{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:25:36Z","timestamp":1776111936273,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3567998","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"508-518","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Boosting Neural Networks to Decompile Optimized Binaries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1689-653X","authenticated-orcid":false,"given":"Ying","family":"Cao","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8751-9918","authenticated-orcid":false,"given":"Ruigang","family":"Liang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5624-2987","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2803-7166","authenticated-orcid":false,"given":"Peiwei","family":"Hu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2009. strip. https:\/\/linux.die.net\/man\/1\/strip.  2009. strip. https:\/\/linux.die.net\/man\/1\/strip."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. cfile. https:\/\/github.com\/cogu\/cfile.  2021. cfile. https:\/\/github.com\/cogu\/cfile."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Github Copilot. https:\/\/copilot.github.com\/.  2021. Github Copilot. https:\/\/copilot.github.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. Hex-Rays. https:\/\/www.hex-rays.com\/products\/decompiler\/.  2021. Hex-Rays. https:\/\/www.hex-rays.com\/products\/decompiler\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2022. Decompiler and Beyond. https:\/\/infocon.org\/cons\/.  2022. Decompiler and Beyond. https:\/\/infocon.org\/cons\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2022. Ghidra. https:\/\/ghidra-sre.org\/.  2022. Ghidra. https:\/\/ghidra-sre.org\/."},{"key":"e_1_3_2_1_7_1","volume-title":"Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 353\u2013368.","author":"Brumley David","unstructured":"David Brumley , JongHyup Lee , Edward\u00a0 J Schwartz , and Maverick Woo . 2013. Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring . In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 353\u2013368. David Brumley, JongHyup Lee, Edward\u00a0J Schwartz, and Maverick Woo. 2013. Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring. In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 353\u2013368."},{"key":"e_1_3_2_1_8_1","unstructured":"Kyunghyun Cho Bart Van\u00a0Merri\u00ebnboer Caglar Gulcehre Dzmitry Bahdanau Fethi Bougares Holger Schwenk and Yoshua Bengio. 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078(2014).  Kyunghyun Cho Bart Van\u00a0Merri\u00ebnboer Caglar Gulcehre Dzmitry Bahdanau Fethi Bougares Holger Schwenk and Yoshua Bengio. 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078(2014)."},{"key":"e_1_3_2_1_9_1","volume-title":"Neural Nets Can Learn Function Type Signatures From Binaries. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Chua Zheng\u00a0Leong","year":"2017","unstructured":"Zheng\u00a0Leong Chua , Shiqi Shen , Prateek Saxena , and Zhenkai Liang . 2017 . Neural Nets Can Learn Function Type Signatures From Binaries. In 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association, Vancouver, BC, 99\u2013116. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/chua Zheng\u00a0Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang. 2017. Neural Nets Can Learn Function Type Signatures From Binaries. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 99\u2013116. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/chua"},{"key":"e_1_3_2_1_10_1","unstructured":"Ahmad Darki Michalis Faloutsos Nael Abu-Ghazaleh and Manu Sridharan. 2021. DisCo: Combining Disassemblers for Improved Performance. (2021).  Ahmad Darki Michalis Faloutsos Nael Abu-Ghazaleh and Manu Sridharan. 2021. DisCo: Combining Disassemblers for Improved Performance. (2021)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_12_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Downing Evan","year":"2021","unstructured":"Evan Downing , Yisroel Mirsky , Kyuhong Park , and Wenke Lee . 2021 . {DeepReflect}: Discovering Malicious Functionality through Binary Reconstruction . In 30th USENIX Security Symposium (USENIX Security 21) . 3469\u20133486. Evan Downing, Yisroel Mirsky, Kyuhong Park, and Wenke Lee. 2021. {DeepReflect}: Discovering Malicious Functionality through Binary Reconstruction. In 30th USENIX Security Symposium (USENIX Security 21). 3469\u20133486."},{"key":"e_1_3_2_1_13_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 2379\u20132396.","author":"Elsabagh Mohamed","unstructured":"Mohamed Elsabagh , Ryan Johnson , Angelos Stavrou , Chaoshun Zuo , Qingchuan Zhao , and Zhiqiang Lin . 2020. {FIRMSCOPE} : Automatic uncovering of privilege-escalation vulnerabilities in pre-installed apps in android firmware . In 29th {USENIX} Security Symposium ({USENIX} Security 20). 2379\u20132396. Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, and Zhiqiang Lin. 2020. {FIRMSCOPE}: Automatic uncovering of privilege-escalation vulnerabilities in pre-installed apps in android firmware. