{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:15:27Z","timestamp":1769728527457,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172105,62172104,62102091, 62102093"],"award-info":[{"award-number":["62172105,62172104,62102091, 62102093"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Funding of Ministry of Industry and Information Technology of the People's Republic of China","award":["TC220H079"],"award-info":[{"award-number":["TC220H079"]}]},{"DOI":"10.13039\/501100006374","name":"Shanghai Pilot Program for Basic Research-Fudan University","doi-asserted-by":"publisher","award":["21TQ1400100 (21TQ012)"],"award-info":[{"award-number":["21TQ1400100 (21TQ012)"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Rising-Star Program","award":["210A1400700"],"award-info":[{"award-number":["210A1400700"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670275","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3317-3331","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9342-1055","authenticated-orcid":false,"given":"Haoyu","family":"Xiao","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0726-9996","authenticated-orcid":false,"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7649-3719","authenticated-orcid":false,"given":"Minghang","family":"Shen","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5963-2886","authenticated-orcid":false,"given":"Chaoyang","family":"Lin","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6032-0426","authenticated-orcid":false,"given":"Can","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5725-6160","authenticated-orcid":false,"given":"Shengli","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9714-5545","authenticated-orcid":false,"given":"Min","family":"Yang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. https:\/\/chat.openai.com."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. Current IoT Forecast Highlights - Transforma Insights. https:\/\/transformainsights.com\/research\/forecast\/highlights."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. CVE-2019--20500. https:\/\/www.exploit-db.com\/exploits\/46841."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. exploit-db. https:\/\/www.exploit-db.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Ghidra. http:\/\/ghidra-sre.org."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. NVD. https:\/\/nvd.nist.gov\/vuln."},{"key":"e_1_3_2_1_7_1","unstructured":"2023. ReFirmLabs -- Binwalk. https:\/\/github.com\/ReFirmLabs\/binwalk."},{"key":"e_1_3_2_1_8_1","volume-title":"State of XIoT Security: 1H","year":"2022","unstructured":"2023. State of XIoT Security: 1H 2022. https:\/\/claroty.com\/resources\/reports\/state-of-xiot-security-1h-2022."},{"key":"e_1_3_2_1_9_1","volume-title":"State of XIoT Security: 2H","year":"2022","unstructured":"2023. State of XIoT Security: 2H 2022. https:\/\/claroty.com\/resources\/reports\/state-of-xiot-security-2h-2022."},{"key":"e_1_3_2_1_10_1","unstructured":"2023. The Mirai Botnet -- Threats and Mitigations. https:\/\/www.cisecurity.org\/insights\/blog\/the-mirai-botnet-threats-and-mitigations."},{"key":"e_1_3_2_1_11_1","unstructured":"2023. TP-Link Fixes Code Execution Vulnerability in End-of-Life Routers. https:\/\/threatpost.com\/tp-link-fixes-code-execution-vulnerability-in-end-of-life-routers\/126416\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2023. Vulnerable SDK components lead to supply chain risks in IoT and OT environments. https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/11\/22\/vulnerable-sdk-components-lead-to-supply-chain-risks-in-iot-and-ot-environments\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2024. AFLplusplus. https:\/\/github.com\/AFLplusplus\/AFLplusplus."},{"key":"e_1_3_2_1_14_1","unstructured":"Manos Antonakakis Tim April Michael Bailey Matthew Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J. Alex Halderman Luca Invernizzi Michalis Kallitsis Deepak Kumar Chaz Lever Zane Ma Joshua Mason Damian Menscher Chad Seaman Nick Sullivan Kurt Thomas and Yi Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security'17."},{"key":"e_1_3_2_1_15_1","volume-title":"QL: Object-oriented Queries on Relational Data. In ECOOP'16","author":"Avgustinov Pavel","year":"2016","unstructured":"Pavel Avgustinov, Oege de Moor, Michael Peyton Jones, and Max Sch\u00e4fer. 2016. QL: Object-oriented Queries on Relational Data. In ECOOP'16."},{"key":"e_1_3_2_1_16_1","volume-title":"Chia Yuan Cho, and Hee Beng Kuan Tan","author":"Chandramohan Mahinthan","year":"2016","unstructured":"Mahinthan Chandramohan, Yinxing Xue, Zhengzi Xu, Yang Liu, Chia Yuan Cho, and Hee Beng Kuan Tan. 2016. BinGo: cross-architecture cross-OS binary search. In FSE\/ESEC'16."},{"key":"e_1_3_2_1_17_1","volume-title":"Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. In NDSS'16","author":"Chen Daming D.","year":"2016","unstructured":"Daming D. Chen, Maverick Woo, David Brumley, and Manuel Egele. 2016. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. In NDSS'16."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559367"},{"key":"e_1_3_2_1_19_1","unstructured":"Libo Chen Yanhao Wang Quanpu Cai Yunfan Zhan Hong Hu Jiaqi Linghu Qinsheng Hou Chao Zhang Haixin Duan and Zhi Xue. 2021. Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. In USENIX Security'21."