{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T06:04:20Z","timestamp":1732341860550,"version":"3.28.0"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1016\/j.ins.2024.121605","type":"journal-article","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T17:42:35Z","timestamp":1730396555000},"page":"121605","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["UniBin: Assembly semantic-enhanced binary vulnerability detection without disassembly"],"prefix":"10.1016","volume":"691","author":[{"given":"Li","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5748-5438","authenticated-orcid":false,"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8624-8557","authenticated-orcid":false,"given":"Xunzhi","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2024.121605_br0010","series-title":"Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering (ICKSE)","first-page":"491","article-title":"Semhunt: identifying vulnerability type with double validation in binary code","author":"Li","year":"2017"},{"key":"10.1016\/j.ins.2024.121605_br0020","series-title":"Proceedings of the 2nd International Conference on Algorithms, Computing and Artificial Intelligence (ACAI)","first-page":"160","article-title":"Recurrent neural network based binary code vulnerability detection","author":"Zheng","year":"2019"},{"key":"10.1016\/j.ins.2024.121605_br0030","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1145\/2980983.2908126","article-title":"Statistical similarity of binaries","volume":"51","author":"David","year":"2016","journal-title":"ACM SIGPLAN Not."},{"key":"10.1016\/j.ins.2024.121605_br0040","series-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (ASE)","first-page":"896","article-title":"Vulseeker: a semantic learning based vulnerability seeker for cross-platform binary","author":"Gao","year":"2018"},{"key":"10.1016\/j.ins.2024.121605_br0050","series-title":"Proceedings of the 2013 USENIX Annual Technical Conference (USENIX ATC 13)","first-page":"187","article-title":"{MutantX-S}: scalable malware clustering based on static features","author":"Hu","year":"2013"},{"key":"10.1016\/j.ins.2024.121605_br0060","series-title":"Proceedings of the 3rd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","first-page":"129","article-title":"Detecting self-mutating malware using control-flow graph matching","author":"Bruschi","year":"2006"},{"key":"10.1016\/j.ins.2024.121605_br0070","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1145\/1095430.1081733","article-title":"Detecting higher-level similarity patterns in programs","volume":"30","author":"Basit","year":"2005","journal-title":"Softw. Eng. Notes"},{"key":"10.1016\/j.ins.2024.121605_br0080","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1109\/TSE.2017.2655046","article-title":"Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection","volume":"43","author":"Luo","year":"2017","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.ins.2024.121605_br0090","doi-asserted-by":"crossref","first-page":"138","DOI":"10.17694\/bajece.1232811","article-title":"Estimation of extrusion process parameters in tire manufacturing industry using random forest classifier","volume":"11","author":"Ak\u0131rmak","year":"2023","journal-title":"Balk. J. Electr. Comput. Eng."},{"key":"10.1016\/j.ins.2024.121605_br0100","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.isatra.2023.07.043","article-title":"Q-learning based fault estimation and fault tolerant iterative learning control for mimo systems","volume":"142","author":"Wang","year":"2023","journal-title":"ISA Trans."},{"key":"10.1016\/j.ins.2024.121605_br0110","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"363","article-title":"Neural network-based graph embedding for cross-platform binary code similarity detection","author":"Xu","year":"2017"},{"key":"10.1016\/j.ins.2024.121605_br0120","first-page":"1145","article-title":"Order matters: semantic-aware neural networks for binary code similarity detection","volume":"34","author":"Yu","year":"2020","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"author":"Pei","key":"10.1016\/j.ins.2024.121605_br0130"},{"key":"10.1016\/j.ins.2024.121605_br0140","series-title":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)","first-page":"1","article-title":"Jtrans: jump-aware transformer for binary code similarity detection","author":"Wang","year":"2022"},{"key":"10.1016\/j.ins.2024.121605_br0150","series-title":"Proceedings of the 32nd International Symposium on Software Testing and Analysis (ISSTA)","first-page":"1106","article-title":"Improving binary code similarity transformer models by semantics-driven instruction deemphasis","author":"Xu","year":"2023"},{"key":"10.1016\/j.ins.2024.121605_br0160","series-title":"Attention Is All You Need","first-page":"5998","author":"Vaswani","year":"2017"},{"key":"10.1016\/j.ins.2024.121605_br0170","series-title":"Proceedings of the 2019 Annual Conference on Neural Information Processing Systems (NeurIPS)","first-page":"13042","article-title":"Unified language model pre-training for natural language understanding and generation","author":"Dong","year":"2019"},{"key":"10.1016\/j.ins.2024.121605_br0180","series-title":"Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing (EMNLP)","first-page":"6894","article-title":"Simcse: simple contrastive learning of sentence embeddings","author":"Gao","year":"2021"},{"key":"10.1016\/j.ins.2024.121605_br0190","doi-asserted-by":"crossref","DOI":"10.1145\/3569933","article-title":"sem2vec: semantics-aware assembly tracelet embedding","volume":"32","author":"Wang","year":"2023","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.ins.2024.121605_br0200","series-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security 16)","first-page":"583","article-title":"An {In-Depth} analysis of disassembly on {Full-Scale} x86\/x64 binaries","author":"Andriesse","year":"2016"},{"key":"10.1016\/j.ins.2024.121605_br0210","series-title":"Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test","first-page":"138","article-title":"Idapro for iot malware analysis?","volume":"vol. 19","author":"Darki","year":"2019"},{"key":"10.1016\/j.ins.2024.121605_br0220","series-title":"Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)","first-page":"401","article-title":"An empirical study on arm disassembly