{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:11:31Z","timestamp":1775873491067,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534383","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"151-163","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Improving cross-platform binary analysis using representation learning via graph alignment"],"prefix":"10.1145","author":[{"given":"Geunwoo","family":"Kim","sequence":"first","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Sanghyun","family":"Hong","sequence":"additional","affiliation":[{"name":"Oregon State University, USA"}]},{"given":"Michael","family":"Franz","sequence":"additional","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Dokyung","family":"Song","sequence":"additional","affiliation":[{"name":"Yonsei University, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , and Michael Isard . 2016 . TensorFlow: A System for Large-Scale Machine Learning . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, and Michael Isard. 2016. TensorFlow: A System for Large-Scale Machine Learning. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS).","author":"Alsentzer Emily","year":"2020","unstructured":"Emily Alsentzer , Samuel G Finlayson , Michelle M Li , and Marinka Zitnik . 2020 . Subgraph Neural Networks . In Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS). Emily Alsentzer, Samuel G Finlayson, Michelle M Li, and Marinka Zitnik. 2020. Subgraph Neural Networks. In Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_3_1","unstructured":"Arm Limited. [n. d.]. Arm A64 Instruction Set Architecture.  https:\/\/developer.arm.com\/documentation\/ddi0596\/2021-12 \t\t\t\t\t  Arm Limited. [n. d.]. Arm A64 Instruction Set Architecture.  https:\/\/developer.arm.com\/documentation\/ddi0596\/2021-12"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Bao Tiffany","year":"2014","unstructured":"Tiffany Bao , Jonathan Burket , Maverick Woo , Rafael Turner , and David Brumley . 2014 . BYTEWEIGHT: Learning to recognize functions in binary code . In Proceedings of the USENIX Security Symposium. Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. BYTEWEIGHT: Learning to recognize functions in binary code. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_5_1","volume-title":"Message-passing algorithms for sparse network alignment. ACM Transactions on Knowledge Discovery from Data (TKDD), 7, 1","author":"Bayati Mohsen","year":"2013","unstructured":"Mohsen Bayati , David F Gleich , Amin Saberi , and Ying Wang . 2013. Message-passing algorithms for sparse network alignment. ACM Transactions on Knowledge Discovery from Data (TKDD), 7, 1 ( 2013 ), 1\u201331. Mohsen Bayati, David F Gleich, Amin Saberi, and Ying Wang. 2013. Message-passing algorithms for sparse network alignment. ACM Transactions on Knowledge Discovery from Data (TKDD), 7, 1 (2013), 1\u201331."},{"key":"e_1_3_2_1_6_1","unstructured":"Joan Bruna Wojciech Zaremba Arthur Szlam and Yann LeCun. 2013. Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203. \t\t\t\t\t  Joan Bruna Wojciech Zaremba Arthur Szlam and Yann LeCun. 2013. Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807452"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Muhao Chen Yingtao Tian Mohan Yang and Carlo Zaniolo. 2016. Multilingual knowledge graph embeddings for cross-lingual knowledge alignment. arXiv preprint arXiv:1611.03954. \t\t\t\t\t  Muhao Chen Yingtao Tian Mohan Yang and Carlo Zaniolo. 2016. Multilingual knowledge graph embeddings for cross-lingual knowledge alignment. arXiv preprint arXiv:1611.03954.","DOI":"10.24963\/ijcai.2017\/209"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Chua Zheng Leong","year":"2017","unstructured":"Zheng Leong Chua , Shiqi Shen , Prateek Saxena , and Zhenkai Liang . 2017 . Neural nets can learn function type signatures from binaries . In Proceedings of the USENIX Security Symposium. Zheng Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang. 2017. Neural nets can learn function type signatures from binaries. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Costin Andrei","year":"2014","unstructured":"Andrei Costin , Jonas Zaddach , Aur\u00e9lien Francillon , and Davide Balzarotti . 2014 . A large-scale analysis of the security of embedded firmwares . In Proceedings of the USENIX Security Symposium. Andrei Costin, Jonas Zaddach, Aur\u00e9lien Francillon, and Davide Balzarotti. 2014. A large-scale analysis of the security of embedded firmwares. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML).","author":"Dai Hanjun","year":"2016","unstructured":"Hanjun Dai , Bo Dai , and Le Song . 2016 . Discriminative Embeddings of Latent Variable Models for Structured Data . In Proceedings of the International Conference on Machine Learning (ICML). Hanjun Dai, Bo Dai, and Le Song. 2016. Discriminative Embeddings of Latent Variable Models for Structured Data. In Proceedings of the International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428293"},{"key":"e_1_3_2_1_15_1","volume-title":"BERT: Pre-training of deep bidirectional Transformers for language understanding. arXiv preprint arXiv:1810.04805.","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . BERT: Pre-training of deep bidirectional Transformers for language understanding. arXiv preprint arXiv:1810.04805. Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: Pre-training of deep bidirectional Transformers for language understanding. arXiv preprint arXiv:1810.04805."