{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:58Z","timestamp":1750309558705,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072235"],"award-info":[{"award-number":["62072235"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714723","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:52:18Z","timestamp":1745362338000},"page":"4134-4145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Instruction Vulnerability Prediction for WebAssembly with Semantic Enhanced Code Property Graph"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4750-6516","authenticated-orcid":false,"given":"Bao","family":"Wen","sequence":"first","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3989-1520","authenticated-orcid":false,"given":"Jingjing","family":"Gu","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7912-027X","authenticated-orcid":false,"given":"Hao","family":"Han","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9926-9442","authenticated-orcid":false,"given":"Pengfei","family":"Yu","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2596-8419","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE55969.2022.00036"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2945292.2945305"},{"key":"e_1_3_2_1_3_1","volume-title":"Learning to represent programs with graphs. arXiv preprint arXiv:1711.00740","author":"Allamanis Miltiadis","year":"2017","unstructured":"Miltiadis Allamanis, Marc Brockschmidt, and Mahmoud Khademi. 2017. Learning to represent programs with graphs. arXiv preprint arXiv:1711.00740 (2017)."},{"key":"e_1_3_2_1_4_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Blazytko Tim","year":"2019","unstructured":"Tim Blazytko, Matt Bishop, Cornelius Aschermann, Justin Cappos, Moritz Schl\u00f6gel, Nadia Korshun, Ali Abbasi, Marco Schweighauser, Sebastian Schinzel, Sergej Schumilo, et al. 2019. {GRIMOIRE}: Synthesizing structure while fuzzing. In 28th USENIX Security Symposium (USENIX Security 19). 1985--2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00085"},{"key":"e_1_3_2_1_6_1","volume-title":"How attentive are graph attention networks? arXiv preprint arXiv:2105.14491","author":"Brody Shaked","year":"2021","unstructured":"Shaked Brody, Uri Alon, and Eran Yahav. 2021. How attentive are graph attention networks? arXiv preprint arXiv:2105.14491 (2021)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385968"},{"key":"e_1_3_2_1_8_1","volume-title":"Language models are few-shot learners. arXiv preprint arXiv:2005.14165","author":"Brown Tom B","year":"2020","unstructured":"Tom B Brown. 2020. Language models are few-shot learners. arXiv preprint arXiv:2005.14165 (2020)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103731"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3047756"},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Machine Learning. PMLR, 2244--2253","author":"Cummins Chris","year":"2021","unstructured":"Chris Cummins, Zacharias V Fisches, Tal Ben-Nun, Torsten Hoefler, Michael FP O'Boyle, and Hugh Leather. 2021. Programl: A graph-based program representation for data flow analysis and compiler optimizations. In International Conference on Machine Learning. PMLR, 2244--2253."},{"key":"e_1_3_2_1_12_1","unstructured":"Andrea Di Dio Koen Koning Herbert Bos and Cristiano Giuffrida. 2023. Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks.. In NDSS."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS57955.2024.00059"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85928-2_28"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS47363.2019.00036"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"e_1_3_2_1_18_1","volume-title":"Winona Snapp-Childs, Marlon Pierce, Suresh Marru, J Eric Coulter, Matthew Vaughn, Brian Beck, Nirav Merchant, et al.","author":"Hancock David Y","year":"2021","unstructured":"David Y Hancock, Jeremy Fischer, John Michael Lowe, Winona Snapp-Childs, Marlon Pierce, Suresh Marru, J Eric Coulter, Matthew Vaughn, Brian Beck, Nirav Merchant, et al. 2021. Jetstream2: Accelerating cloud computing via Jetstream. In Practice and Experience in Advanced Research Computing. 1--8."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450138"},{"key":"e_1_3_2_1_20_1","volume-title":"Michael B Sullivan, Zbigniew T Kalbarczyk, Stephen W Keckler, and Ravishankar K Iyer.","author":"Jha Saurabh","year":"2019","unstructured":"Saurabh Jha, Subho Banerjee, Timothy Tsai, Siva KS Hari, Michael B Sullivan, Zbigniew T Kalbarczyk, Stephen W Keckler, and Ravishankar K Iyer. 2019. Ml-based fault injection for autonomous vehicles: A case for bayesian fault injection. In 2019 49th annual IEEE\/IFIP international conference on dependable systems and networks (DSN). IEEE, 112--124."},{"key":"e_1_3_2_1_21_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 82--87","author":"Jiao Jiajia","year":"2021","unstructured":"Jiajia Jiao, Debjit Pal, Chenhui Deng, and Zhiru Zhang. 2021. Glaive: Graph learning assisted instruction vulnerability estimation. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 82--87."