{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T08:02:25Z","timestamp":1768032145413,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1804400"],"award-info":[{"award-number":["2019YFB1804400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council, University Grants Committee, Hong Kong SAR","award":["14209720"],"award-info":[{"award-number":["14209720"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695502","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"1269-1281","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5476-8996","authenticated-orcid":false,"given":"Zirui","family":"Song","sequence":"first","affiliation":[{"name":"Shenzhen Research Institute, The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8696-2624","authenticated-orcid":false,"given":"YuTong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Shenzhen Research Institute, The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4150-668X","authenticated-orcid":false,"given":"Shuaike","family":"Dong","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1611-6804","authenticated-orcid":false,"given":"Ke","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shenzhen Research Institute, The Chinese Universiry of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1519-0057","authenticated-orcid":false,"given":"Kehuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shenzhen Research Institute, The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"National Security Agency. 2019. Ghidra. https:\/\/ghidra-sre.org\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/390013.808479"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3331739"},{"key":"e_1_3_2_1_4_1","volume-title":"International conference on learning representations.","author":"Antoniou Antreas","year":"2018","unstructured":"Antreas Antoniou, Harrison Edwards, and Amos Storkey. 2018. How to train your MAML. In International conference on learning representations."},{"key":"e_1_3_2_1_5_1","volume-title":"Fish Wang, and Chitta Baral.","author":"Banerjee Pratyay","year":"2021","unstructured":"Pratyay Banerjee, Kuntal Kumar Pal, Fish Wang, and Chitta Baral. 2021. Variable Name Recovery in Decompiled Binary Code using Constrained Masked Language Modeling. arXiv:2103.12801"},{"key":"e_1_3_2_1_6_1","volume-title":"Learning to few-shot learn across diverse natural language classification tasks. arXiv preprint arXiv:1911.03863","author":"Bansal Trapit","year":"2019","unstructured":"Trapit Bansal, Rishikesh Jha, and Andrew McCallum. 2019. Learning to few-shot learn across diverse natural language classification tasks. arXiv preprint arXiv:1911.03863 (2019)."},{"key":"e_1_3_2_1_7_1","volume-title":"Few-shot text classification with distributional signatures. arXiv preprint arXiv:1908.06039","author":"Bao Yujia","year":"2019","unstructured":"Yujia Bao, Menghua Wu, Shiyu Chang, and Regina Barzilay. 2019. Few-shot text classification with distributional signatures. arXiv preprint arXiv:1908.06039 (2019)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.10.114"},{"key":"e_1_3_2_1_9_1","unstructured":"Binaryninja 2022. Binary Ninja. https:\/\/binary.ninja\/."},{"key":"e_1_3_2_1_10_1","first-page":"15787","article-title":"Flex: Unifying evaluation for few-shot nlp","volume":"34","author":"Bragg Jonathan","year":"2021","unstructured":"Jonathan Bragg, Arman Cohan, Kyle Lo, and Iz Beltagy. 2021. Flex: Unifying evaluation for few-shot nlp. Advances in Neural Information Processing Systems 34 (2021), 15787--15800.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2507848"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_14_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Chen Qibin","year":"2022","unstructured":"Qibin Chen, Jeremy Lacomis, Edward J Schwartz, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu. 2022. Augmenting decompiler output with learned variable names and types. In 31st USENIX Security Symposium (USENIX Security 22). 4327--4343."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00114"},{"key":"e_1_3_2_1_16_1","volume-title":"Neural Nets Can Learn Function Type Signatures From Binaries. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Chua Zheng Leong","year":"2017","unstructured":"Zheng Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang. 2017. Neural Nets Can Learn Function Type Signatures From Binaries. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 99--116."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428293"},{"key":"e_1_3_2_1_18_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_20_1","volume-title":"DeepBinDiff: Learning program-wide code representations for binary diffing. eScholarship","author":"Duan Yue","unstructured":"Yue Duan, Xuezixiang Li, Jinghan Wang, and Heng Yin. 2020. DeepBinDiff: Learning program-wide code representations for binary diffing. eScholarship, University of California."},{"key":"e_1_3_2_1_21_1","volume-title":"FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Elsabagh Mohamed","year":"2020","unstructured":"Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou, Chaoshun Zuo, Qingchuan Zhao, and Zhiqiang Lin. 2020. FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/elsabagh"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464804"},{"key":"e_1_3_2_1_23_1","volume-title":"Mohammed Ali Al-Garadi, and Abeed Sarker","author":"Ge Yao","year":"2022","unstructured":"Yao Ge, Yuting Guo, Yuan-Chi Yang, Mohammed Ali Al-Garadi, and Abeed Sarker. 2022. Few-shot learning for medical text: A systematic review. arXiv preprint arXiv:2204.14081 (2022)."},{"key":"e_1_3_2_1_24_1","unstructured":"GNU. 2022. GNU Coreutils. https:\/\/www.gnu.org\/software\/coreutils\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.007"},{"key":"e_1_3_2_1_26_1","volume-title":"International Conference on Learning Representations.","author":"Hanxiao Liu","year":"2019","unstructured":"Liu Hanxiao, Simonyan Karen, and Yang Yiming. 2019. DARTS: Differentiable architecture search. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243866"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196330"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560612"},{"key":"e_1_3_2_1_30_1","volume-title":"zip: Compressing text classification models. arXiv preprint arXiv:1612.03651","author":"Joulin Armand","year":"2016","unstructured":"Armand Joulin, Edouard Grave, Piotr Bojanowski, Matthijs Douze, H\u00e9rve J\u00e9gou, and Tomas Mikolov. 