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446695"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"e_1_3_2_1_19_1","volume-title":"REIL: A platform-independent intermediate representation of disassembled code for static code analysis. CanSecWest.","author":"Dullien Thomas","year":"2009","unstructured":"Thomas Dullien and Sebastian Porst . 2009 . REIL: A platform-independent intermediate representation of disassembled code for static code analysis. CanSecWest. Thomas Dullien and Sebastian Porst. 2009. REIL: A platform-independent intermediate representation of disassembled code for static code analysis. CanSecWest."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/00437956.1954.11659520"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243866"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357173"},{"key":"e_1_3_2_1_26_1","unstructured":"hex-rays. [n. d.]. IDA Pro: A powerful disassembler and a versatile debugger.  https:\/\/hex-rays.com\/ida-pro \t\t\t\t\t  hex-rays. [n. d.]. IDA Pro: A powerful disassembler and a versatile debugger.  https:\/\/hex-rays.com\/ida-pro"},{"key":"e_1_3_2_1_27_1","unstructured":"Intel. [n. d.]. Intel Advanced Encryption Standard (AES) New Instructions Set.  https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/aes-wp-2012-09-22-v01-165683.pdf \t\t\t\t\t  Intel. [n. d.]. Intel Advanced Encryption Standard (AES) New Instructions Set.  https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/aes-wp-2012-09-22-v01-165683.pdf"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.6579248"},{"key":"e_1_3_2_1_29_1","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907. \t\t\t\t\t  Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907."},{"key":"e_1_3_2_1_30_1","volume-title":"A new graph-based method for pairwise global network alignment. BMC bioinformatics, 10, 1","author":"Klau Gunnar W","year":"2009","unstructured":"Gunnar W Klau . 2009. A new graph-based method for pairwise global network alignment. BMC bioinformatics, 10, 1 ( 2009 ), 1\u20139. Gunnar W Klau. 2009. A new graph-based method for pairwise global network alignment. BMC bioinformatics, 10, 1 (2009), 1\u20139."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092707"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00064"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML).","author":"Le Quoc","year":"2014","unstructured":"Quoc Le and Tomas Mikolov . 2014 . Distributed representations of sentences and documents . In Proceedings of the International Conference on Machine Learning (ICML). Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In Proceedings of the International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1274"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484587"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386020"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML).","author":"Li Yujia","year":"2019","unstructured":"Yujia Li , Chenjie Gu , Thomas Dullien , Oriol Vinyals , and Pushmeet Kohli . 2019 . Graph matching networks for learning the similarity of graph structured objects . In Proceedings of the International Conference on Machine Learning (ICML). Yujia Li, Chenjie Gu, Thomas Dullien, Oriol Vinyals, and Pushmeet Kohli. 2019. Graph matching networks for learning the similarity of graph structured objects. In Proceedings of the International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE).","author":"Liu Bingchang","year":"2018","unstructured":"Bingchang Liu , Wei Huo , Chao Zhang , Wenchao Li , Feng Li , Aihua Piao , and Wei Zou . 2018 . \u03b1 diff: Cross-version binary code similarity detection with DNN . In Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE). Bingchang Liu, Wei Huo, Chao Zhang, Wenchao Li, Feng Li, Aihua Piao, and Wei Zou. 2018. \u03b1 diff: Cross-version binary code similarity detection with DNN. In Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE)."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Marcelli Andrea","year":"2022","unstructured":"Andrea Marcelli , Mariano Graziano , Xabier Ugarte-Pedrero , Yanick Fratantonio , Mohamad Mansouri , and Davide Balzarotti . 2022 . How Machine Learning Is Solving the Binary Function Similarity Problem . In Proceedings of the USENIX Security Symposium. Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, and Davide Balzarotti. 2022. How Machine Learning Is Solving the Binary Function Similarity Problem. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23020"},{"key":"e_1_3_2_1_41_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781. \t\t\t\t\t  Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS).","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Greg S Corrado , and Jeff Dean . 2013 . Distributed representations of words and phrases and their compositionality . In Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS). Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_43_1","unstructured":"Annamalai Narayanan Mahinthan Chandramohan Rajasekar Venkatesan Lihui Chen Yang Liu and Shantanu Jaiswal. 2017. graph2vec: Learning distributed representations of graphs. arXiv preprint arXiv:1707.05005. \t\t\t\t\t  Annamalai Narayanan Mahinthan Chandramohan Rajasekar Venkatesan Lihui Chen Yang Liu and Shantanu Jaiswal. 2017. graph2vec: Learning distributed representations of graphs. arXiv preprint arXiv:1707.05005."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS).","author":"Pei Kexin","year":"2020","unstructured":"Kexin Pei , Jonas Guan , David Williams King , Junfeng Yang , and Suman Jana . 