{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:21:02Z","timestamp":1730326862952,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Científico e Tecnológico","doi-asserted-by":"publisher","award":["00001"],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Coordenação de Aperfeiçoamento de Pessoal de Nível Superior","doi-asserted-by":"publisher","award":["00002"],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,17]]},"DOI":"10.1145\/3579990.3580012","type":"proceedings-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T10:27:10Z","timestamp":1677061630000},"page":"108-121","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Game-Based Framework to Compare Program Classifiers and Evaders"],"prefix":"10.1145","author":[{"given":"Tha\u00eds","family":"Dam\u00e1sio","sequence":"first","affiliation":[{"name":"Federal University of Minas Gerais, Minas Gerais, Brazil"}]},{"given":"Michael","family":"Canesche","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais, Minas Gerais, Brazil"}]},{"given":"Vin\u00edcius","family":"Pacheco","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais, Minas Gerais, Brazil"}]},{"given":"Marcus","family":"Botacin","sequence":"additional","affiliation":[{"name":"Texas A&M University, USA"}]},{"given":"Anderson","family":"Faustino da Silva","sequence":"additional","affiliation":[{"name":"State University of Maring\u00e1, Maring\u00e1, Brazil"}]},{"given":"Fernando M.","family":"Quint\u00e3o Pereira","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais, Minas Gerais, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2023,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212695"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"e_1_3_2_1_3_1","volume-title":"ICSM (\u201998)","author":"Baxter Ira D.","year":"1868","unstructured":"Ira D. Baxter, Andrew Yahin, Leonardo Moura, Marcelo Sant\u2019Anna, and Lorraine Bier. 1998. Clone Detection Using Abstract Syntax Trees. In ICSM (\u201998). IEEE Computer Society, USA. 368. isbn:0818687797"},{"key":"e_1_3_2_1_4_1","volume-title":"Alice Shoshana Jakobovits, and Torsten Hoefler","author":"Ben-Nun Tal","year":"2018","unstructured":"Tal Ben-Nun, Alice Shoshana Jakobovits, and Torsten Hoefler. 2018. Neural Code Comprehension: A Learnable Representation of Code Semantics. In NIPS. Curran Associates Inc., Red Hook, NY, USA. 3589\u20133601."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377555.3377894"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.19"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382217"},{"key":"e_1_3_2_1_8_1","first-page":"2244","article-title":"ProGraML","author":"Cummins Chris","year":"2021","unstructured":"Chris Cummins, Zacharias V. Fisches, Tal Ben-Nun, Torsten Hoefler, Michael F P O\u2019Boyle, and Hugh Leather. 2021. ProGraML: A Graph-based Program Representation for Data Flow Analysis and Compiler Optimizations. In ICML. 139, PMLR, Baltimore, Maryland, USA. 2244\u20132253.","journal-title":"In ICML. 139, PMLR, Baltimore, Maryland, USA."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213848"},{"key":"e_1_3_2_1_10_1","volume-title":"Performant Compiler Optimization Environments for AI Research. CoRR, abs\/2109.08267","author":"Cummins Chris","year":"2021","unstructured":"Chris Cummins, Bram Wasti, Jiadong Guo, Brandon Cui, Jason Ansel, Sahir Gomez, Somya Jain, Jia Liu, Olivier Teytaud, Benoit Steiner, Yuandong Tian, and Hugh Leather. 2021. CompilerGym: Robust, Performant Compiler Optimization Environments for AI Research. CoRR, abs\/2109.08267 (2021), 12 pages. arXiv:2109.08267."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cola.2022.101171"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Thais Damasio Michael Canesche Vinicius Pacheco Anderson Faustino Marcus Botacin and Fernando Pereira. 2022. A Game-Based Framework to Compare Program Classifiers and Evaders - Artifact. https:\/\/doi.org\/10.5281\/zenodo.7374649 10.5281\/zenodo.7374649","DOI":"10.5281\/zenodo.7374649"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177157"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428206"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3475061.3475063"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417277"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"volume-title":"Using Clone Detection to Find Malware in Acrobat Files","author":"Karademir Saruhan","key":"e_1_3_2_1_22_1","unstructured":"Saruhan Karademir, Thomas Dean, and Sylvain Leblanc. 2013. Using Clone Detection to Find Malware in Acrobat Files. In CASCON. IBM Corp., USA. 70\u201380."},{"volume-title":"International Symposium on Code Generation and Optimization, 2004. CGO 2004.. IEEE","author":"Lattner C.","key":"e_1_3_2_1_23_1","unstructured":"C. Lattner and V. Adve. 2004. LLVM: a compilation framework for lifelong program analysis amp; transformation. In International Symposium on Code Generation and Optimization, 2004. CGO 2004.. IEEE, Washington, DC, US. 75\u201386."