{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:11:52Z","timestamp":1775873512050,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["No.2021-0-01332"],"award-info":[{"award-number":["No.2021-0-01332"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616366","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1419-1430","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["FunProbe: Probing Functions from Binary Code through Probabilistic Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3129-3857","authenticated-orcid":false,"given":"Soomin","family":"Kim","sequence":"first","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2158-9367","authenticated-orcid":false,"given":"Hyungseok","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6012-7228","authenticated-orcid":false,"given":"Sang Kil","family":"Cha","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n. d.]. Radare2. https:\/\/github.com\/radare\/radare2"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359825"},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the USENIX Security Symposium. 583\u2013600","author":"Andriesse Dennis","unstructured":"Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries. In Proceedings of the USENIX Security Symposium. 583\u2013600."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.11"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the International Conference on Compiler Construction. 250\u2013254","author":"Balakrishnan Gogul","year":"2005","unstructured":"Gogul Balakrishnan, Radu Gruian, Thomas Reps, and Tim Teitelbaum. 2005. CodeSurfer\/x86\u2014A Platform for Analyzing x86 Executables. In Proceedings of the International Conference on Compiler Construction. 250\u2013254."},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the USENIX Security Symposium. 845\u2013860","author":"Bao Tiffany","year":"2014","unstructured":"Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. ByteWeight: Learning to recognize functions in binary code. In Proceedings of the USENIX Security Symposium. 845\u2013860."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23300"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the International Conference on Computer Aided Verification. 463\u2013469","author":"Brumley David","unstructured":"David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J. Schwartz. 2011. BAP: A Binary Analysis Platform. In Proceedings of the International Conference on Computer Aided Verification. 463\u2013469."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.825697"},{"key":"e_1_3_2_2_10_1","volume-title":"The computational complexity of probabilistic inference using Bayesian belief networks. Artificial intelligence, 42, 2-3","author":"Cooper Gregory F","year":"1990","unstructured":"Gregory F Cooper. 1990. The computational complexity of probabilistic inference using Bayesian belief networks. Artificial intelligence, 42, 2-3 (1990), 393\u2013405."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_2_12_1","volume-title":"Improving the efficiency of belief propagation in large, highly connected graphs. Working Paper 06-1","author":"DiMaio Frank","unstructured":"Frank DiMaio and Jude Shavlik. 2006. Improving the efficiency of belief propagation in large, highly connected graphs. Working Paper 06-1, UWML Research Group."},{"key":"e_1_3_2_2_13_1","volume-title":"Datalog Disassembly. In Proceedings of the USENIX Security Symposium. 1075\u20131092","author":"Flores-Montoya Antonio","year":"2020","unstructured":"Antonio Flores-Montoya and Eric Schulte. 2020. Datalog Disassembly. In Proceedings of the USENIX Security Symposium. 1075\u20131092."},{"key":"e_1_3_2_2_14_1","volume-title":"A tutorial on variational Bayesian inference. Artificial intelligence review, 38, 2","author":"Fox Charles W","year":"2012","unstructured":"Charles W Fox and Stephen J Roberts. 2012. A tutorial on variational Bayesian inference. Artificial intelligence review, 38, 2 (2012), 85\u201395."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384766"},{"key":"e_1_3_2_2_16_1","unstructured":"Hex-Rays SA.. [n. d.]. IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/"},{"key":"e_1_3_2_2_17_1","unstructured":"Hex-Rays SA.. [n. d.]. IDA Pro FLIRT. https:\/\/hex-rays.com\/products\/ida\/tech\/flirt\/"},{"key":"e_1_3_2_2_18_1","unstructured":"Hex-Rays SA.. [n. d.]. IDA Pro Lumina Server. https:\/\/hex-rays.com\/products\/ida\/lumina\/"},{"key":"e_1_3_2_2_19_1","unstructured":"Hex-Rays SA.. [n. d.]