2020 . XDA: Accurate, robust disassembly with transfer learning . In Proceedings of the Network and Distributed System Security Symposium (NDSS). Kexin Pei, Jonas Guan, David Williams King, Junfeng Yang, and Suman Jana. 2020. XDA: Accurate, robust disassembly with transfer learning. In Proceedings of the Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML).","author":"Peng Dinglan","year":"2021","unstructured":"Dinglan Peng , Shuxin Zheng , Yatao Li , Guolin Ke , Di He , and Tie-Yan Liu . 2021 . How could Neural Networks understand Programs? In Proceedings of the International Conference on Machine Learning (ICML). Dinglan Peng, Shuxin Zheng, Yatao Li, Guolin Ke, Di He, and Tie-Yan Liu. 2021. How could Neural Networks understand Programs? In Proceedings of the International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML).","author":"Peng Dinglan","year":"2021","unstructured":"Dinglan Peng , Shuxin Zheng , Yatao Li , Guolin Ke , Di He , and Tie-Yan Liu . 2021 . How could Neural Networks understand Programs? In Proceedings of the International Conference on Machine Learning (ICML). Dinglan Peng, Shuxin Zheng, Yatao Li, Guolin Ke, Di He, and Tie-Yan Liu. 2021. How could Neural Networks understand Programs? In Proceedings of the International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664269"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR).","author":"Rong Yu","year":"2020","unstructured":"Yu Rong , Wenbing Huang , Tingyang Xu , and Junzhou Huang . 2020 . DropEdge: Towards Deep Graph Convolutional Networks on Node Classification . In Proceedings of the International Conference on Learning Representations (ICLR). Yu Rong, Wenbing Huang, Tingyang Xu, and Junzhou Huang. 2020. DropEdge: Towards Deep Graph Convolutional Networks on Node Classification. In Proceedings of the International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Richard Shin Eui Chul","year":"2015","unstructured":"Eui Chul Richard Shin , Dawn Song , and Reza Moazzezi . 2015 . Recognizing functions in binaries with neural networks . In Proceedings of the USENIX Security Symposium. Eui Chul Richard Shin, Dawn Song, and Reza Moazzezi. 2015. Recognizing functions in binaries with neural networks. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0806627105"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68288-4_37"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS).","author":"Sutskever Ilya","year":"2014","unstructured":"Ilya Sutskever , Oriol Vinyals , and Quoc V Le . 2014 . Sequence to sequence learning with neural networks . Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS). Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to sequence learning with neural networks. Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1032"},{"key":"e_1_3_2_1_57_1","unstructured":"Yuting Wu Xiao Liu Yansong Feng Zheng Wang Rui Yan and Dongyan Zhao. 2019. Relation-aware entity alignment for heterogeneous knowledge graphs. arXiv preprint arXiv:1908.08210. \t\t\t\t\t  Yuting Wu Xiao Liu Yansong Feng Zheng Wang Rui Yan and Dongyan Zhao. 2019. Relation-aware entity alignment for heterogeneous knowledge graphs. arXiv preprint arXiv:1908.08210."},{"key":"e_1_3_2_1_58_1","unstructured":"Yonghui Wu Mike Schuster Zhifeng Chen Quoc V Le Mohammad Norouzi Wolfgang Macherey Maxim Krikun Yuan Cao Qin Gao and Klaus Macherey. 2016. Google\u2019s neural machine translation system: Bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144. \t\t\t\t\t  Yonghui Wu Mike Schuster Zhifeng Chen Quoc V Le Mohammad Norouzi Wolfgang Macherey Maxim Krikun Yuan Cao Qin Gao and Klaus Macherey. 2016. Google\u2019s neural machine translation system: Bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI).","author":"Yang Cheng","year":"2015","unstructured":"Cheng Yang , Zhiyuan Liu , Deli Zhao , Maosong Sun , and Edward Chang . 2015 . Network representation learning with rich text information . In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI). Cheng Yang, Zhiyuan Liu, Deli Zhao, Maosong Sun, and Edward Chang. 2015. Network representation learning with rich text information. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI)."},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Yu Sheng","year":"2022","unstructured":"Sheng Yu , Yu Qu , Xunchao Hu , and Heng Yin . 2022 . DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly . In Proceedings of the USENIX Security Symposium. Sheng Yu, Yu Qu, Xunchao Hu, and Heng Yin. 2022. DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS).","author":"Yu Zeping","year":"2020","unstructured":"Zeping Yu , Wenxin Zheng , Jiaqi Wang , Qiyi Tang , Sen Nie , and Shi Wu . 2020 . CodeCMR: Cross-modal retrieval for function-level binary source code matching . Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS). Zeping Yu, Wenxin Zheng, Jiaqi Wang, Qiyi Tang, Sen Nie, and Shi Wu. 2020. CodeCMR: Cross-modal retrieval for function-level binary source code matching. Proceedings of the International Conference on Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR).","author":"Zhao Lingxiao","year":"2020","unstructured":"Lingxiao Zhao and Leman Akoglu . 2020 . PairNorm: Tackling Oversmoothing in GNNs . In Proceedings of the International Conference on Learning Representations (ICLR). Lingxiao Zhao and Leman Akoglu. 2020. PairNorm: Tackling Oversmoothing in GNNs. In Proceedings of the International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23492"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534383","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534383"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":65,"alternative-id":["10.1145\/3533767.3534383","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534383","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}