{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:43:03Z","timestamp":1773247383774,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3696630.3728606","type":"proceedings-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:08:09Z","timestamp":1753729689000},"page":"1183-1187","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["BinPool: A Dataset of Vulnerabilities for Binary Security Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5950-8245","authenticated-orcid":false,"given":"Sima","family":"Arasteh","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1749-4501","authenticated-orcid":false,"given":"Georgios","family":"Nikitopoulos","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, New Hampshire, USA"},{"name":"University of Thessaly, Thessaly, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9211-6224","authenticated-orcid":false,"given":"Wei-Cheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, New Hampshire, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4000-1193","authenticated-orcid":false,"given":"Nicolaas","family":"Weideman","sequence":"additional","affiliation":[{"name":"USC Information Sciences Institute, Los Angeles, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2374-9830","authenticated-orcid":false,"given":"Aaron","family":"Portnoy","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, New Hampshire, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2879-0932","authenticated-orcid":false,"given":"Mukund","family":"Raghothaman","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7698-8041","authenticated-orcid":false,"given":"Christophe","family":"Hauser","sequence":"additional","affiliation":[{"name":"Dartmouth College, Hanover, New Hampshire, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,7,28]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00088-4"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC63791.2024.00087"},{"key":"e_1_3_2_2_3_1","volume-title":"Debian security tracker. https:\/\/security-tracker.debian.org\/","author":"Team Debian Security","year":"2025","unstructured":"Debian Security Team. Debian security tracker. https:\/\/security-tracker.debian.org\/, 2025. Accessed: 2025-01-13."},{"key":"e_1_3_2_2_4_1","volume-title":"IEEE","author":"Ding Steven HH","year":"2019","unstructured":"Steven HH Ding, Benjamin CM Fung, and Philippe Charland. Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In 2019 ieee symposium on security and privacy (sp), pages 472\u2013489. IEEE, 2019."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275524"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857720"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437533"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534380"},{"key":"e_1_3_2_2_13_1","volume-title":"May","author":"Marjamaki D.","year":"2007","unstructured":"D. Marjamaki. Cppcheck. http:\/\/cppcheck.sourceforge.io\/, May 2007. Accessed: 2025-01-13."},{"key":"e_1_3_2_2_14_1","volume-title":"Juliet test suite v1. 2 for c\/c++ user guide. no","author":"Meade FGG","year":"2012","unstructured":"FGG Meade. Juliet test suite v1. 2 for c\/c++ user guide. no. December, 2012."},{"key":"e_1_3_2_2_15_1","first-page":"742","volume-title":"2024 IEEE\/ACM 21st International Conference on Mining Software Repositories (MSR)","author":"Ni Chao","unstructured":"Chao Ni, Liyu Shen, Xiaohu Yang, Yan Zhu, and Shaohua Wang. Megavul: Ac\/c++ vulnerability dataset with comprehensive code representations. In 2024 IEEE\/ACM 21st International Conference on Mining Software Repositories (MSR), pages 738\u2013742. IEEE, 2024."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473122"},{"key":"e_1_3_2_2_17_1","volume-title":"National vulnerability database (nvd)","author":"National Institute of Standards and Technology (NIST).","year":"2023","unstructured":"National Institute of Standards and Technology (NIST). National vulnerability database (nvd), 2023. https:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC55274.2022.00029"},{"key":"e_1_3_2_2_19_1","first-page":"724","volume-title":"2015 IEEE Symposium on Security and Privacy","author":"Pewny Jannik","unstructured":"Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, and Thorsten Holz. Cross-architecture bug search in binary executables. In 2015 IEEE Symposium on Security and Privacy, pages 709\u2013724. IEEE, 2015."},{"key":"e_1_3_2_2_20_1","volume-title":"Debian package tracker - snapshot service","author":"Project Debian","year":"2023","unstructured":"Debian Project. Debian package tracker - snapshot service, 2023. https:\/\/snapshot.debian.org\/."},{"key":"e_1_3_2_2_21_1","first-page":"157","volume-title":"2016 IEEE symposium on security and privacy (SP)","author":"Shoshitaishvili Yan","unstructured":"Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, et al. Sok:(state of) the art of war: Offensive techniques in binary analysis. In 2016 IEEE symposium on security and privacy (SP), pages 138\u2013157. IEEE, 2016."},{"key":"e_1_3_2_2_22_1","volume-title":"Genius: Generic neural shape analysis","author":"Song Yunlong","year":"2019","unstructured":"Yunlong Song. Genius: Generic neural shape analysis, 2019. https:\/\/github.com\/Yunlongs\/Genius."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534367"},{"key":"e_1_3_2_2_24_1","unstructured":"David A. Wheeler. Flawfinder. https:\/\/github.com\/david-a-wheeler\/flawfinder. Accessed: 2025-01-13."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"}],"event":{"name":"FSE Companion '25: 33rd ACM International Conference on the Foundations of Software Engineering","location":"Clarion Hotel Trondheim Trondheim Norway","acronym":"FSE Companion '25","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696630.3728606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:08:37Z","timestamp":1753729717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696630.3728606"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":25,"alternative-id":["10.1145\/3696630.3728606","10.1145\/3696630"],"URL":"https:\/\/doi.org\/10.1145\/3696630.3728606","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-07-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}