{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T08:32:01Z","timestamp":1768725121030,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T00:00:00Z","timestamp":1701993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,8]]},"DOI":"10.1145\/3638584.3638599","type":"proceedings-article","created":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T11:15:19Z","timestamp":1710414919000},"page":"116-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2279-3606","authenticated-orcid":false,"given":"Abdulrahman Hamman Adama","family":"Chukkol","sequence":"first","affiliation":[{"name":"Information and Electronics, Department of Information and Electronics. Beijing Institute of Technology, Beijing, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7729-5439","authenticated-orcid":false,"given":"Senlin","family":"Luo","sequence":"additional","affiliation":[{"name":"Information and Electronics, Information System and Security &amp; Countermeasures Experimental Center, Beijing Institute of Technology, Beijing, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6736-2135","authenticated-orcid":false,"given":"Haruna","family":"Yunusa","sequence":"additional","affiliation":[{"name":"Automation Science and Electrical Engineering, School of Automation Science and Electrical Engineering, Beihang University, Beijing, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3137-2398","authenticated-orcid":false,"given":"Abdulganiyu Abdu","family":"Yusuf","sequence":"additional","affiliation":[{"name":"Computer Science, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6317-9915","authenticated-orcid":false,"given":"Abulfatahi","family":"Mohammed","sequence":"additional","affiliation":[{"name":"Information Technology, School of Management and Information Technology, Modibbo Adama University, Yola, Nigeria, Nigeria"}]}],"member":"320","published-online":{"date-parts":[[2024,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2023.V15.1339"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2018.V10.1214"},{"key":"e_1_3_2_1_3_1","volume-title":"Deep learning in neural networks: An overview.\u00a0Neural networks,\u00a061, 85-117","author":"Schmidhuber J.","year":"2015","unstructured":"Schmidhuber, J. (2015). Deep learning in neural networks: An overview.\u00a0Neural networks,\u00a061, 85-117."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/358669.358692"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_6_1","volume-title":"Binary Code Vulnerability Location Identification with Fine-grained Slicing. In\u00a02023 3rd Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS)\u00a0(pp. 502-506)","author":"Cui N.","year":"2023","unstructured":"Cui, N., Chen, L., & Shi, G. (2023, February). Binary Code Vulnerability Location Identification with Fine-grained Slicing. In\u00a02023 3rd Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS)\u00a0(pp. 502-506). IEEE.James W. Demmel, Yozo Hida, William Kahan, Xiaoye S. Li, Soni Mukherjee, and Jason Riedy. 2005. Error Bounds from Extra Precise Iterative Refinement. Technical Report No. UCB\/CSD-04-1344. University of California, Berkeley."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/244130.244151"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177352.1177355"},{"key":"e_1_3_2_1_11_1","volume-title":"Vuldetector: Detecting vulnerabilities using weighted feature graph comparison.\u00a0IEEE Transactions on Information Forensics and Security,\u00a016","author":"Cui L.","year":"2020","unstructured":"Cui, L., Hao, Z., Jiao, Y., Fei, H., & Yun, X. (2020). Vuldetector: Detecting vulnerabilities using weighted feature graph comparison.\u00a0IEEE Transactions on Information Forensics and Security,\u00a016, 2004-2017."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_1_13_1","volume-title":"BVDetector: A program slice-based binary code vulnerability intelligent detection system.\u00a0Information and Software Technology,\u00a0123, 106289","author":"Tian J.","year":"2020","unstructured":"Tian, J., Xing, W., & Li, Z. (2020). BVDetector: A program slice-based binary code vulnerability intelligent detection system.\u00a0Information and Software Technology,\u00a0123, 106289."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings, Part IV 14\u00a0(pp. 630-645)","author":"He K.","year":"2016","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016). Identity mappings in deep residual networks. In\u00a0Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part IV 14\u00a0(pp. 630-645). Springer International Publishing."},{"key":"e_1_3_2_1_15_1","volume-title":"Sard: A software assurance reference dataset","author":"Black P. E.","year":"2017","unstructured":"Black, P. E. (2017). Sard: A software assurance reference dataset."}],"event":{"name":"CSAI 2023: 2023 7th International Conference on Computer Science and Artificial Intelligence","location":"Beijing China","acronym":"CSAI 2023"},"container-title":["Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638584.3638599","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638584.3638599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:57:40Z","timestamp":1755874660000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638584.3638599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,8]]},"references-count":15,"alternative-id":["10.1145\/3638584.3638599","10.1145\/3638584"],"URL":"https:\/\/doi.org\/10.1145\/3638584.3638599","relation":{},"subject":[],"published":{"date-parts":[[2023,12,8]]},"assertion":[{"value":"2024-03-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}