{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:05:33Z","timestamp":1755907533435,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research \\& Development Project of China","award":["No. 2019YFB1804400"],"award-info":[{"award-number":["No. 2019YFB1804400"]}]},{"name":"Alipay (Hangzhou) Information Technology Co., Ltd","award":["No. TA2217345"],"award-info":[{"award-number":["No. TA2217345"]}]},{"name":"Hong Kong S.A.R. Research Grants Council (RGC) General Research Fund","award":["No. 14209720"],"award-info":[{"award-number":["No. 14209720"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670276","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3778-3792","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["<scp>LiftFuzz:<\/scp>\n            Validating Binary Lifters through Context-aware Fuzzing with GPT"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8696-2624","authenticated-orcid":false,"given":"Yutong","family":"Zhou","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3711-4506","authenticated-orcid":false,"given":"Fan","family":"Yang","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5476-8996","authenticated-orcid":false,"given":"Zirui","family":"Song","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1611-6804","authenticated-orcid":false,"given":"Ke","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0776-4073","authenticated-orcid":false,"given":"Jiongyi","family":"Chen","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1519-0057","authenticated-orcid":false,"given":"Kehuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong SAR, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"September","author":"Labs Avast Threat","year":"2023","unstructured":"Avast Threat Labs. Accessed: September 2023. Avast. https:\/\/github.com\/avast\/r etdec."},{"key":"e_1_3_2_1_2_1","volume-title":"Neural Machine Translation by Jointly Learning to Align and Translate. CoRR 1409.0473","author":"Bahdanau Dzmitry","year":"2014","unstructured":"Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural Machine Translation by Jointly Learning to Align and Translate. CoRR 1409.0473 (2014)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"S\u00e9bastien Bardin Philippe Herrmann J\u00e9r\u00f4me Leroux Olivier Ly Renaud Tabary et al. 2011. The BINCOA Framework for Binary Code Analysis. In CAV. 165--170.","DOI":"10.1007\/978-3-642-22110-1_13"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23300"},{"key":"e_1_3_2_1_5_1","first-page":"10","article-title":"QEMU, a fast and portable dynamic translator","volume":"41","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard. 2005. QEMU, a fast and portable dynamic translator. In USENIX, Vol. 41. 10--5555.","journal-title":"USENIX"},{"key":"e_1_3_2_1_6_1","unstructured":"Derek Bruening. 2004. Efficient transparent and comprehensive runtime code manipulation. Ph.D. Dissertation. Massachusetts Institute of Technology USA."},{"key":"e_1_3_2_1_7_1","volume-title":"Amarasinghe","author":"Bruening Derek","year":"2003","unstructured":"Derek Bruening, Timothy Garnett, and Saman P. Amarasinghe. 2003. An Infrastructure for Adaptive Dynamic Optimization. In CGO. IEEE, 265--275."},{"key":"e_1_3_2_1_8_1","volume-title":"Schwartz","author":"Brumley David","year":"2011","unstructured":"David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J. Schwartz. 2011. BAP: A Binary Analysis Platform. In CAV. Springer, 463--469."},{"volume-title":"October","year":"2023","key":"e_1_3_2_1_9_1","unstructured":"Capstone. Accessed: October 2023. http:\/\/www.capstone-engine.org\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cl.2015.05.