},{"key":"e_1_3_2_1_20_1","volume-title":"DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. In DSN'18","author":"Cheng Kai","year":"2018","unstructured":"Kai Cheng, Qiang Li, Lei Wang, Qian Chen, Yaowen Zheng, Limin Sun, and Zhenkai Liang. 2018. DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware. In DSN'18."},{"key":"e_1_3_2_1_21_1","volume-title":"Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis. ArXiv abs\/2109.12209","author":"Cheng Kai","year":"2021","unstructured":"Kai Cheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, and Limin Sun. 2021. Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis. ArXiv abs\/2109.12209 (2021)."},{"key":"e_1_3_2_1_22_1","unstructured":"Abraham A. Clements Eric Gustafson Tobias Scharnowski Paul Grosen David J. Fritz Christopher Kruegel Giovanni Vigna Saurabh Bagchi and Mathias Payer. 2020. HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. In USENIX Security'20."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177157"},{"key":"e_1_3_2_1_24_1","unstructured":"Drew Davidson Benjamin Moench Thomas Ristenpart and Somesh Jha. 2013. FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. In USENIX Security'13."},{"key":"e_1_3_2_1_25_1","unstructured":"Steven H. H. Ding Benjamin C. M. Fung and Philippe Charland. 2019. Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization. In Oakland'19."},{"key":"e_1_3_2_1_26_1","volume-title":"Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. In USENIX Security'14.","author":"Egele Manuel","year":"2014","unstructured":"Manuel Egele, Maverick Woo, Peter Chapman, and David Brumley. 2014. Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. In USENIX Security'14."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_29_1","unstructured":"Xuan Feng Xiaojing Liao X Wang Haining Wang Qiang Li Kai Yang Hongsong Zhu and Limin Sun. [n. d.]. Understanding and Securing Device Vulnerabilities through Automated Bug Report analysis. In USENIX Security'19."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484543"},{"key":"e_1_3_2_1_31_1","volume-title":"BinHunt: Automatically Finding Semantic Differences in Binary Programs. In IPSN'08","author":"Gao Debin","year":"2008","unstructured":"Debin Gao, Michael K. Reiter, and Dawn Xiaodong Song. 2008. BinHunt: Automatically Finding Semantic Differences in Binary Programs. In IPSN'08."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"e_1_3_2_1_33_1","volume-title":"CCS'20","author":"Harm","unstructured":"Harm J. Griffioen and Christian Doerr. 2020. Examining Mirai's Battle over the Internet of Things. In CCS'20."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Heqing Huang Peisen Yao Hung-Chun Chiu Yiyuan Guo and Charles Zhang. 2024. Titan : Efficient Multi-target Directed Greybox Fuzzing. In Oakland'24. https:\/\/api.semanticscholar.org\/CorpusID:268386913","DOI":"10.1109\/SP54263.2024.00059"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Jiyong Jang Abeer Agrawal and David Brumley. 2012. ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions. In Oakland'12.","DOI":"10.1109\/SP.2012.13"},{"key":"e_1_3_2_1_36_1","volume-title":"PDiff: Semantic-based Patch Presence Testing for Downstream Kernels. In CCS'20","author":"Jiang Zheyue","year":"2020","unstructured":"Zheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, and Zhemin Yang. 2020. PDiff: Semantic-based Patch Presence Testing for Downstream Kernels. In CCS'20."},{"key":"e_1_3_2_1_37_1","volume-title":"Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, and Kirill Levchenko.","author":"Johnson Evan","year":"2021","unstructured":"Evan Johnson, Maxwell Troy Bland, Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, and Kirill Levchenko. 2021. Jetset: Targeted Firmware Rehosting for Embedded Systems. In USENIX Security'21."},{"key":"e_1_3_2_1_38_1","volume-title":"CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. In TSE'02","author":"Kamiya Toshihiro","year":"2002","unstructured":"Toshihiro Kamiya, Shinji Kusumoto, and Katsuro Inoue. 2002. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. In TSE'02."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560664"},{"key":"e_1_3_2_1_40_1","volume-title":"VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. In Oakland'17.","author":"Kim Seulbae","year":"2017","unstructured":"Seulbae Kim, Seunghoon Woo, Heejo Lee, and Hakjoo Oh. 2017. VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. In Oakland'17."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"e_1_3_2_1_42_1","volume-title":"VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. ArXiv abs\/1801.01681","author":"Li Z.","year":"2018","unstructured":"Z. Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, and Yuyi Zhong. 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. ArXiv abs\/1801.01681 (2018)."},{"key":"e_1_3_2_1_43_1","unstructured":"Lannan Luo Jiang Ming Dinghao Wu Peng Liu and Sencun Zhu. 2014. Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. In FSE\/ESEC'14."},{"key":"e_1_3_2_1_44_1","volume-title":"VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. In NDSS'23","author":"Luo Zhenhao","year":"2023","unstructured":"Zhenhao Luo, Pengfei Wang, Baosheng Wang, Yong Tang, Wei Xie, Xu Zhou, Danjun Liu, and Kai Lu. 2023. VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. In NDSS'23."