{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T20:10:08Z","timestamp":1755893408597,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Cyberus Technology GmbH","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"nicos AG"},{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["13FH101KB1"],"award-info":[{"award-number":["13FH101KB1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,19]]},"DOI":"10.1145\/3714393.3726003","type":"proceedings-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T18:38:47Z","timestamp":1749062327000},"page":"179-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Padding Matters - Exploring Function Detection in PE Files: Data\/Toolset paper"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8298-7895","authenticated-orcid":false,"given":"Raphael","family":"Springer","sequence":"first","affiliation":[{"name":"Institute for Internet Security, Westphalian University of Applied Sciences, Gelsenkirchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0514-9535","authenticated-orcid":false,"given":"Alexander","family":"Schmitz","sequence":"additional","affiliation":[{"name":"Institute for Internet Security, Westphalian University of Applied Sciences, Gelsenkirchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7623-1038","authenticated-orcid":false,"given":"Artur","family":"Leinweber","sequence":"additional","affiliation":[{"name":"Institute for Internet Security, Westphalian University of Applied Sciences, Gelsenkirchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0908-0038","authenticated-orcid":false,"given":"Tobias","family":"Urban","sequence":"additional","affiliation":[{"name":"Institute for Internet Security, Westphalian University of Applied Sciences, Gelsenkirchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5523-4467","authenticated-orcid":false,"given":"Christian","family":"Dietrich","sequence":"additional","affiliation":[{"name":"Institute for Internet Security, Westphalian University of Applied Sciences, Gelsenkirchen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ghidra Software Reverse Engineering Framework. https:\/\/ghidra-sre.org\/","author":"National Security Agency.","year":"2022","unstructured":"National Security Agency. Ghidra Software Reverse Engineering Framework. https:\/\/ghidra-sre.org\/, 2022."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359825"},{"key":"e_1_3_2_1_3_1","volume-title":"Nucleus function detector. https:\/\/bitbucket.org\/vusec\/nucleus\/src\/e3ab49db579adbdd8451171e980e9b8f8a546a3c\/","author":"Andriesse Dennis","year":"2018","unstructured":"Dennis Andriesse. Nucleus function detector. https:\/\/bitbucket.org\/vusec\/nucleus\/src\/e3ab49db579adbdd8451171e980e9b8f8a546a3c\/, 2018."},{"key":"e_1_3_2_1_4_1","first-page":"583","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Andriesse Dennis","year":"2016","unstructured":"Dennis Andriesse, Xi Chen, Victor Van Der Veen, Asia Slowinska, and Herbert Bos. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries. In 25th USENIX Security Symposium (USENIX Security 16), pages 583--600, 2016."},{"key":"e_1_3_2_1_5_1","first-page":"177","volume-title":"Herbert Bos. Compiler-Agnostic Function Detection in Binaries. In 2017 IEEE European Symposium on Security and Privacy (EuroS P)","author":"Andriesse Dennis","year":"2017","unstructured":"Dennis Andriesse, Asia Slowinska, and Herbert Bos. Compiler-Agnostic Function Detection in Binaries. In 2017 IEEE European Symposium on Security and Privacy (EuroS P), page 177--189, Apr 2017."},{"key":"e_1_3_2_1_6_1","first-page":"3971","volume-title":"Konrad Rieck. Dos and Dontextquoterightts of Machine Learning in Computer Security. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Arp Daniel","year":"2022","unstructured":"Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. Dos and Dontextquoterightts of Machine Learning in Computer Security. In 31st USENIX Security Symposium (USENIX Security 22), pages 3971--3988, Boston, MA, August 2022. USENIX Association."},{"key":"e_1_3_2_1_7_1","first-page":"845","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Bao Tiffany","year":"2014","unstructured":"Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. BYTEWEIGHT: Learning to Recognize Functions in Binary Code. In 23rd USENIX Security Symposium (USENIX Security 14), page 845--860, 2014."},{"key":"e_1_3_2_1_8_1","unstructured":"Daniel Johannes Plohmann. Classification Characterization and Contextualization of Windows Malware using Static Behavior and Similarity Analysis. PhD thesis Rheinische Friedrich-Wilhelms-Universit\u00e4t Bonn July 2022."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_10_1","first-page":"364","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18","author":"Guo Wenbo","year":"2018","unstructured":"Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, and Xinyu Xing. LEMNA: Explaining Deep Learning based Security Applications. