{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:48:10Z","timestamp":1770673690484,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T00:00:00Z","timestamp":1750896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,26]]},"DOI":"10.1145\/3727582.3728687","type":"proceedings-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T10:50:20Z","timestamp":1749120620000},"page":"55-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Designing and Optimizing Alignment Datasets for IoT Security: A Synergistic Approach with Static Analysis Insights"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3850-2976","authenticated-orcid":false,"given":"Ahmad","family":"Al-Zuraiqi","sequence":"first","affiliation":[{"name":"Queen's University Belfast, Belfast, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6367-9274","authenticated-orcid":false,"given":"Des","family":"Greer","sequence":"additional","affiliation":[{"name":"Queen's University Belfast, Belfast, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"A. Al-Zuraiqi and D. Greer \"Evaluating Alignment Techniques for Enhancing LLM Performance in a Closed-Domain Application: a RAG Bench-Marking Study \" in Proceedings of the 2024 International Conference on Machine Learning and Applications (ICMLA) pp. 180--189 2024.","DOI":"10.1109\/ICMLA61862.2024.00180"},{"key":"e_1_3_2_1_2_1","volume-title":"Static Analysis of IoT Firmware: Identifying Systemic Vulnerabilities with RMMIDL,\" in Proceedings of the IEEE\/ACM 6th Engineering and Cybersecurity of Critical Systems (EnCyCriS)","author":"Al-Zuraiqi A.","year":"2025","unstructured":"A. Al-Zuraiqi and D. Greer, \"Static Analysis of IoT Firmware: Identifying Systemic Vulnerabilities with RMMIDL,\" in Proceedings of the IEEE\/ACM 6th Engineering and Cybersecurity of Critical Systems (EnCyCriS), Ottawa, Canada, Apr. 2025."},{"key":"e_1_3_2_1_3_1","first-page":"95","volume-title":"A Large-Scale Analysis of the Security of Embedded Firmwares,\" in Proceedings of the 23rd USENIX Security Symposium","author":"Costin A.","year":"2014","unstructured":"A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti, \"A Large-Scale Analysis of the Security of Embedded Firmwares,\" in Proceedings of the 23rd USENIX Security Symposium, pp. 95--110, 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"Firmware Analysis Tool,\" Online Resource","author":"Heffner Bazad C.","year":"2021","unstructured":"C. Heffner Bazad, \"Binwalk: Firmware Analysis Tool,\" Online Resource, 2021. [Online]. Available: https:\/\/github.com\/ReFirmLabs\/binwalk"},{"key":"e_1_3_2_1_5_1","volume-title":"A Tool for Exploring Firmware Filesystems,\" Online Resource","author":"Smith J.","year":"2020","unstructured":"J. Smith, \"Firmwalker: A Tool for Exploring Firmware Filesystems,\" Online Resource, 2020. [Online]. Available: https:\/\/github.com\/craigz28\/firmwalker"},{"key":"e_1_3_2_1_6_1","volume-title":"FACT: Firmware Analysis and Comparison Tool,\" Online Resource","author":"Wang T.","year":"2019","unstructured":"T. Wang et al., \"FACT: Firmware Analysis and Comparison Tool,\" Online Resource, 2019. [Online]. Available: https:\/\/github.com\/fkie-cad\/FACT_core"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21051809"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3103725"},{"key":"e_1_3_2_1_9_1","volume-title":"Available: https:\/\/cve.mitre.org [Accessed","year":"2023","unstructured":"MITRE, \"Common Vulnerabilities and Exposures (CVE),\" Online Resource, 2023. [Online]. Available: https:\/\/cve.mitre.org [Accessed: Jan. 15, 2023]."},{"key":"e_1_3_2_1_10_1","volume-title":"Available: https:\/\/cwe.mitre.org [Accessed","year":"2023","unstructured":"MITRE, \"Common Weakness Enumeration (CWE),\" Online Resource, 2023. [Online]. Available: https:\/\/cwe.mitre.org [Accessed: Jan. 15, 2023]."},{"key":"e_1_3_2_1_11_1","volume-title":"Available: https:\/\/capec.mitre.org [Accessed","year":"2023","unstructured":"\"Common Attack Pattern Enumeration and Classification (CAPEC),\" Online Resource, 2023. [Online]. Available: https:\/\/capec.mitre.org [Accessed: Jan. 15, 2023]."},{"key":"e_1_3_2_1_12_1","volume-title":"A Firmware-Centric Journey,\" Proceedings of the 33rd USENIX Security Symposium","author":"Nino N.","year":"2024","unstructured":"N. Nino, R. Lu, W. Zhou, K. H. Lee, Z. Zhao, L. Guan, \"Unveiling IoT Security in Reality: A Firmware-Centric Journey,\" Proceedings of the 33rd USENIX Security Symposium, 2024."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"e_1_3_2_1_14_1","volume-title":"Available: https:\/\/owasp.org\/www-project-internet-of-things [Accessed","author":"Things Project WASP","year":"2023","unstructured":"\"OWASP Internet of Things Project,\" Online Resource, 2018. [Online]. Available: https:\/\/owasp.org\/www-project-internet-of-things [Accessed: Jan. 15, 2023]."},{"key":"e_1_3_2_1_15_1","volume-title":"Device Metadata Archive,\" Online Resource","year":"2023","unstructured":"\"WikiDevi: Device Metadata Archive,\" Online Resource, 2023. [Online]. Available: https:\/\/web.archive.org [Accessed: Jan. 15, 2023]."},{"key":"e_1_3_2_1_16_1","volume-title":"Contrastive preference optimization: Pushing the boundaries of LLM performance in machine translation,\" arXiv preprint arXiv:2401.08417","author":"Xu H.","year":"2024","unstructured":"H. Xu, A. Sharaf, Y. Chen, W. Tan, L. Shen, B. Van Durme, and Y. J. Kim, \"Contrastive preference optimization: Pushing the boundaries of LLM performance in machine translation,\" arXiv preprint arXiv:2401.08417, 2024."},{"key":"e_1_3_2_1_17_1","first-page":"53728","article-title":"Direct preference optimization: Your language model is secretly a reward model","volume":"36","author":"Rafailov R.","year":"2023","unstructured":"R. Rafailov, A. Sharma, E. Mitchell, C. D. Manning, S. Ermon, and C. Finn, \"Direct preference optimization: Your language model is secretly a reward model,\" in Advances in Neural Information Processing Systems, vol. 36, pp. 53728--53741, 2023.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_18_1","volume-title":"KTO: Model alignment as prospect theoretic optimization,\" arXiv preprint arXiv:2402.01306","author":"Ethayarajh K.","year":"2024","unstructured":"K. Ethayarajh, W. Xu, N. Muennighoff, D. Jurafsky, and D. Kiela, \"KTO: Model alignment as prospect theoretic optimization,\" arXiv preprint arXiv:2402.01306, 2024."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3379363"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2016.0050"}],"event":{"name":"PROMISE '25: 21st International Conference on Predictive Models and Data Analytics in Software Engineering","location":"Trondheim Norway","acronym":"PROMISE '25","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 21st International Conference on Predictive Models and Data Analytics in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727582.3728687","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727582.3728687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:25:31Z","timestamp":1755973531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727582.3728687"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,26]]},"references-count":20,"alternative-id":["10.1145\/3727582.3728687","10.1145\/3727582"],"URL":"https:\/\/doi.org\/10.1145\/3727582.3728687","relation":{},"subject":[],"published":{"date-parts":[[2025,6,26]]},"assertion":[{"value":"2025-06-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}