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 2379\u20132396."},{"key":"e_1_3_2_1_14_1","volume-title":"Codebert: A pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155(2020).","author":"Feng Zhangyin","year":"2020","unstructured":"Zhangyin Feng , Daya Guo , Duyu Tang , Nan Duan , Xiaocheng Feng , Ming Gong , Linjun Shou , Bing Qin , Ting Liu , Daxin Jiang , 2020 . Codebert: A pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155(2020). Zhangyin Feng, Daya Guo, Duyu Tang, Nan Duan, Xiaocheng Feng, Ming Gong, Linjun Shou, Bing Qin, Ting Liu, Daxin Jiang, 2020. Codebert: A pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155(2020)."},{"key":"e_1_3_2_1_15_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Flores-Montoya Antonio","year":"2020","unstructured":"Antonio Flores-Montoya and Eric Schulte . 2020 . Datalog disassembly . In 29th USENIX Security Symposium (USENIX Security 20) . 1075\u20131092. Antonio Flores-Montoya and Eric Schulte. 2020. Datalog disassembly. In 29th USENIX Security Symposium (USENIX Security 20). 1075\u20131092."},{"key":"e_1_3_2_1_16_1","volume-title":"Coda: An end-to-end neural program decompiler. In Advances in Neural Information Processing Systems. 3703\u20133714.","author":"Fu Cheng","year":"2019","unstructured":"Cheng Fu , Huili Chen , Haolan Liu , Xinyun Chen , Yuandong Tian , Farinaz Koushanfar , and Jishen Zhao . 2019 . Coda: An end-to-end neural program decompiler. In Advances in Neural Information Processing Systems. 3703\u20133714. Cheng Fu, Huili Chen, Haolan Liu, Xinyun Chen, Yuandong Tian, Farinaz Koushanfar, and Jishen Zhao. 2019. Coda: An end-to-end neural program decompiler. In Advances in Neural Information Processing Systems. 3703\u20133714."},{"key":"e_1_3_2_1_17_1","volume-title":"Bigmac: Fine-grained policy analysis of android firmware. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 271\u2013287.","author":"Hernandez Grant","year":"2020","unstructured":"Grant Hernandez , Dave\u00a0Jing Tian , Anurag\u00a0Swarnim Yadav , Byron\u00a0 J Williams , and Kevin\u00a0 RB Butler . 2020 . Bigmac: Fine-grained policy analysis of android firmware. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 271\u2013287. Grant Hernandez, Dave\u00a0Jing Tian, Anurag\u00a0Swarnim Yadav, Byron\u00a0J Williams, and Kevin\u00a0RB Butler. 2020. Bigmac: Fine-grained policy analysis of android firmware. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 271\u2013287."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330222"},{"key":"e_1_3_2_1_20_1","unstructured":"Omer Katz Yuval Olshaker Yoav Goldberg and Eran Yahav. 2019. Towards Neural Decompilation. CoRR abs\/1905.08325(2019). arxiv:1905.08325http:\/\/arxiv.org\/abs\/1905.08325  Omer Katz Yuval Olshaker Yoav Goldberg and Eran Yahav. 2019. Towards Neural Decompilation. CoRR abs\/1905.08325(2019). arxiv:1905.08325http:\/\/arxiv.org\/abs\/1905.08325"},{"key":"e_1_3_2_1_21_1","volume-title":"Retdec: An open-source machine-code decompiler.","author":"K\u0159oustek Jakub","year":"2017","unstructured":"Jakub K\u0159oustek , Peter Matula , and P Zemek . 2017 . Retdec: An open-source machine-code decompiler. Jakub K\u0159oustek, Peter Matula, and P Zemek. 2017. Retdec: An open-source machine-code decompiler."},{"key":"e_1_3_2_1_22_1","volume-title":"On information and sufficiency. The annals of mathematical statistics 22, 1","author":"Kullback Solomon","year":"1951","unstructured":"Solomon Kullback and Richard\u00a0 A Leibler . 1951. On information and sufficiency. The annals of mathematical statistics 22, 1 ( 1951 ), 79\u201386. Solomon Kullback and Richard\u00a0A Leibler. 1951. On information and sufficiency. The annals of mathematical statistics 22, 1 (1951), 79\u201386."},{"key":"e_1_3_2_1_23_1","volume-title":"Article arXiv:1511.05493 (Nov.","author":"Li Yujia","year":"2015","unstructured":"Yujia Li , Daniel Tarlow , Marc Brockschmidt , and Richard Zemel . 2015. Gated Graph Sequence Neural Networks. arXiv e-prints , Article arXiv:1511.05493 (Nov. 2015 ), arXiv:1511.05493\u00a0pages. arxiv:1511.05493\u00a0[cs.LG] Yujia Li, Daniel Tarlow, Marc Brockschmidt, and Richard Zemel. 2015. Gated Graph Sequence Neural Networks. arXiv e-prints, Article arXiv:1511.05493 (Nov. 2015), arXiv:1511.05493\u00a0pages. arxiv:1511.05493\u00a0[cs.LG]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00070-0"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397370"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Minh-Thang Luong Hieu Pham and Christopher\u00a0D Manning. 2015. Effective approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025(2015).  Minh-Thang Luong Hieu Pham and Christopher\u00a0D Manning. 2015. Effective approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025(2015).","DOI":"10.18653\/v1\/D15-1166"},{"key":"e_1_3_2_1_27_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg\u00a0S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111\u20133119.  