. Module ida_funcs. https:\/\/www.hex-rays.com\/products\/ida\/support\/idapython_docs\/ida_funcs.html#ida_funcs.add_func"},{"key":"e_1_3_2_2_20_1","unstructured":"H.J. Lu. [n. d.]. gcc\/ChangeLog-2010. https:\/\/github.com\/gcc-mirror\/gcc\/blob\/master\/gcc\/ChangeLog-2010"},{"key":"e_1_3_2_2_21_1","unstructured":"H.J. Lu. [n. d.]. Turn on -fomit-frame-pointer by default for 32bit Linux\/x86. https:\/\/gcc.gnu.org\/legacy-ml\/gcc-patches\/2010-08\/msg00922.html"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159722"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23051"},{"key":"e_1_3_2_2_24_1","volume-title":"Junction tree algorithm. Stat, 631","author":"Kahle David","year":"2008","unstructured":"David Kahle, Terrance Savitsky, Stephen Schnelle, and Volkan Cevher. 2008. Junction tree algorithm. Stat, 631 (2008)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3187689"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Kim Hyungseok","year":"2023","unstructured":"Hyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, and Sang Kil Cha. 2023. Reassembly is Hard: A Reflection on Challenges and Strategies. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks. 559\u2013566","author":"Kim Hyungseok","year":"2022","unstructured":"Hyungseok Kim, Junoh Lee, Soomin Kim, SeungIl Jung, and Sang Kil Cha. 2022. How\u2019d Security Benefit Reverse Engineers? The Implication of Intel CET on Function Identification. In Proceedings of the International Conference on Dependable Systems and Networks. 559\u2013566."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115648"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_40"},{"key":"e_1_3_2_2_30_1","volume-title":"Belief propagation for networks with loops. Science Advances, 7, 17","author":"Kirkley Alec","year":"2021","unstructured":"Alec Kirkley, George T Cantwell, and MEJ Newman. 2021. Belief propagation for networks with loops. Science Advances, 7, 17 (2021), eabf1211."},{"key":"e_1_3_2_2_31_1","volume-title":"Cyclic Bayesian network: Markov process approach. Studia Informatica: systems and information technology, 1, 7)","author":"Mieczys\u0142","year":"2006","unstructured":"Mieczys\u0142 aw A K\u0142 opotek. 2006. Cyclic Bayesian network: Markov process approach. Studia Informatica: systems and information technology, 1, 7) (2006), 47\u201355."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488018"},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the USENIX Security Symposium. 340\u2013353","author":"Kruegel Christopher","year":"2004","unstructured":"Christopher Kruegel, William Robertson, Fredrik Valeur, and Giovanni Vigna. 2004. Static Disassembly of Obfuscated Binaries. In Proceedings of the USENIX Security Symposium. 340\u2013353."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-1956-0078686-7"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium. 251\u2013268","author":"Lee JongHyup","year":"2011","unstructured":"JongHyup Lee, Thanassis Avgerinos, and David Brumley. 2011. TIE: Principled Reverse Engineering of Types in Binary Programs. In Proceedings of the Network and Distributed System Security Symposium. 251\u2013268."},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the International Symposium on Software Testing and Analysis. 24\u201335","author":"Meng Xiaozhu","unstructured":"Xiaozhu Meng and Barton P. Miller. 2016. Binary Code is Not Easy. In Proceedings of the International Symposium on Software Testing and Analysis. 24\u201335."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1949.10483310"},{"key":"e_1_3_2_2_38_1","unstructured":"Microsoft. [n. d.]. x64 exception handling. https:\/\/learn.microsoft.com\/en-us\/cpp\/build\/exception-handling-x64?view=msvc-170"},{"key":"e_1_3_2_2_39_1","volume-title":"Probabilistic Disassembly. In Proceedings of the International Conference on Software Engineering. 1187\u20131198","author":"Miller Kenneth","year":"2019","unstructured":"Kenneth Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang, Xiangyu Zhang, and Zhiqiang Lin. 2019. Probabilistic Disassembly. In Proceedings of the International Conference on Software Engineering. 1187\u20131198."},{"key":"e_1_3_2_2_40_1","volume-title":"Jordan","author":"Murphy Kevin","year":"1999","unstructured":"Kevin Murphy, Yair Weiss, and Michael I. Jordan. 