{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:26:01Z","timestamp":1769747161402,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3650212.3680338","type":"proceedings-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:44:25Z","timestamp":1726055065000},"page":"1009-1021","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["DeLink: Source File Information Recovery in Binaries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9915-8312","authenticated-orcid":false,"given":"Zhe","family":"Lang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, CAS, Beijing, China \/ School of Cyber Security, UCAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8390-7518","authenticated-orcid":false,"given":"Zhengzi","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore \/ Imperial Global Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3921-7907","authenticated-orcid":false,"given":"Xiaohui","family":"Chen","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0549-0999","authenticated-orcid":false,"given":"Shichao","family":"Lv","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS, Beijing, China \/ School of Cyber Security, UCAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3284-7351","authenticated-orcid":false,"given":"Zhanwei","family":"Song","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS, Beijing, China \/ School of Cyber Security, UCAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6168-8003","authenticated-orcid":false,"given":"Zhiqiang","family":"Shi","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS, Beijing, China \/ School of Cyber Security, UCAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2745-7521","authenticated-orcid":false,"given":"Limin","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS, Beijing, China \/ School of Cyber Security, UCAS, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"enki\/libev: Full-featured high-performance event loop loosely modelled after libevent. https:\/\/github.com\/enki\/libev Last accessed","year":"2023","unstructured":"2015. enki\/libev: Full-featured high-performance event loop loosely modelled after libevent. https:\/\/github.com\/enki\/libev Last accessed 1 November 2023"},{"key":"e_1_3_2_1_2_1","volume-title":"Using the GNU Compiler Collection (GCC): Code Gen Options. https:\/\/gcc.gnu.org\/onlinedocs\/gcc-7.5.0\/gcc\/Code-Gen-Options.html#Code-Gen-Options Last accessed","year":"2023","unstructured":"2019. Using the GNU Compiler Collection (GCC): Code Gen Options. https:\/\/gcc.gnu.org\/onlinedocs\/gcc-7.5.0\/gcc\/Code-Gen-Options.html#Code-Gen-Options Last accessed 1 January 2023"},{"key":"e_1_3_2_1_3_1","volume-title":"Using the GNU Compiler Collection (GCC): Link Options. https:\/\/gcc.gnu.org\/onlinedocs\/gcc-7.5.0\/gcc\/Link-Options.html#Link-Options Last accessed","year":"2023","unstructured":"2019. Using the GNU Compiler Collection (GCC): Link Options. https:\/\/gcc.gnu.org\/onlinedocs\/gcc-7.5.0\/gcc\/Link-Options.html#Link-Options Last accessed 1 January 2023"},{"key":"e_1_3_2_1_4_1","volume-title":"avast\/retdec: RetDec is a retargetable machine-code decompiler based on LLVM.. https:\/\/github.com\/avast\/retdec Last accessed","year":"2023","unstructured":"2022. avast\/retdec: RetDec is a retargetable machine-code decompiler based on LLVM.. https:\/\/github.com\/avast\/retdec Last accessed 1 March 2023"},{"key":"e_1_3_2_1_5_1","volume-title":"Buildroot - Making Embedded Linux Easy. https:\/\/buildroot.org\/ Last accessed","year":"2023","unstructured":"2023. Buildroot - Making Embedded Linux Easy. https:\/\/buildroot.org\/ Last accessed 1 March 2023"},{"key":"e_1_3_2_1_6_1","volume-title":"CALL \u2014 Call Procedure. https:\/\/www.felixcloutier.com\/x86\/call Last accessed","year":"2023","unstructured":"2023. CALL \u2014 Call Procedure. https:\/\/www.felixcloutier.com\/x86\/call Last accessed 1 January 2023"},{"key":"e_1_3_2_1_7_1","volume-title":"Denial-of-service attack - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack Last accessed","year":"2023","unstructured":"2023. Denial-of-service attack - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack Last accessed 1 November 2023"},{"key":"e_1_3_2_1_8_1","volume-title":"DWARF 4 Standard. https:\/\/dwarfstd.org\/dwarf4std.html Last accessed","year":"2023","unstructured":"2023. DWARF 4 Standard. https:\/\/dwarfstd.org\/dwarf4std.html Last accessed 1 November 2023"},{"key":"e_1_3_2_1_9_1","volume-title":"Hex Rays - State-of-the-art binary code analysis solutions. https:\/\/hex-rays.com\/ida-pro\/ Last accessed","year":"2023","unstructured":"2023. Hex Rays - State-of-the-art binary code analysis solutions. https:\/\/hex-rays.com\/ida-pro\/ Last accessed 1 March 2023"},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/hex-rays.com\/decompiler\/ Last accessed","author":"Decompiler Hex-Rays","year":"2023","unstructured":"2023. Hex-Rays