2016. Fasttext. zip: Compressing text classification models. arXiv preprint arXiv:1612.03651 (2016)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00064"},{"key":"e_1_3_2_1_32_1","volume-title":"TIE: Principled reverse engineering of types in binary programs.","author":"Lee JongHyup","year":"2011","unstructured":"JongHyup Lee, Thanassis Avgerinos, and David Brumley. 2011. TIE: Principled reverse engineering of types in binary programs. (2011)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484587"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00948"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2788959.2788964"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948358"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002491"},{"key":"e_1_3_2_1_39_1","volume-title":"DIMVA 2019, Gothenburg, Sweden, June 19--20, 2019, Proceedings 16","author":"Maier Alwin","year":"2019","unstructured":"Alwin Maier, Hugo Gascon, Christian Wressnegger, and Konrad Rieck. 2019. Typeminer: Recovering types in binary programs using machine learning. In Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19--20, 2019, Proceedings 16. Springer, 288--308."},{"key":"e_1_3_2_1_40_1","volume-title":"Learned in translation: Contextualized word vectors. Advances in neural information processing systems 30","author":"McCann Bryan","year":"2017","unstructured":"Bryan McCann, James Bradbury, Caiming Xiong, and Richard Socher. 2017. Learned in translation: Contextualized word vectors. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931047"},{"key":"e_1_3_2_1_42_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv:1301.3781"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3613288"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908119"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00269"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468607"},{"key":"e_1_3_2_1_47_1","volume-title":"Trex: Learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680","author":"Pei Kexin","year":"2020","unstructured":"Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, and Baishakhi Ray. 2020. Trex: Learning execution semantics from micro-traces for binary similarity. arXiv preprint arXiv:2012.08680 (2020)."},{"key":"e_1_3_2_1_48_1","volume-title":"True few-shot learning with language models. Advances in neural information processing systems 34","author":"Perez Ethan","year":"2021","unstructured":"Ethan Perez, Douwe Kiela, and Kyunghyun Cho. 2021. True few-shot learning with language models. Advances in neural information processing systems 34 (2021), 11054--11070."},{"key":"e_1_3_2_1_49_1","unstructured":"Hex-Rays SA. 2021. IDA Pro. https:\/\/www.hex-rays.com\/products\/ida."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"e_1_3_2_1_51_1","first-page":"1","article-title":"Firmalice-Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware","volume":"1","author":"Shoshitaishvili Yan","year":"2015","unstructured":"Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna. 2015. Firmalice-Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.. In NDSS, Vol. 1. 1--1.","journal-title":"NDSS"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40031-020-00501-5"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.10.117"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54807-9_4"},{"key":"e_1_3_2_1_55_1","unstructured":"Radare2 Team. 2017. Radare2 GitHub repository. https:\/\/github.com\/radare\/radare2."},{"key":"e_1_3_2_1_56_1","unstructured":"Oriol Vinyals Charles Blundell Timothy Lillicrap Daan Wierstra et al. 2016. Matching networks for one shot learning. Advances in neural information processing systems 29 (2016)."},{"key":"e_1_3_2_1_57_1","volume-title":"Generalizing from a few examples: A survey on few-shot learning. ACM computing surveys (csur) 53, 3","author":"Wang Yaqing","year":"2020","unstructured":"Yaqing Wang, Quanming Yao, James T Kwok, and Lionel M Ni. 2020. Generalizing from a few examples: A survey on few-shot learning. ACM computing surveys (csur) 53, 3 (2020), 1--34."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00672"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176335"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3056139"},{"key":"e_1_3_2_1_61_1","volume-title":"Bill Yuchen Lin, and Xiang Ren","author":"Ye Qinyuan","year":"2021","unstructured":"Qinyuan Ye, Bill Yuchen Lin, and Xiang Ren. 2021. Crossfit: A few-shot learning challenge for cross-task generalization in nlp. arXiv preprint arXiv:2104.08835 (2021)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/3615924.3615941"},{"key":"e_1_3_2_1_63_1","volume-title":"Meta-learning for few-shot natural language processing: A survey. arXiv preprint arXiv:2007.09604","author":"Yin Wenpeng","year":"2020","unstructured":"Wenpeng Yin. 2020. Meta-learning for few-shot natural language processing: A survey. arXiv preprint arXiv:2007.09604 (2020)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.85"},{"key":"e_1_3_2_1_65_1","unstructured":"Naville Zhang. 2017. Hikari - An improvement over Obfuscator LLVM. https:\/\/github.com\/HikariObfuscator\/Hikari."},{"key":"e_1_3_2_1_66_1","volume-title":"Improving few-shot text classification via pretrained language representations. arXiv preprint arXiv:1908.08788","author":"Zhang Ningyu","year":"2019","unstructured":"Ningyu Zhang, Zhanlin Sun, Shumin Deng, Jiaoyan Chen, and Huajun Chen. 2019. Improving few-shot text classification via pretrained language representations. arXiv preprint arXiv:1908.08788 (2019)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00051"},{"key":"e_1_3_2_1_68_1","unstructured":"Fan Zhou Dongxia Wang Yanhai Xiong Kun Sun and Wenhai Wang. [n. d.]. Famd: A Few-Shot Android Malware Family Detection Framework. Available at SSRN 4727003 ([n. d.])."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102691"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","location":"Sacramento CA USA","acronym":"ASE '24","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:19Z","timestamp":1750291579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":69,"alternative-id":["10.1145\/3691620.3695502","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695502","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}