Tomas Mikolov Ilya Sutskever Kai Chen Greg\u00a0S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111\u20133119."},{"key":"e_1_3_2_1_28_1","volume-title":"Xda: Accurate, robust disassembly with transfer learning. arXiv preprint arXiv:2010.00770(2020).","author":"Pei Kexin","year":"2020","unstructured":"Kexin Pei , Jonas Guan , David Williams-King , Junfeng Yang , and Suman Jana . 2020 . Xda: Accurate, robust disassembly with transfer learning. arXiv preprint arXiv:2010.00770(2020). Kexin Pei, Jonas Guan, David Williams-King, Junfeng Yang, and Suman Jana. 2020. Xda: Accurate, robust disassembly with transfer learning. arXiv preprint arXiv:2010.00770(2020)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_30_1","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 273\u2013290.","author":"Tian Dave\u00a0Jing","unstructured":"Dave\u00a0Jing Tian , Grant Hernandez , Joseph\u00a0 I Choi , Vanessa Frost , Christie Raules , Patrick Traynor , Hayawardh Vijayakumar , Lee Harrison , Amir Rahmati , Michael Grace , 2018. Attention spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem . In 27th {USENIX} Security Symposium ({USENIX} Security 18). 273\u2013290. Dave\u00a0Jing Tian, Grant Hernandez, Joseph\u00a0I Choi, Vanessa Frost, Christie Raules, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, 2018. Attention spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 273\u2013290."},{"key":"e_1_3_2_1_31_1","volume-title":"Static single assignment for decompilation","author":"Van\u00a0Emmerik Michael\u00a0James","unstructured":"Michael\u00a0James Van\u00a0Emmerik . 2007. Static single assignment for decompilation . University of Queensland. Michael\u00a0James Van\u00a0Emmerik. 2007. Static single assignment for decompilation. University of Queensland."},{"key":"e_1_3_2_1_32_1","first-page":"I","article-title":"Attention is All you Need","volume":"30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan\u00a0 N Gomez , \u0141\u00a0ukasz Kaiser , and Illia Polosukhin . 2017 . Attention is All you Need . In Advances in Neural Information Processing Systems 30 , I .\u00a0Guyon, U.\u00a0V. Luxburg, S.\u00a0Bengio, H.\u00a0Wallach, R.\u00a0Fergus, S.\u00a0Vishwanathan, and R.\u00a0Garnett (Eds.). Curran Associates, Inc., 5998\u20136008. http:\/\/papers.nips.cc\/paper\/7181-attention-is-all-you-need.pdf Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141\u00a0ukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Advances in Neural Information Processing Systems 30, I.\u00a0Guyon, U.\u00a0V. Luxburg, S.\u00a0Bengio, H.\u00a0Wallach, R.\u00a0Fergus, S.\u00a0Vishwanathan, and R.\u00a0Garnett (Eds.). Curran Associates, Inc., 5998\u20136008. http:\/\/papers.nips.cc\/paper\/7181-attention-is-all-you-need.pdf","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_33_1","unstructured":"Yonghui Wu Mike Schuster Zhifeng Chen Quoc\u00a0V. Le Mohammad Norouzi Wolfgang Macherey Maxim Krikun Yuan Cao Qin Gao Klaus Macherey Jeff Klingner Apurva Shah Melvin Johnson Xiaobing Liu \u0141ukasz Kaiser Stephan Gouws Yoshikiyo Kato Taku Kudo Hideto Kazawa Keith Stevens George Kurian Nishant Patil Wei Wang Cliff Young Jason Smith Jason Riesa Alex Rudnick Oriol Vinyals Greg Corrado Macduff Hughes and Jeffrey Dean. 2016. Google\u2019s Neural Machine Translation System: Bridging the Gap between Human and Machine Translation. CoRR abs\/1609.08144(2016). http:\/\/arxiv.org\/abs\/1609.08144  Yonghui Wu Mike Schuster Zhifeng Chen Quoc\u00a0V. Le Mohammad Norouzi Wolfgang Macherey Maxim Krikun Yuan Cao Qin Gao Klaus Macherey Jeff Klingner Apurva Shah Melvin Johnson Xiaobing Liu \u0141ukasz Kaiser Stephan Gouws Yoshikiyo Kato Taku Kudo Hideto Kazawa Keith Stevens George Kurian Nishant Patil Wei Wang Cliff Young Jason Smith Jason Riesa Alex Rudnick Oriol Vinyals Greg Corrado Macduff Hughes and Jeffrey Dean. 2016. Google\u2019s Neural Machine Translation System: Bridging the Gap between Human and Machine Translation. CoRR abs\/1609.08144(2016). http:\/\/arxiv.org\/abs\/1609.08144"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.18"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Khaled Yakdan Sebastian Eschweiler Elmar Gerhards-Padilla and Matthew Smith. 2015. No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.. In NDSS. Citeseer.  Khaled Yakdan Sebastian Eschweiler Elmar Gerhards-Padilla and Matthew Smith. 2015. No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.. In NDSS. Citeseer.","DOI":"10.14722\/ndss.2015.23185"}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3567998","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3567998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:13Z","timestamp":1750183753000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3567998"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":35,"alternative-id":["10.1145\/3564625.3567998","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3567998","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}