Decompiler. https:\/\/hex-rays.com\/decompiler\/ Last accessed 1 March 2023"},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/pyg.org\/ Last accessed","author":"Home","year":"2023","unstructured":"2023. Home - PyG. https:\/\/pyg.org\/ Last accessed 1 November 2023"},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware) Last accessed","author":"Wikipedia Mirai","year":"2023","unstructured":"2023. Mirai (malware) - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware) Last accessed 1 November 2023"},{"key":"e_1_3_2_1_13_1","volume-title":"Ghidra is a software reverse engineering (SRE) framework. https:\/\/github.com\/NationalSecurityAgency\/ghidra\/ Last accessed","author":"2023. NationalSecurityAgency","year":"2023","unstructured":"2023. NationalSecurityAgency\/ghidra: Ghidra is a software reverse engineering (SRE) framework. https:\/\/github.com\/NationalSecurityAgency\/ghidra\/ Last accessed 1 March 2023"},{"key":"e_1_3_2_1_14_1","volume-title":"objdump - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Objdump Last accessed","year":"2023","unstructured":"2023. objdump - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Objdump Last accessed 1 March 2023"},{"key":"e_1_3_2_1_15_1","volume-title":"Position-independent code - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Position-independent_code Last accessed","year":"2023","unstructured":"2023. Position-independent code - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Position-independent_code Last accessed 1 January 2023"},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/pytorch.org\/ Last accessed","year":"2023","unstructured":"2023. PyTorch. https:\/\/pytorch.org\/ Last accessed 1 November 2023"},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Static_(keyword) Last accessed","author":"Wikipedia Static","year":"2023","unstructured":"2023. Static (keyword) - Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Static_(keyword) Last accessed 1 January 2023"},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/virusshare.com\/ Last accessed","year":"2023","unstructured":"2023. VirusShare.com. https:\/\/virusshare.com\/ Last accessed 1 November 2023"},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/www.virustotal.com\/gui\/home\/upload Last accessed","author":"Home VirusTotal","year":"2023","unstructured":"2023. VirusTotal - Home. https:\/\/www.virustotal.com\/gui\/home\/upload Last accessed 1 November 2023"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2303.08774"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Dzmitry Bahdanau Kyunghyun Cho and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 https:\/\/doi.org\/10.48550\/arXiv.1409.0473 10.48550\/arXiv.1409.0473","DOI":"10.48550\/arXiv.1409.0473"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380354"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1954-09848-8"},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium. 10","author":"Bhatkar Sandeep","year":"2005","unstructured":"Sandeep Bhatkar, Daniel C DuVarney, and R Sekar. 2005. Efficient Techniques for Comprehensive Protection from Memory Error Exploits. In USENIX Security Symposium. 10, 1."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468"},{"key":"e_1_3_2_1_26_1","volume-title":"Language models are few-shot learners. Advances in neural information processing systems, 33","author":"Brown Tom","year":"2020","unstructured":"Tom Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared D Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, and Amanda Askell. 2020. Language models are few-shot learners. Advances in neural information processing systems, 33 (2020), 1877\u20131901."},{"key":"e_1_3_2_1_27_1","first-page":"391","article-title":"Binary Code Extraction and Interface Identification for Security Applications","volume":"10","author":"Caballero Juan","year":"2010","unstructured":"Juan Caballero, Noah M Johnson, Stephen McCamant, and Dawn Song. 2010. Binary Code Extraction and Interface Identification for Security Applications. In NDSS. 10, 391\u2013408.","journal-title":"NDSS."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598062"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_12"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556464.2556467"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2806891"},{"key":"e_1_3_2_1_32_1","first-page":"2881","article-title":"What neural networks memorize and why: Discovering the long tail via influence estimation","volume":"33","author":"Feldman Vitaly","year":"2020","unstructured":"Vitaly Feldman and Chiyuan Zhang. 2020. What neural networks memorize and why: Discovering the long tail via influence estimation. Advances in Neural Information Processing Systems, 33 (2020), 2881\u20132891.