{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:40:12Z","timestamp":1755780012471,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T00:00:00Z","timestamp":1701907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,7]]},"DOI":"10.1145\/3628797.3628996","type":"proceedings-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T15:25:34Z","timestamp":1701876334000},"page":"785-792","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Binary Representation Embedding and Deep Learning For Binary Code Similarity Detection in Software Security Domain"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5125-6870","authenticated-orcid":false,"given":"Thinh","family":"Nguyen Hung","sequence":"first","affiliation":[{"name":"University of Information Technology Vietnam National University, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2974-6577","authenticated-orcid":false,"given":"Hai","family":"Nguyen Phuc","sequence":"additional","affiliation":[{"name":"University of Information Technology Vietnam National University, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9408-8531","authenticated-orcid":false,"given":"Khoa","family":"Tran Dinh","sequence":"additional","affiliation":[{"name":"University of Information Technology Vietnam National University, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5123-0725","authenticated-orcid":false,"given":"Nhan","family":"Le Tran Thanh","sequence":"additional","affiliation":[{"name":"University of Information Technology Vietnam National University, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4810-9550","authenticated-orcid":false,"given":"Nghia","family":"To Trong","sequence":"additional","affiliation":[{"name":"University of Information Technology Vietnam National University, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4637-8140","authenticated-orcid":false,"given":"Khoa","family":"Ngo Khanh","sequence":"additional","affiliation":[{"name":"University of Information Technology Vietnam National University, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5945-3712","authenticated-orcid":false,"given":"Duy","family":"Phan The","sequence":"additional","affiliation":[{"name":"University of Information Technology Vietnam National University, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3147-3356","authenticated-orcid":false,"given":"Hau","family":"Pham Van","sequence":"additional","affiliation":[{"name":"University of Information Technology Vietnam National University, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2023,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.40"},{"key":"e_1_3_2_1_2_1","volume-title":"Statistical similarity of binaries. Acm sigplan notices 51, 6","author":"David Yaniv","year":"2016","unstructured":"Yaniv David, Nimrod Partush, and Eran Yahav. 2016. Statistical similarity of binaries. Acm sigplan notices 51, 6 (2016), 266\u2013280."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3177157"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985453"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.22"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"e_1_3_2_1_10_1","volume-title":"International conference on machine learning. PMLR, 3835\u20133845","author":"Li Yujia","year":"2019","unstructured":"Yujia Li, Chenjie Gu, Thomas Dullien, Oriol Vinyals, and Pushmeet Kohli. 2019. Graph matching networks for learning the similarity of graph structured objects. In International conference on machine learning. PMLR, 3835\u20133845."},{"key":"e_1_3_2_1_11_1","volume-title":"Enbindiff: Identifying data-only patches for binaries","author":"Lin Jian","year":"2021","unstructured":"Jian Lin, Dingding Wang, Rui Chang, Lei Wu, Yajin Zhou, and Kui Ren. 2021. Enbindiff: Identifying data-only patches for binaries. IEEE Transactions on Dependable and Secure Computing (2021)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_1_14_1","unstructured":"Zhenhao Luo Pengfei Wang Baosheng Wang Yong Tang Wei Xie Xu Zhou Danjun Liu and Kai Lu. 2023. VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.. In NDSS."},{"key":"e_1_3_2_1_15_1","volume-title":"DIMVA 2019, Gothenburg, Sweden, June 19\u201320, 2019, Proceedings 16","author":"Massarelli Luca","year":"2019","unstructured":"Luca Massarelli, Giuseppe\u00a0Antonio Di\u00a0Luna, Fabio Petroni, Roberto Baldoni, and Leonardo Querzoni. 2019. Safe: Self-attentive function embeddings for binary similarity. In Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19\u201320, 2019, Proceedings 16. Springer, 309\u2013329."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264820.3264821"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2015. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. (2015).","DOI":"10.14722\/ndss.2015.23294"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534367"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8195395"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2014.6852216"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.49"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064687"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5466"}],"event":{"name":"SOICT 2023: The 12th International Symposium on Information and Communication Technology","acronym":"SOICT 2023","location":"Ho Chi Minh Vietnam"},"container-title":["Proceedings of the 12th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3628996","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3628797.3628996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:21:27Z","timestamp":1755778887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3628996"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,7]]},"references-count":24,"alternative-id":["10.1145\/3628797.3628996","10.1145\/3628797"],"URL":"https:\/\/doi.org\/10.1145\/3628797.3628996","relation":{},"subject":[],"published":{"date-parts":[[2023,12,7]]},"assertion":[{"value":"2023-12-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}