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.825697"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Sandeep Dasgupta Sushant Dinesh Deepan Venkatesh Vikram S. Adve et al. 2020. Scalable validation of binary lifters. In PLDI. 655--671.","DOI":"10.1145\/3385412.3385964"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Sandeep Dasgupta Daejun Park et al. 2019. A complete formal semantics of x86--64 user-level instruction set architecture. In PLDI. 1133--1148.","DOI":"10.1145\/3314221.3314601"},{"key":"e_1_3_2_1_14_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_15_1","volume-title":"Benjamin CM Fung, and Philippe Charland","author":"Ding Steven HH","year":"2019","unstructured":"Steven HH Ding, Benjamin CM Fung, and Philippe Charland. 2019. Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In SP. IEEE, 472--489."},{"key":"e_1_3_2_1_16_1","volume-title":"October","author":"Accessed EEMBC.","year":"2023","unstructured":"EEMBC. Accessed: October 2023. EEMBC. https:\/\/www.eembc.org\/techlit\/."},{"key":"e_1_3_2_1_17_1","volume-title":"October","author":"GaloisInc. Accessed","year":"2023","unstructured":"GaloisInc. Accessed: October 2023. Reopt. https:\/\/github.com\/GaloisInc\/reopt."},{"key":"e_1_3_2_1_18_1","volume-title":"October","author":"Accessed GNU.","year":"2023","unstructured":"GNU. Accessed: October 2023. The GNU C Library (glibc). https:\/\/www.gnu.or g\/software\/libc\/documentation.html."},{"key":"e_1_3_2_1_19_1","first-page":"151","article-title":"Automated Whitebox Fuzz Testing","volume":"8","author":"Godefroid Patrice","year":"2008","unstructured":"Patrice Godefroid, Michael Y. Levin, and David A. Molnar. 2008. Automated Whitebox Fuzz Testing. In NDSS, Vol. 8. 151--166.","journal-title":"NDSS"},{"key":"e_1_3_2_1_20_1","volume-title":"April","author":"Could Google","year":"2024","unstructured":"Google Could. Accessed: April 2024. Evaluating models. https:\/\/cloud.google.c om\/translate\/automl\/docs\/evaluate."},{"key":"e_1_3_2_1_21_1","volume-title":"Workshop on Instruction Set Architecture Specification","volume":"6","author":"Hendrix Joe","year":"2019","unstructured":"Joe Hendrix, Guannan Wei, and Simon Winwood. 2019. Towards verified binary raising. In Workshop on Instruction Set Architecture Specification 2019, Vol. 6."},{"key":"e_1_3_2_1_22_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"volume-title":"September","year":"2023","key":"e_1_3_2_1_23_1","unstructured":"Intel. Accessed: September 2023. Intel\u00ae 64 and IA-32 Architectures Software Developer Manuals. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/arti cles\/technical\/intel-sdm.html."},{"key":"e_1_3_2_1_24_1","volume-title":"Baker","author":"Jelinek Frederick","year":"1977","unstructured":"Frederick Jelinek, Robert L. Mercer, Lalit R. Bahl, and Janet M. Baker. 1977. Perplexity?a measure of the difficulty of speech recognition tasks. Journal of the Acoustical Society of America 62 (1977)."},{"key":"e_1_3_2_1_25_1","volume-title":"Jun Yeon Won, and Zhiqiang Lin","author":"Jin Xin","year":"2022","unstructured":"Xin Jin, Kexin Pei, Jun Yeon Won, and Zhiqiang Lin. 2022. SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings. In CCS. 1631--1645."},{"key":"e_1_3_2_1_26_1","volume-title":"October","author":"Karpathy Andrej","year":"2023","unstructured":"Andrej Karpathy. Accessed: October 2023. minGPT. https:\/\/github.com\/karpath y\/minGPT\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Soomin Kim Markus Faerevaag Minkyu Jung Seungil Jung DongYeop Oh JongHyup Lee and Sang Kil Cha. 2017. Testing intermediate representations for binary analysis. In ASE. 353--364.","DOI":"10.1109\/ASE.2017.8115648"},{"key":"e_1_3_2_1_28_1","volume-title":"PEBIL: Efficient static binary instrumentation for Linux","author":"Laurenzano Michael","year":"2010","unstructured":"Michael Laurenzano, Mustafa M. Tikir, Laura Carrington, et al. 2010. PEBIL: Efficient static binary instrumentation for Linux. In ISPASS. IEEE, 175--183."