1999. Loopy Belief Propagation for Approximate Inference: An Empirical Study. In Proceedings of the Converence on Uncertainty in Artificial Inteligence. 467\u2013476."},{"key":"e_1_3_2_2_41_1","unstructured":"National Security Agency. [n. d.]. Class CreateFunctionCmd. https:\/\/ghidra.re\/ghidra_docs\/api\/ghidra\/app\/cmd\/function\/CreateFunctionCmd.html"},{"key":"e_1_3_2_2_42_1","unstructured":"National Security Agency. [n. d.]. Ghidra. https:\/\/ghidra-sre.org"},{"key":"e_1_3_2_2_43_1","unstructured":"National Security Agency. [n. d.]. Ghidra x86 patterns. https:\/\/github.com\/NationalSecurityAgency\/ghidra\/tree\/master\/Ghidra\/Processors\/x86\/data\/patterns"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00012"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00046"},{"key":"e_1_3_2_2_46_1","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"Pearl Judea","unstructured":"Judea Pearl. 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann Publishers Inc.. isbn:1558604790"},{"key":"e_1_3_2_2_47_1","unstructured":"Kexin Pei. [n. d.]. xda\/issue-4. https:\/\/github.com\/CUMLSec\/XDA\/issues\/4"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23112"},{"key":"e_1_3_2_2_49_1","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks. 201\u2013212","author":"Qiao Rui","unstructured":"Rui Qiao and R. Sekar. 2017. Function interface analysis: A principled approach for function recognition in COTS binaries. In Proceedings of the International Conference on Dependable Systems and Networks. 201\u2013212."},{"key":"e_1_3_2_2_50_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence. 798\u2013804","author":"Rosenblum Nathan","year":"2008","unstructured":"Nathan Rosenblum, Xiaojin Zhu, Barton Miller, and Karen Hunt. 2008. Learning to Analyze Binary Computer Code. In Proceedings of the AAAI Conference on Artificial Intelligence. 798\u2013804."},{"key":"e_1_3_2_2_51_1","volume-title":"International Conference on Artificial Intelligence and Statistics. 685\u2013693","author":"Satorras Victor Garcia","year":"2021","unstructured":"Victor Garcia Satorras and Max Welling. 2021. Neural enhanced belief propagation on factor graphs. In International Conference on Artificial Intelligence and Statistics. 685\u2013693."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243793"},{"key":"e_1_3_2_2_53_1","volume-title":"Proceedings of the USENIX Security Symposium. 353\u2013368","author":"Schwartz Edward J.","year":"2013","unstructured":"Edward J. Schwartz, JongHyup Lee, Maverick Woo, and David Brumley. 2013. Native x86 Decompilation Using Semantics-preserving Structural Analysis and Iterative Control-flow Structuring. In Proceedings of the USENIX Security Symposium. 353\u2013368."},{"key":"e_1_3_2_2_54_1","volume-title":"Proceedings of the USENIX Security Symposium. 611\u2013624","author":"Richard Shin Eui Chul","year":"2015","unstructured":"Eui Chul Richard Shin, Dawn Song, and Reza Moazzezi. 2015. Recognizing Functions in Binaries with Neural Networks. In Proceedings of the USENIX Security Symposium. 611\u2013624."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/11579427_22"},{"key":"e_1_3_2_2_57_1","unstructured":"UCSB SecLab. [n. d.]. Angr. https:\/\/github.com\/angr\/angr"},{"key":"e_1_3_2_2_58_1","unstructured":"Vector 35. [n. d.]. Binary Ninja. https:\/\/binary.ninja\/"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23225"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.59"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.47"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23185"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883973"},{"key":"e_1_3_2_2_64_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Yu Sheng","year":"2022","unstructured":"Sheng Yu, Yu Qu, Xunchao Hu, and Heng Yin. 2022. DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_2_65_1","volume-title":"Proceedings of the USENIX Security Symposium. 337\u2013352","author":"Zhang Mingwei","unstructured":"Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In Proceedings of the USENIX Security Symposium. 337\u2013352."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00051"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616366","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616366"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":66,"alternative-id":["10.1145\/3611643.3616366","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616366","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}