{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:39:05Z","timestamp":1774993145933,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T00:00:00Z","timestamp":1676592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2153474"],"award-info":[{"award-number":["2153474"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,17]]},"DOI":"10.1145\/3587716.3587738","type":"proceedings-article","created":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T23:27:30Z","timestamp":1694129250000},"page":"134-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Multiclass Classification of Software Vulnerabilities with Deep Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5872-1113","authenticated-orcid":false,"given":"Crystal","family":"Contreras","sequence":"first","affiliation":[{"name":"Amazon.com, Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8414-640X","authenticated-orcid":false,"given":"Hristina","family":"Dokic","sequence":"additional","affiliation":[{"name":"School of Computing, DePaul University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7684-8388","authenticated-orcid":false,"given":"Zhen","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computing, DePaul University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2165-7234","authenticated-orcid":false,"given":"Daniela","family":"Stan Raicu","sequence":"additional","affiliation":[{"name":"School of Computing, DePaul University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1015-6290","authenticated-orcid":false,"given":"Jacob","family":"Furst","sequence":"additional","affiliation":[{"name":"School of Computing, DePaul University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7195-4456","authenticated-orcid":false,"given":"Roselyne","family":"Tchoua","sequence":"additional","affiliation":[{"name":"School of Computing, DePaul University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[1] 533 million Facebook users\u2019 phone numbers and personal data have been leaked online 2021. https:\/\/www.businessinsider.com\/stolen-data-of-533-million-facebook-users-leaked-online-2021-4."},{"key":"e_1_3_2_1_2_1","unstructured":"[2] All You Need to Know About WannaCry Ransomware 2021. https:\/\/www.mimecast.com\/blog\/all-you-need-to-know-about-wannacry-ransomware\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457682.3457707"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3529836.3529926"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016774"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of Ndss \u201907","author":"Brumley David","year":"2007","unstructured":"David Brumley, T Chiueh, R Johnson, and H Lin. 2007. RICH: Automatically protecting against integer-based vulnerabilities. In Proceedings of Ndss \u201907. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.73.7344&rep=rep1&type=pdf%5Cnpapers3:\/\/publication\/uuid\/C0320481-2B40-4264-B778-CBB64ECEFAA4"},{"key":"e_1_3_2_1_8_1","volume-title":"In Proceedings of the 12th Usenix Security Symposium.","author":"Cowan Crispin","year":"2003","unstructured":"Crispin Cowan, Steve Beattie, John Johansen, and Perry Wagle. 2003. {PointGuard}: Protecting Pointers from Buffer Overflow Vulnerabilities. In In Proceedings of the 12th Usenix Security Symposium."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213848"},{"key":"e_1_3_2_1_10_1","unstructured":"CWE. 2021 [Online]. Common Weakness Enumeration. https:\/\/cwe.mitre.org\/data\/index.html"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857720"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857720"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458717"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.51"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23052"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850330"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465771"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102308"},{"key":"e_1_3_2_1_19_1","volume-title":"d.]. About Keras. Accessed","year":"2021","unstructured":"Keras. [n. d.]. About Keras. Accessed Oct. 18, 2021 [Online]. https:\/\/keras.io\/about\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00013"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930578"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991102"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 25th Annual Network and Distributed System Security Symposium, Vol.\u00a0abs\/1801","author":"Li Z.","unstructured":"Z. Li, D. Zou, Shouhuai Xu, Xinyu Ou, H. Jin, S. Wang, Zhijun Deng, and Y. Zhong. 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In Proceedings of the 25th Annual Network and Distributed System Security Symposium, Vol.\u00a0abs\/1801.01681."},{"key":"e_1_3_2_1_26_1","volume-title":"Ransomware Uses PetitPotam Exploit to Compromise Windows Domain Controllers","year":"2021","unstructured":"[26] LockFile: Ransomware Uses PetitPotam Exploit to Compromise Windows Domain Controllers 2021. https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/lockfile-ransomware-new-petitpotam-windows."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914770.2837617"},{"key":"e_1_3_2_1_28_1","volume-title":"SYSML\u201907: Proceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques","author":"Mickens James","year":"2007","unstructured":"James Mickens, Martin Szummer, and Dushyanth Narayanan. 2007. Snitch: interactive decision trees for troubleshooting misconfigurations. In SYSML\u201907: Proceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques (Berkeley, CA, USA). USENIX Association, 1\u20136."},{"key":"e_1_3_2_1_29_1","volume-title":"BinPro: A Tool for Binary Source Code Provenance. arXiv:1711.00830. arXiv","author":"Miyani Dhaval","year":"2017","unstructured":"Dhaval Miyani, Zhen Huang, and David Lie. 2017. BinPro: A Tool for Binary Source Code Provenance. arXiv:1711.00830. arXiv (2017)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105721"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE49443.2020.00010"},{"key":"e_1_3_2_1_33_1","unstructured":"TensorFlow. 2021 [Online]. KerasClassifier. https:\/\/www.tensorflow.org\/api_docs\/python\/tf\/keras\/wrappers\/scikit_learn\/KerasClassifier"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378448"},{"key":"e_1_3_2_1_35_1","unstructured":"[35] VMware Flaw a Vector in SolarWinds Breach? 2020. https:\/\/krebsonsecurity.com\/2020\/12\/vmware-flaw-a-vector-in-solarwinds-breach\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322752"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies","author":"Yamaguchi Fabian","year":"2011","unstructured":"Fabian Yamaguchi, Felix Lindner, and Konrad Rieck. 2011. Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning. In Proceedings of the 5th USENIX Conference on Offensive Technologies (San Francisco, CA) (WOOT\u201911). USENIX Association, USA, 13."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002181.2002209"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2942930"},{"key":"e_1_3_2_1_42_1","unstructured":"R. \u0158eh\u016f\u0159ek. 2019 [Online]. models.word2vec \u2013 Word2vec embeddings. Gensim. https:\/\/radimrehurek.com\/gensim_3.8.3\/models\/word2vec.html"}],"event":{"name":"ICMLC 2023: 2023 15th International Conference on Machine Learning and Computing","location":"Zhuhai China","acronym":"ICMLC 2023"},"container-title":["Proceedings of the 2023 15th International Conference on Machine Learning and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587716.3587738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587716.3587738","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587716.3587738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:07:59Z","timestamp":1750183679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587716.3587738"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,17]]},"references-count":42,"alternative-id":["10.1145\/3587716.3587738","10.1145\/3587716"],"URL":"https:\/\/doi.org\/10.1145\/3587716.3587738","relation":{},"subject":[],"published":{"date-parts":[[2023,2,17]]},"assertion":[{"value":"2023-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}