},{"key":"e_1_3_2_1_29_1","article-title":"Bochs: A portable pc emulator for unix\/x","volume":"1996","author":"Lawton Kevin P","year":"1996","unstructured":"Kevin P Lawton. 1996. Bochs: A portable pc emulator for unix\/x. Linux Journal 1996, 29es (1996), 7--es.","journal-title":"Linux Journal"},{"key":"e_1_3_2_1_30_1","volume-title":"A diversity-promoting objective function for neural conversation models. arXiv preprint arXiv:1510.03055","author":"Li Jiwei","year":"2015","unstructured":"Jiwei Li, Michel Galley, Chris Brockett, Jianfeng Gao, and Bill Dolan. 2015. A diversity-promoting objective function for neural conversation models. arXiv preprint arXiv:1510.03055 (2015)."},{"key":"e_1_3_2_1_31_1","volume-title":"Palmtree: Learning an assembly language model for instruction embedding. In CCS. 3236--3251.","author":"Li Xuezixiang","year":"2021","unstructured":"Xuezixiang Li, Yu Qu, and Heng Yin. 2021. Palmtree: Learning an assembly language model for instruction embedding. In CCS. 3236--3251."},{"key":"e_1_3_2_1_32_1","volume-title":"Sok: Demystifying binary lifters through the lens of downstream applications. In SP. 1100--1119.","author":"Liu Zhibo","year":"2022","unstructured":"Zhibo Liu, Yuanyuan Yuan, ShuaiWang, and Yuyan Bao. 2022. Sok: Demystifying binary lifters through the lens of downstream applications. In SP. 1100--1119."},{"key":"e_1_3_2_1_33_1","unstructured":"Ilya Loshchilov and Frank Hutter. 2019. DecoupledWeight Decay Regularization. In ICLR. https:\/\/openreview.net\/forum?id=Bkg6RiCqY7"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Chi-Keung Luk Robert S. Cohn Robert Muth et al. 2005. Pin: building customized program analysis tools with dynamic instrumentation. In PLDI. 190--200.","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_35_1","unstructured":"Ben Mann N Ryder M Subbiah J Kaplan P Dhariwal A Neelakantan et al. 2020. Language models are few-shot learners. arXiv preprint arXiv:2005.14165 (2020)."},{"key":"e_1_3_2_1_36_1","volume-title":"Giampaolo Fresi Roglia, and Danilo Bruschi","author":"Martignoni Lorenzo","year":"2010","unstructured":"Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, and Danilo Bruschi. 2010. Testing system virtual machines. In ISSTA. 171--182."},{"key":"e_1_3_2_1_37_1","volume-title":"Giampaolo Fresi Roglia, and Danilo Bruschi","author":"Martignoni Lorenzo","year":"2009","unstructured":"Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, and Danilo Bruschi. 2009. Testing CPU emulators. In ISSTA. 261--272."},{"key":"e_1_3_2_1_38_1","volume-title":"Giampaolo Fresi Roglia, et al","author":"Paleari Roberto","year":"2010","unstructured":"Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, et al. 2010. Nversion disassembly: differential testing of x86 disassemblers. In ISSTA. 265--274."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Kishore Papineni Salim Roukos Todd Ward and Wei-Jing Zhu. 2002. Bleu: a Method for Automatic Evaluation of Machine Translation. In ACL. 311--318.","DOI":"10.3115\/1073083.1073135"},{"key":"e_1_3_2_1_40_1","volume-title":"Stateformer: Fine-grained type recovery from binaries using generative state modeling. In ESEC\/FSE'21. 690--702.","author":"Pei Kexin","year":"2021","unstructured":"Kexin Pei, Jonas Guan, Matthew Broughton, Zhongtian Chen, Songchen Yao, et al. 2021. Stateformer: Fine-grained type recovery from binaries using generative state modeling. In ESEC\/FSE'21. 690--702."