tools","author":"Jiang","year":"2020"},{"key":"10.1016\/j.ins.2024.121605_br0230","series-title":"Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses","first-page":"350","article-title":"Binprov: binary code provenance identification without disassembly","author":"He","year":"2022"},{"key":"10.1016\/j.ins.2024.121605_br0240","series-title":"Bert: Pre-Training of Deep Bidirectional Transformers for Language Understanding","first-page":"4171","author":"Devlin","year":"2019"},{"author":"Oord","key":"10.1016\/j.ins.2024.121605_br0250"},{"key":"10.1016\/j.ins.2024.121605_br0260","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/TSE.2022.3187689","article-title":"Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned","volume":"49","author":"Kim","year":"2023","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.ins.2024.121605_br0270","series-title":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","first-page":"3236","article-title":"Palmtree: learning an assembly language model for instruction embedding","author":"Li","year":"2021"},{"key":"10.1016\/j.ins.2024.121605_br0280","series-title":"Proceedings of the 2003 Annual Conference on Neural Information Processing Systems (NeurIPS)","first-page":"41","article-title":"Learning a distance metric from relative comparisons","author":"Schultz","year":"2003"},{"author":"Gu","key":"10.1016\/j.ins.2024.121605_br0290"},{"year":"2020","series-title":"SimBERT: Integrating Retrieval and Generation into BERT","author":"Su","key":"10.1016\/j.ins.2024.121605_br0300"},{"key":"10.1016\/j.ins.2024.121605_br0310","doi-asserted-by":"crossref","DOI":"10.1145\/3604611","article-title":"Asteria-pro: enhancing deep learning-based binary code similarity detection by incorporating domain knowledge","volume":"33","author":"Yang","year":"2024","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.ins.2024.121605_br0320","series-title":"Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"Automatic source code summarization with extended tree-lstm","author":"Shido","year":"2019"},{"key":"10.1016\/j.ins.2024.121605_br0330","series-title":"Proceedings of the 30th Annual Network and Distributed System Security Symposium (NDSS)","first-page":"138","article-title":"Vulhawk: cross-architecture vulnerability detection with entropy-based binary code search","author":"Luo","year":"2023"},{"key":"10.1016\/j.ins.2024.121605_br0340","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"4582","article-title":"Zero-shot learning-the good, the bad and the ugly","author":"Xian","year":"2017"},{"key":"10.1016\/j.ins.2024.121605_br0350","article-title":"Visualizing data using t-sne","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.ins.2024.121605_br0360","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1145\/2666356.2594343","article-title":"Tracelet-based code search in executables","volume":"49","author":"David","year":"2014","journal-title":"ACM SIGPLAN Not."},{"key":"10.1016\/j.ins.2024.121605_br0370","series-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14)","first-page":"303","article-title":"Blanket execution: dynamic similarity testing for program binaries and components","author":"Egele","year":"2014"},{"key":"10.1016\/j.ins.2024.121605_br0380","series-title":"Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering","first-page":"678","article-title":"Bingo: cross-architecture cross-os binary search","author":"Chandramohan","year":"2016"},{"key":"10.1016\/j.ins.2024.121605_br0390","series-title":"Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS), vol. 52","first-page":"58","article-title":"Discovre: efficient cross-architecture identification of bugs in binary code","author":"Eschweiler","year":"2016"},{"key":"10.1016\/j.ins.2024.121605_br0400","series-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","first-page":"480","article-title":"Scalable graph-based bug search for firmware images","author":"Feng","year":"2016"},{"key":"10.1016\/j.ins.2024.121605_br0410","series-title":"Proceedings of the 2nd Workshop on Binary Analysis Research (BAR)","first-page":"1","article-title":"Investigating graph embedding neural networks with unsupervised features extraction for binary analysis","author":"Massarelli","year":"2019"},{"key":"10.1016\/j.ins.2024.121605_br0420","series-title":"Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis","first-page":"26","article-title":"A deep learning approach to program similarity","author":"Marastoni","year":"2018"},{"key":"10.1016\/j.ins.2024.121605_br0430","series-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering","first-page":"667","article-title":"\u03b1diff: cross-version binary code similarity detection with dnn","author":"Liu","year":"2018"},{"key":"10.1016\/j.ins.2024.121605_br0440","series-title":"Proceedings of the 2019 Ieee Symposium on Security and Privacy (SP)","first-page":"472","article-title":"Asm2vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization","author":"Ding","year":"2019"},{"key":"10.1016\/j.ins.2024.121605_br0450","series-title":"Proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)","first-page":"309","article-title":"Safe: self-attentive function embeddings for binary similarity","author":"Massarelli","year":"2019"},{"author":"Koo","key":"10.1016\/j.ins.2024.121605_br0460"},{"author":"Wang","key":"10.1016\/j.ins.2024.121605_br0470"},{"author":"Zhu","key":"10.1016\/j.ins.2024.121605_br0480"},{"key":"10.1016\/j.ins.2024.121605_br0490","series-title":"Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24)","article-title":"Code is not natural language: unlock the power of semantics-oriented graph representation for binary code similarity detection","author":"He","year":"2024"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025524015196?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025524015196?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T02:57:52Z","timestamp":1732330672000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025524015196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":49,"alternative-id":["S0020025524015196"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2024.121605","relation":{},"ISSN":["0020-0255"],"issn-type":[{"type":"print","value":"0020-0255"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"UniBin: Assembly semantic-enhanced binary vulnerability detection without disassembly","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2024.121605","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"121605"}}