIX conference on Operating systems design and implementation , Vol. 8 . 255--266. Anthony Cozzie, Frank Stratton, Hui Xue, and Samuel T King. 2008. Digging for Data Structures. In Proceedings of the 8th USENIX conference on Operating systems design and implementation, Vol. 8. 255--266."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462165"},{"key":"e_1_3_2_2_10_1","volume-title":"Decompilers and beyond. Black Hat USA","author":"Guilfanov Ilfak","year":"2008","unstructured":"Ilfak Guilfanov . 2008. Decompilers and beyond. Black Hat USA ( 2008 ), 1--12. Ilfak Guilfanov. 2008. Decompilers and beyond. Black Hat USA (2008), 1--12."},{"key":"e_1_3_2_2_11_1","volume-title":"International Conference on Machine Learning. PMLR, 1321--1330","author":"Guo Chuan","year":"2017","unstructured":"Chuan Guo , Geoff Pleiss , Yu Sun , and Kilian Q Weinberger . 2017 . On calibration of modern neural networks . In International Conference on Machine Learning. PMLR, 1321--1330 . Chuan Guo, Geoff Pleiss, Yu Sun, and Kilian Q Weinberger. 2017. On calibration of modern neural networks. In International Conference on Machine Learning. PMLR, 1321--1330."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243866"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985453"},{"key":"e_1_3_2_2_14_1","unstructured":"INC INTEL. 2018. Intel\u00ae 64 and ia-32 architectures software developer's manual. (2018).  INC INTEL. 2018. Intel\u00ae 64 and ia-32 architectures software developer's manual. (2018)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274746"},{"key":"e_1_3_2_2_16_1","volume-title":"Sooel Son, and Yongdae Kim.","author":"Kim Dongkwan","year":"2020","unstructured":"Dongkwan Kim , Eunsoo Kim , Sang Kil Cha , Sooel Son, and Yongdae Kim. 2020 . Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned . arXiv preprint arXiv:2011.10749 (2020). Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, and Yongdae Kim. 2020. Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned. arXiv preprint arXiv:2011.10749 (2020)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the 18th Network and Distributed System Security Symposium.","author":"Lee JongHyup","year":"2011","unstructured":"JongHyup Lee , Thanassis Avgerinos , and David Brumley . 2011 . TIE: Principled Reverse Engineering of Types in Binary Programs . In Proceedings of the 18th Network and Distributed System Security Symposium. JongHyup Lee, Thanassis Avgerinos, and David Brumley. 2011. TIE: Principled Reverse Engineering of Types in Binary Programs. In Proceedings of the 18th Network and Distributed System Security Symposium."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329815"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00006"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_20"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_23"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00031"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23297"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001433"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA538843"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081855"},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of the 24th USENIX Security Symposium. 611--626","author":"Richard Shin Eui Chul","year":"2015","unstructured":"Eui Chul Richard Shin , Dawn Song , and Reza Moazzezi . 2015 . Recognizing functions in binaries with neural networks . In Proceedings of the 24th USENIX Security Symposium. 611--626 . Eui Chul Richard Shin, Dawn Song, and Reza Moazzezi. 2015. Recognizing functions in binaries with neural networks. In Proceedings of the 24th USENIX Security Symposium. 611--626."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.59"},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. ACM, 366--376","author":"Zeng Dongrui","year":"2018","unstructured":"Dongrui Zeng and Gang Tan . 2018 . From debugging-information based binarylevel type inference to cfg generation . In Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. ACM, 366--376 . Dongrui Zeng and Gang Tan. 2018. From debugging-information based binarylevel type inference to cfg generation. In Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. ACM, 366--376."},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the 34th IEEE Symposium on Security and Privacy. IEEE, 559--573","author":"Zhang Chao","year":"2013","unstructured":"Chao Zhang , Tao Wei , Zhaofeng Chen , Lei Duan , Laszlo Szekeres , Stephen McCamant , Dawn Song , and Wei Zou . 2013 . Practical control flow integrity and randomization for binary executables . In Proceedings of the 34th IEEE Symposium on Security and Privacy. IEEE, 559--573 . Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. 2013. Practical control flow integrity and randomization for binary executables. In Proceedings of the 34th IEEE Symposium on Security and Privacy. IEEE, 559--573."},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium. 337--352","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R Sekar . 2013 . Control Flow Integrity for COTS Binaries . In Proceedings of the 22nd USENIX Security Symposium. 337--352 . Mingwei Zhang and R Sekar. 2013. Control Flow Integrity for COTS Binaries. In Proceedings of the 22nd USENIX Security Symposium. 337--352."}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511502"}},"subtitle":["Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge"],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":34,"alternative-id":["10.1145\/3508398.3511502","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511502","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}