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635900"},{"key":"e_1_3_2_1_26_1","volume-title":"BinSim: Trace-Based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking","author":"Ming Jiang","year":"1931","unstructured":"Jiang Ming, Dongpeng Xu, Yufei Jiang, and Dinghao Wu. 2017. BinSim: Trace-Based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. In SEC. USENIX Association, USA. 253\u2013270. isbn:9781931971409"},{"volume-title":"Convolutional Neural Networks over Tree Structures for Programming Language Processing","author":"Mou Lili","key":"e_1_3_2_1_27_1","unstructured":"Lili Mou, Ge Li, Lu Zhang, Tao Wang, and Zhi Jin. 2016. Convolutional Neural Networks over Tree Structures for Programming Language Processing. In AAAI. AAAI Press, Palo Alto, CA, US. 1287\u20131293."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878921.1878951"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3304221.3319789"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16722-6_14"},{"key":"e_1_3_2_1_31_1","volume-title":"Scikit-Learn: Machine Learning in Python. J. Mach. Learn. Res., 12, null","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and \u00c9douard Duchesnay. 2011. Scikit-Learn: Machine Learning in Python. J. Mach. Learn. Res., 12, null (2011), nov, 2825\u20132830. issn:1532-4435"},{"key":"e_1_3_2_1_32_1","volume-title":"Marina Meila and Tong Zhang (Eds.) (Proceedings of Machine Learning Research","volume":"8486","author":"Peng Dinglan","year":"2021","unstructured":"Dinglan Peng, Shuxin Zheng, Yatao Li, Guolin Ke, Di He, and Tie-Yan Liu. 2021. How could Neural Networks understand Programs? In ICML, Marina Meila and Tong Zhang (Eds.) (Proceedings of Machine Learning Research, Vol. 139). PMLR, Online. 8476\u20138486. http:\/\/proceedings.mlr.press\/v139\/peng21b.html"},{"volume-title":"CodeNet: A Large-Scale AI for Code Dataset for Learning a Diversity of Coding Tasks","author":"Puri Ruchir","key":"e_1_3_2_1_33_1","unstructured":"Ruchir Puri, David S. Kung, Geert Janssen, Wei Zhang, Giacomo Domeniconi, Vladimir Zolotov, Julian Dolby, Jie Chen, Mihir R. Choudhury, Lindsey Decker, Veronika Thost, Luca Buratti, Saurabh Pujar, Shyam Ramji, Ulrich Finkler, Susan Malaika, and Frederick Reiss. 2021. CodeNet: A Large-Scale AI for Code Dataset for Learning a Diversity of Coding Tasks. In NeurIPS Datasets and Benchmarks, Joaquin Vanschoren and Sai-Kit Yeung (Eds.). Curran Associates Inc., Red Hook, NY, USA. 21 pages."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454035"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2307\/1990888"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2886012"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","unstructured":"Jing Kai Siow Shangqing Liu Xiaofei Xie Guozhu Meng and Yang Liu. 2022. Learning Program Semantics with Code Representations: An Empirical Study. https:\/\/doi.org\/10.48550\/ARXIV.2203.11790","DOI":"10.48550\/ARXIV.2203.11790"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389258"},{"key":"e_1_3_2_1_39_1","unstructured":"https:\/\/support.virustotal.com\/hc\/en-us\/articles\/115002146809-Contributors 2022. VirusTotal. VT Intelligence: Combine Google and Facebook and apply it to the field of Malware."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3418463"},{"volume-title":"In-Memory Fuzzing for Binary Code Similarity Analysis","author":"Wang Shuai","key":"e_1_3_2_1_41_1","unstructured":"Shuai Wang and Dinghao Wu. 2017. In-Memory Fuzzing for Binary Code Similarity Analysis. In ASE. IEEE Press, USA. 319\u2013330. isbn:9781538626849"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519939.3523439"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.85"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"e_1_3_2_1_46_1","unstructured":"Weiwei Zhang Shengjian Guo Hongyu Zhang Yulei Sui Yinxing Xue and Yun Xu. 2021. Challenging Machine Learning-based Clone Detectors via Semantic-preserving Code Transformations. arXiv:2111.10793. arxiv:2111.10793"}],"event":{"name":"CGO '23: 21st ACM\/IEEE International Symposium on Code Generation and Optimization","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","SIGPLAN ACM Special Interest Group on Programming Languages","IEEE-CS Computer Society"],"location":"Montr\u00e9al QC Canada","acronym":"CGO '23"},"container-title":["Proceedings of the 21st ACM\/IEEE International Symposium on Code Generation and Optimization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579990.3580012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T14:55:58Z","timestamp":1727448958000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579990.3580012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,17]]},"references-count":46,"alternative-id":["10.1145\/3579990.3580012","10.1145\/3579990"],"URL":"https:\/\/doi.org\/10.1145\/3579990.3580012","relation":{},"subject":[],"published":{"date-parts":[[2023,2,17]]},"assertion":[{"value":"2023-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}