},{"key":"e_1_3_2_1_22_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598104"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3185970"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3221316"},{"key":"e_1_3_2_1_26_1","first-page":"1566","article-title":"Identifying SDC-causing Instructions based on Random forests algorithm","volume":"13","author":"Liu LiPing","year":"2019","unstructured":"LiPing Liu, LinLin Ci, Wei Liu, and Hui Yang. 2019. Identifying SDC-causing Instructions based on Random forests algorithm. KSII Transactions on Internet and Information Systems (TIIS), Vol. 13, 3 (2019), 1566--1582.","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.13"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936893"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTS50974.2021.9441056"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2023.3234771"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"e_1_3_2_1_32_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Narayan Shravan","year":"2021","unstructured":"Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, et al. 2021. Swivel: Hardening {WebAssembly} against spectre. In 30th USENIX Security Symposium (USENIX Security 21). 1433--1450."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488474"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114595"},{"key":"e_1_3_2_1_35_1","volume-title":"Silent Data Corruptions: Microarchitectural Perspectives","author":"Papadimitriou George","year":"2023","unstructured":"George Papadimitriou and Dimitris Gizopoulos. 2023. Silent Data Corruptions: Microarchitectural Perspectives. IEEE Trans. Comput. (2023)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3024853"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678776"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583235"},{"key":"e_1_3_2_1_39_1","volume-title":"FAIL: An open and versatile fault-injection framework for the assessment of software-implemented hardware fault tolerance. In 2015 11th european dependable computing conference (edcc)","author":"Schirmeier Horst","year":"2015","unstructured":"Horst Schirmeier, Martin Hoffmann, Christian Dietrich, Michael Lenz, Daniel Lohmann, and Olaf Spinczyk. 2015. FAIL: An open and versatile fault-injection framework for the assessment of software-implemented hardware fault tolerance. In 2015 11th european dependable computing conference (edcc). IEEE, 245--255."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3637650"},{"key":"e_1_3_2_1_41_1","volume-title":"WaDec: Decompile WebAssembly Using Large Language Model. arXiv preprint arXiv:2406.11346","author":"She Xinyu","year":"2024","unstructured":"Xinyu She, Yanjie Zhao, and Haoyu Wang. 2024. WaDec: Decompile WebAssembly Using Large Language Model. arXiv preprint arXiv:2406.11346 (2024)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00051"},{"key":"e_1_3_2_1_43_1","volume-title":"Le Chen, Nesreen K Ahmed, and Ali Jannesari.","author":"TehraniJamsaz Ali","year":"2024","unstructured":"Ali TehraniJamsaz, Quazi Ishtiaque Mahmud, Le Chen, Nesreen K Ahmed, and Ali Jannesari. 2024. Perfograph: A numerical aware program graph representation for performance optimization and program analysis. Advances in Neural Information Processing Systems, Vol. 36 (2024)."},{"key":"e_1_3_2_1_44_1","volume-title":"Instruction-level Reliability Improvement for Embedded Systems. In 2020 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS). IEEE, 1--5.","author":"Tekgul Hakan","year":"2020","unstructured":"Hakan Tekgul and Ozcan Ozturk. 2020. Instruction-level Reliability Improvement for Embedded Systems. In 2020 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS). IEEE, 1--5."},{"key":"e_1_3_2_1_45_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Veli\u010dkovi\u0107 Petar","year":"2017","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_1_46_1","volume-title":"Multi-hop attention graph neural network. arXiv preprint arXiv:2009.14332","author":"Wang Guangtao","year":"2020","unstructured":"Guangtao Wang, Rex Ying, Jing Huang, and Jure Leskovec. 2020b. Multi-hop attention graph neural network. arXiv preprint arXiv:2009.14332 (2020)."},{"key":"e_1_3_2_1_47_1","volume-title":"ICLR workshop on representation learning on graphs and manifolds.","author":"Wang Minjie Yu","year":"2019","unstructured":"Minjie Yu Wang. 2019. Deep graph library: Towards efficient and scalable deep learning on graphs. In ICLR workshop on representation learning on graphs and manifolds."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC55918.2022.00028"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428205"},{"key":"e_1_3_2_1_50_1","volume-title":"IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN","author":"Xu Xin","year":"2012","unstructured":"Xin Xu and Man-Lap Li. 2012. Understanding soft error propagation using efficient vulnerability-driven fault injection. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012). IEEE, 1--12."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3572838"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476170"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048147.2048224"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546066"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Xiangwei Zhang Junjie Wang Xiaoning Du and Shuang Liu. 2024. WasmCFuzz: Structure-aware Fuzzing for Wasm Compilers. In Proceedings of the 2024 ACM\/IEEE 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) and 2024 IEEE\/ACM Second International Workshop on Software Vulnerability. 1--5.","DOI":"10.1145\/3643662.3643959"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:57Z","timestamp":1750295937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":55,"alternative-id":["10.1145\/3696410.3714723","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714723","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}