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18, page 364--379, New York, NY, USA, Oct 2018. Association for Computing Machinery."},{"key":"e_1_3_2_1_11_1","volume-title":"A survey of binary code similarity. ACM Computing Surveys (CSUR), 54(3):1--38","author":"Haq Irfan Ul","year":"2021","unstructured":"Irfan Ul Haq and Juan Caballero. A survey of binary code similarity. ACM Computing Surveys (CSUR), 54(3):1--38, 2021."},{"volume-title":"Intel\u00ae 64 and IA-32 Architectures Optimization Reference Manual. https:\/\/www.intel.com\/content\/dam\/doc\/manual\/64-ia-32-architectures-optimization-manual.pdf","year":"2012","key":"e_1_3_2_1_12_1","unstructured":"Intel. Intel\u00ae 64 and IA-32 Architectures Optimization Reference Manual. https:\/\/www.intel.com\/content\/dam\/doc\/manual\/64-ia-32-architectures-optimization-manual.pdf, 2012."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/portal.av-atlas.org\/malware","author":"Security The Independent","year":"2024","unstructured":"AV-TEST-The Independent IT-Security. AV-ATLAS - Malware & PUA. https:\/\/portal.av-atlas.org\/malware, 2024."},{"key":"e_1_3_2_1_14_1","first-page":"1419","volume-title":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2023","author":"Kim Soomin","year":"2023","unstructured":"Soomin Kim, Hyungseok Kim, and Sang Kil Cha. Funprobe: Probing functions from binary code through probabilistic analysis. In Satish Chandra, Kelly Blincoe, and Paolo Tonella, editors, Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2023, San Francisco, CA, USA, December 3--9, 2023, pages 1419--1430. ACM, 2023."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488018"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00046"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23112"},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/github.com\/danielplohmann\/smda","author":"Plohmann Daniel","year":"2024","unstructured":"Daniel Plohmann. SMDA. https:\/\/github.com\/danielplohmann\/smda, 2024."},{"key":"e_1_3_2_1_19_1","volume-title":"July","author":"Quintero Bernardo","year":"2024","unstructured":"Bernardo Quintero, Alex Berry, Ilfak Guilfanov, and Vijay Bolina. Scaling Up Malware Analysis with Gemini 1.5 Flash. https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/scaling-up-malware-analysis-with-gemini, July 2024."},{"key":"e_1_3_2_1_20_1","volume-title":"https:\/\/hex-rays.com\/ida-pro\/","author":"Rays Hex","year":"2022","unstructured":"Hex Rays. IDA Pro. https:\/\/hex-rays.com\/ida-pro\/, 2022."},{"key":"e_1_3_2_1_21_1","first-page":"798","volume-title":"Proceedings of the 23rd national conference on Artificial intelligence -","volume":"2","author":"Rosenblum Nathan","year":"2008","unstructured":"Nathan Rosenblum, Xiaojin Zhu, Barton Miller, and Karen Hunt. Learning to analyze binary computer code. In Proceedings of the 23rd national conference on Artificial intelligence - Volume 2, AAAI'08, page 798--804, Chicago, Illinois, Jul 2008. AAAI Press."},{"key":"e_1_3_2_1_22_1","first-page":"611","volume-title":"Reza Moazzezi. Recognizing Functions in Binaries with Neural Networks. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Richard Shin Eui Chul","year":"2015","unstructured":"Eui Chul Richard Shin, Dawn Song, and Reza Moazzezi. Recognizing Functions in Binaries with Neural Networks. In 24th USENIX Security Symposium (USENIX Security 15), page 611--626, 2015."},{"volume-title":"Conti v3. https:\/\/github.com\/vxunderground\/MalwareSourceCode\/blob\/main\/Win32\/Ransomware\/Win32.Conti.c.7z","year":"2022","key":"e_1_3_2_1_23_1","unstructured":"vx-underground.org. Conti v3. https:\/\/github.com\/vxunderground\/MalwareSourceCode\/blob\/main\/Win32\/Ransomware\/Win32.Conti.c.7z, 2022."},{"key":"e_1_3_2_1_24_1","first-page":"2709","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Yu Sheng","year":"2022","unstructured":"Sheng Yu, Yu Qu, Xunchao Hu, and Heng Yin. DeepDi: Learning a relational graph convolutional network model on instructions for fast and accurate disassembly. In 31st USENIX Security Symposium (USENIX Security 22), pages 2709--2725, Boston, MA, August 2022. USENIX Association."}],"event":{"name":"CODASPY '25: Fifteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Pittsburgh PA USA","acronym":"CODASPY '25"},"container-title":["Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714393.3726003","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3714393.3726003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:55:15Z","timestamp":1755892515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714393.3726003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":24,"alternative-id":["10.1145\/3714393.3726003","10.1145\/3714393"],"URL":"https:\/\/doi.org\/10.1145\/3714393.3726003","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"2025-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}