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1983.10478008"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464804"},{"key":"e_1_3_2_1_35_1","volume-title":"Inductive representation learning on large graphs. Advances in neural information processing systems, 30","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Advances in neural information processing systems, 30 (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243866"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560612"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196504"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.10"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092707"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389268"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 https:\/\/doi.org\/10.48550\/arXiv.1301.3781 10.48550\/arXiv.1301.3781","DOI":"10.48550\/arXiv.1301.3781"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1983.4767342"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.056131"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066133"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00012"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427265"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.00770"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","unstructured":"Yanchen Qiao Xiaochun Yun and Yongzheng Zhang. 2016. How to automatically identify the homology of different malware. In 2016 IEEE Trustcom\/BigDataSE\/ISPA. 929\u2013936. https:\/\/doi.org\/10.1109\/TrustCom.2016.0158 10.1109\/TrustCom.2016.0158","DOI":"10.1109\/TrustCom.2016.0158"},{"key":"e_1_3_2_1_51_1","volume-title":"Online dynamic programming. Advances in Neural Information Processing Systems, 30","author":"Rahmanian Holakou","year":"2017","unstructured":"Holakou Rahmanian and Manfred KK Warmuth. 2017. Online dynamic programming. Advances in Neural Information Processing Systems, 30 (2017)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1971.10482356"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0042519"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-30164-8_832"},{"key":"e_1_3_2_1_55_1","volume-title":"24th USENIX security symposium (USENIX Security 15). 611\u2013626.","author":"Richard Shin Eui Chul","unstructured":"Eui Chul Richard Shin, Dawn Song, and Reza Moazzezi. 2015. Recognizing functions in binaries with neural networks. In 24th USENIX security symposium (USENIX Security 15). 611\u2013626."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556922"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564643"},{"key":"e_1_3_2_1_58_1","volume-title":"Sequence to sequence learning with neural networks. Advances in neural information processing systems, 27","author":"Sutskever Ilya","year":"2014","unstructured":"Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to sequence learning with neural networks. Advances in neural information processing systems, 27 (2014)."},{"key":"e_1_3_2_1_59_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Wang Shuai","year":"2015","unstructured":"Shuai Wang, Pei Wang, and Dinghao Wu. 2015. Reassembleable disassembling. In 24th USENIX Security Symposium (USENIX Security 15). 627\u2013642."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","unstructured":"Zhao Xiaolin Zhang Yiman Li Xuhui and Chen Quanbao. 2018. Research on malicious code homology analysis method based on texture fingerprint clustering. In 2018 17th IEEE International Conference On Trust Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). 1914\u20131921. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00291 10.1109\/TrustCom\/BigDataSE.2018.00291","DOI":"10.1109\/TrustCom"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","unstructured":"Kun Xu Lingfei Wu Zhiguo Wang Yansong Feng Michael Witbrock and Vadim Sheinin. 2018. Graph2seq: Graph to sequence learning with attention-based neural networks. arXiv preprint arXiv:1804.00823 https:\/\/doi.org\/10.48550\/arXiv.1804.00823 10.48550\/arXiv.1804.00823","DOI":"10.48550\/arXiv.1804.00823"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510627"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.06.013"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516664"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"}],"event":{"name":"ISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Vienna Austria","acronym":"ISSTA '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3680338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650212.3680338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:07Z","timestamp":1750287007000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3680338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":65,"alternative-id":["10.1145\/3650212.3680338","10.1145\/3650212"],"URL":"https:\/\/doi.org\/10.1145\/3650212.3680338","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2024-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}