{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:10:52Z","timestamp":1767262252664,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T00:00:00Z","timestamp":1645142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,18]]},"DOI":"10.1145\/3529836.3529926","type":"proceedings-article","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T20:27:55Z","timestamp":1655843275000},"page":"266-271","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Learning-based Vulnerability Detection in Binary Code"],"prefix":"10.1145","author":[{"given":"Amy","family":"Aumpansub","sequence":"first","affiliation":[{"name":"School of Computing, DePaul University, U.S.A"}]},{"given":"Zhen","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computing, DePaul University, U.S.A"}]}],"member":"320","published-online":{"date-parts":[[2022,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[\n  1\n  ]  533 million Facebook users\u2019 phone numbers and personal data have been leaked online 2021. https:\/\/www.cshub.com\/attacks\/articles\/iotw-facebook-data-leak-impacts-533-million-users.  [1] 533 million Facebook users\u2019 phone numbers and personal data have been leaked online 2021. https:\/\/www.cshub.com\/attacks\/articles\/iotw-facebook-data-leak-impacts-533-million-users."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457682.3457707"},{"key":"e_1_3_2_1_3_1","unstructured":"[\n  3\n  ]  CISA orders agencies to quickly patch critical Netlogon bug 2020. https:\/\/www.cyberscoop.com\/cisa-netlogon-microsoft-vulnerability-emergency\/.  [3] CISA orders agencies to quickly patch critical Netlogon bug 2020. https:\/\/www.cyberscoop.com\/cisa-netlogon-microsoft-vulnerability-emergency\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092566"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857720"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.43"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.51"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23052"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465771"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Learning Representations.","author":"Le Tue","year":"2018","unstructured":"Tue Le , Tuan Nguyen , Trung Le , Dinh Phung , Paul Montague , Olivier De\u00a0Vel , and Lizhen Qu . 2018 . Maximal divergence sequential autoencoder for binary software vulnerability detection . In International Conference on Learning Representations. Tue Le, Tuan Nguyen, Trung Le, Dinh Phung, Paul Montague, Olivier De\u00a0Vel, and Lizhen Qu. 2018. Maximal divergence sequential autoencoder for binary software vulnerability detection. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930578"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991102"},{"volume-title":"Proceedings of the 25th Annual Network and Distributed System Security Symposium, Vol.\u00a0abs\/1801","author":"Li Z.","key":"e_1_3_2_1_14_1","unstructured":"Z. Li , D. Zou , Shouhuai Xu , Xinyu Ou , H. Jin , S. Wang , Zhijun Deng , and Y. Zhong . 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection . In Proceedings of the 25th Annual Network and Distributed System Security Symposium, Vol.\u00a0abs\/1801 .01681. Z. Li, D. Zou, Shouhuai Xu, Xinyu Ou, H. Jin, S. Wang, Zhijun Deng, and Y. Zhong. 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In Proceedings of the 25th Annual Network and Distributed System Security Symposium, Vol.\u00a0abs\/1801.01681."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"e_1_3_2_1_16_1","unstructured":"Dhaval Miyani Zhen Huang and David Lie. 2017. BinPro: A Tool for Binary Source Code Provenance. arXiv:1711.00830.  Dhaval Miyani Zhen Huang and David Lie. 2017. BinPro: A Tool for Binary Source Code Provenance. arXiv:1711.00830."},{"key":"e_1_3_2_1_17_1","volume-title":"agencies, including Treasury and Commerce","author":"Russian","year":"2020","unstructured":"[ 17 ] Russian government hackers are behind a broad espionage campaign that has compromised U.S. agencies, including Treasury and Commerce 2020 . https:\/\/www.washingtonpost.com\/national-security\/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm\/2020\/12\/13\/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html. [17] Russian government hackers are behind a broad espionage campaign that has compromised U.S. agencies, including Treasury and Commerce 2020. https:\/\/www.washingtonpost.com\/national-security\/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm\/2020\/12\/13\/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_20_1","unstructured":"[\n  20\n  ]  Software Assurance Reference Dataset (SARD) 2021. https:\/\/samate.nist.gov\/SARD\/.  [20] Software Assurance Reference Dataset (SARD) 2021. https:\/\/samate.nist.gov\/SARD\/."},{"key":"e_1_3_2_1_21_1","unstructured":"[\n  21\n  ]  VMware Flaw a Vector in SolarWinds Breach? 2020. https:\/\/krebsonsecurity.com\/2020\/12\/vmware-flaw-a-vector-in-solarwinds-breach\/.  [21] VMware Flaw a Vector in SolarWinds Breach? 2020. https:\/\/krebsonsecurity.com\/2020\/12\/vmware-flaw-a-vector-in-solarwinds-breach\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_1_24_1","volume-title":"2017 3rd IEEE International Conference on Computer and Communications (ICCC). 1298\u20131302","author":"Wu F.","year":"2017","unstructured":"F. Wu , J. Wang , J. Liu , and W. Wang . 2017. Vulnerability detection with deep learning . In 2017 3rd IEEE International Conference on Computer and Communications (ICCC). 1298\u20131302 . https:\/\/doi.org\/10.1109\/CompComm. 2017 .8322752 F. Wu, J. Wang, J. Liu, and W. Wang. 2017. Vulnerability detection with deep learning. In 2017 3rd IEEE International Conference on Computer and Communications (ICCC). 1298\u20131302. https:\/\/doi.org\/10.1109\/CompComm.2017.8322752"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies(WOOT\u201911)","author":"Yamaguchi Fabian","year":"2011","unstructured":"Fabian Yamaguchi , Felix Lindner , and Konrad Rieck . 2011 . Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning . In Proceedings of the 5th USENIX Conference on Offensive Technologies(WOOT\u201911) . USENIX Association, USA, 13. Fabian Yamaguchi, Felix Lindner, and Konrad Rieck. 2011. Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning. In Proceedings of the 5th USENIX Conference on Offensive Technologies(WOOT\u201911). USENIX Association, USA, 13."}],"event":{"name":"ICMLC 2022: 2022 14th International Conference on Machine Learning and Computing","acronym":"ICMLC 2022","location":"Guangzhou China"},"container-title":["2022 14th International Conference on Machine Learning and Computing (ICMLC)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529836.3529926","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3529836.3529926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:26Z","timestamp":1750188686000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529836.3529926"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,18]]},"references-count":25,"alternative-id":["10.1145\/3529836.3529926","10.1145\/3529836"],"URL":"https:\/\/doi.org\/10.1145\/3529836.3529926","relation":{},"subject":[],"published":{"date-parts":[[2022,2,18]]},"assertion":[{"value":"2022-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}