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Jiang Ming Meng Pan and Debin Gao. 2012. iBinHunt: Binary Hunting with Inter-procedural Control Flow. In Inscrypt'12.","DOI":"10.1007\/978-3-642-37682-5_8"},{"key":"e_1_3_2_1_46_1","volume-title":"Suman Sekhar Jana, and Baishakhi Ray","author":"Pei Kexin","year":"2020","unstructured":"Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Sekhar Jana, and Baishakhi Ray. 2020. Trex: Learning Execution Semantics from Micro-Traces for Binary Similarity. ArXiv abs\/2012.08680 (2020)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Jannik Pewny Behrad Garmany Robert Gawlik Christian Rossow and Thorsten Holz. 2015. Cross-architecture bug search in binary executables. In Oakland'15.","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664269"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3132950"},{"key":"e_1_3_2_1_50_1","volume-title":"Engler","author":"Ramos David A.","year":"2015","unstructured":"David A. Ramos and Dawson R. Engler. 2015. Under-Constrained Symbolic Execution: Correctness Checking for Real Code. In USENIX ATC'15."},{"key":"e_1_3_2_1_51_1","volume-title":"Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware. In Oakland'20.","author":"Redini Nilo","year":"2020","unstructured":"Nilo Redini, Aravind Machiry, Ruoyu Wang, Chad Spensky, Andrea Continella, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2020. Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware. In Oakland'20."},{"key":"e_1_3_2_1_52_1","volume-title":"Chanchal Kumar Roy, and Cristina V. Lopes","author":"Sajnani Hitesh","year":"2016","unstructured":"Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, Chanchal Kumar Roy, and Cristina V. Lopes. 2016. SourcererCC: Scaling Code Clone Detection to Big-Code. In ICSE'16."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463293"},{"key":"e_1_3_2_1_54_1","volume-title":"Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. In NDSS'15","author":"Shoshitaishvili Yan","year":"2015","unstructured":"Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kr\u00fcgel, and Giovanni Vigna. 2015. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. In NDSS'15."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christopher Salls Nick Stephens Mario Polino Audrey Dutcher John Grosen Siji Feng Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In Oakland'16.","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Dokyung Song Julian Lettner Prabhu Rajasekaran Yeoul Na Stijn Volckaert Per Larsen and Michael Franz. 2018. SoK: Sanitizing for Security. In Oakland'18.","DOI":"10.1109\/SP.2019.00010"},{"key":"e_1_3_2_1_57_1","volume-title":"Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation. In USENIX Security Symposium. https:\/\/api.semanticscholar.org\/CorpusID:260777808","author":"Tay Hui Jun","year":"2023","unstructured":"Hui Jun Tay, Kyle Zeng, Jayakrishna Menon Vadayath, Arvind S. Raj, Audrey Annika Dutcher, Tejesh Reddy, Wil Gibbs, Zion Leonahenahe Basque, Fangzhou Dong, Zack Smith, Adam Doup\u00e9, Tiffany Bao, Yan Shoshitaishvili, and Ruoyu Wang. 2023. Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation. In USENIX Security Symposium. https:\/\/api.semanticscholar.org\/CorpusID:260777808"},{"key":"e_1_3_2_1_58_1","volume-title":"Yanick Fratantonio, Davide Balzarotti, Adam Doup\u00e9, Tiffany Bao, Ruoyu Wang, Christophe Hauser, and Yan Shoshitaishvili.","author":"Vadayath Jayakrishna","year":"2022","unstructured":"Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doup\u00e9, Tiffany Bao, Ruoyu Wang, Christophe Hauser, and Yan Shoshitaishvili. 2022. Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. In USENIX Security'22."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534367"},{"key":"e_1_3_2_1_60_1","volume-title":"MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. In USENIX Security'20.","author":"Xiao Yang","year":"2020","unstructured":"Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, and Wenchang Shi. 2020. MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. In USENIX Security'20."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00028"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397361"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598102"},{"key":"e_1_3_2_1_65_1","volume-title":"Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis. In IOT'22","author":"Yin Xiaokang","year":"2022","unstructured":"Xiaokang Yin, Ruijie Cai, Yizheng Zhang, Lukai Li, Qichao Yang, and Shengli Liu. 2022. Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis. In IOT'22."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534366"},{"key":"e_1_3_2_1_68_1","unstructured":"Yaowen Zheng Ali Davanian Heng Yin Chengyu Song Hongsong Zhu and Limin Sun. 2019. FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. In USENIX Security'19."},{"key":"e_1_3_2_1_69_1","unstructured":"Wei Zhou Le Guan Peng Liu and Yuqing Zhang. 2021. Automatic Firmware Emulation through Invalidity-guided Knowledge Inference (Extended Version). In USENIX Security'21."},{"key":"e_1_3_2_1_70_1","volume-title":"Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. In NeurIPS'19.","author":"Zhou Yaqin","year":"2019","unstructured":"Yaqin Zhou, Shangqing Liu, J. Siow, Xiaoning Du, and Yang Liu. 2019. Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. In NeurIPS'19."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:07:25Z","timestamp":1755842845000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":70,"alternative-id":["10.1145\/3658644.3670275","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670275","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}