},{"key":"e_1_3_2_1_41_1","volume-title":"Trex: Learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680","author":"Pei Kexin","year":"2020","unstructured":"Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, and Baishakhi Ray. 2020. Trex: Learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680 (2020)."},{"key":"e_1_3_2_1_42_1","volume-title":"September","author":"Project LLVM","year":"2023","unstructured":"LLVM Project. Accessed: September 2023. LLVM Language Reference Manual. https:\/\/llvm.org\/docs\/LangRef.html."},{"key":"e_1_3_2_1_43_1","unstructured":"Alec Radford Karthik Narasimhan Tim Salimans Ilya Sutskever et al. 2018. Improving language understanding by generative pre-training. OpenAI (2018)."},{"key":"e_1_3_2_1_44_1","unstructured":"Alec Radford Jeffrey Wu Rewon Child David Luan Dario Amodei et al. 2019. Language models are unsupervised multitask learners. OpenAI blog (2019)."},{"volume-title":"September","year":"2023","key":"e_1_3_2_1_45_1","unstructured":"rev.ng. Accessed: September 2023. Revng. https:\/\/github.com\/revng\/revng."},{"key":"e_1_3_2_1_46_1","volume-title":"Firmalice-Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. In NDSS'22nd.","author":"Shoshitaishvili Yan","year":"2015","unstructured":"Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna. 2015. Firmalice-Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. In NDSS'22nd."},{"key":"e_1_3_2_1_47_1","volume-title":"Le","author":"Sutskever Ilya","year":"2014","unstructured":"Ilya Sutskever, Oriol Vinyals, and Quoc V. Le. 2014. Sequence to Sequence Learning with Neural Networks. In NeurIPS. 3104--3112."},{"key":"e_1_3_2_1_48_1","volume-title":"Evaluating the evaluation of diversity in natural language generation. arXiv preprint arXiv:2004.02990","author":"Tevet Guy","year":"2020","unstructured":"Guy Tevet and Jonathan Berant. 2020. Evaluating the evaluation of diversity in natural language generation. arXiv preprint arXiv:2004.02990 (2020)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/358198.358210"},{"key":"e_1_3_2_1_50_1","volume-title":"September","author":"Accessed Trail","year":"2023","unstructured":"Trail of Bits research team. Accessed: September 2023. Mcsema. https:\/\/github.c om\/lifting-bits\/mcsema."},{"key":"e_1_3_2_1_51_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar et al. 2017. Attention is all you need. In Advances in Neural Information Processing Systems. 5998--6008."},{"key":"e_1_3_2_1_52_1","volume-title":"May","author":"Accessed Vector","year":"2024","unstructured":"Vector 35. Accessed: May 2024. Binary Ninja. https:\/\/binary.ninja\/."},{"key":"e_1_3_2_1_53_1","unstructured":"Shuai Wang Pei Wang and Dinghao Wu. 2015. Reassembleable disassembling. In USENIX. 627--642."},{"key":"e_1_3_2_1_54_1","first-page":"5183","article-title":"XcodeGhost: A Large-Scale Apple App Store Malware","volume":"4","author":"Wang Tao","year":"2016","unstructured":"Tao Wang, Jun Liu, Xiaoning Zhang, Kehuan Zhang, et al. 2016. XcodeGhost: A Large-Scale Apple App Store Malware. IEEE Access 4 (2016), 5183--5191.","journal-title":"IEEE Access"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Xuejun Yang Yang Chen Eric Eide and John Regehr. 2011. Finding and understanding bugs in C compilers. In PLDI. 283--294.","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Xinyuan Zhang Yi Yang Siyang Yuan et al. 2019. Syntax-infused variational autoencoder for text generation. arXiv preprint arXiv:1906.02181 (2019).","DOI":"10.18653\/v1\/P19-1199"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210080"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:00:57Z","timestamp":1755842457000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":57,"alternative-id":["10.1145\/3658644.3670276","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670276","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}