{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:36:53Z","timestamp":1730327813637,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3637666","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"1186-1199","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6909-9334","authenticated-orcid":false,"given":"Xu","family":"He","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, Virginia, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7920-7025","authenticated-orcid":false,"given":"Shu","family":"Wang","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, Virginia, United States"}]},{"ORCID":"http:\/\/orcid.org\/0009-0001-8207-1472","authenticated-orcid":false,"given":"Pengbin","family":"Feng","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, Shanxi, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3648-1750","authenticated-orcid":false,"given":"Xinda","family":"Wang","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas, Richardson, Texas, United States"}]},{"ORCID":"http:\/\/orcid.org\/0009-0005-1284-0300","authenticated-orcid":false,"given":"Shiyu","family":"Sun","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, Virginia, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8776-8730","authenticated-orcid":false,"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4152-2107","authenticated-orcid":false,"given":"Kun","family":"Sun","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, Virginia, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Miltiadis Allamanis Marc Brockschmidt and Mahmoud Khademi. 2018. Learning to Represent Programs with Graphs. arXiv:1711.00740 [cs.LG]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387550"},{"key":"e_1_3_2_1_4_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Andriesse Dennis","year":"2016","unstructured":"Dennis Andriesse, Xi Chen, Victor Van Der Veen, Asia Slowinska, and Herbert Bos. 2016. An in-depth analysis of disassembly on full-scale x86\/x64 binaries. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, USA, 583--600."},{"key":"e_1_3_2_1_5_1","unstructured":"Angr. 2021. A python framework for analyzing binaries. http:\/\/angr.io\/."},{"key":"e_1_3_2_1_6_1","volume-title":"2020 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE","author":"Bowman Benjamin","year":"2020","unstructured":"Benjamin Bowman and H Howie Huang. 2020. Vgraph: A robust vulnerable code clone detection system using code property triplets. In 2020 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, Genoa, Italy, 53--69."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5747"},{"key":"e_1_3_2_1_8_1","unstructured":"Clang Team. 2020. clang - the Clang C C++ and Objective-C compiler. https:\/\/clang.llvm.org\/docs\/CommandGuide\/clang.html."},{"key":"e_1_3_2_1_9_1","volume-title":"BScout: Direct Whole Patch Presence Test for Java Executables. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Dai Jiarun","year":"2020","unstructured":"Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, and Zhemin Yang. 2020. BScout: Direct Whole Patch Presence Test for Java Executables. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Online, 1147--1164. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/dai"},{"key":"e_1_3_2_1_10_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv:1810.04805 [cs.CL]","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv:1810.04805 [cs.CL]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23126"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24311"},{"key":"e_1_3_2_1_13_1","unstructured":"Nitzan Farhi Noam Koenigstein and Yuval Shavitt. 2023. Detecting Security Patches via Behavioral Data in Code Repositories. arXiv:2302.02112 [cs.CR]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"e_1_3_2_1_15_1","unstructured":"GCC team. 2018. Options That Control Optimization. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Optimize-Options.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545948.3545956"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00044"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437533"},{"key":"e_1_3_2_1_19_1","volume-title":"Vestige: Identifying Binary Code Provenance for Vulnerability Detection. In Applied Cryptography and Network Security (ACNS","author":"Ji Yuede","year":"2021","unstructured":"Yuede Ji, Lei Cui, and H. Howie Huang. 2021. Vestige: Identifying Binary Code Provenance for Vulnerability Detection. In Applied Cryptography and Network Security (ACNS 2021). Springer International Publishing, Cham, 287--310."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417240"},{"key":"e_1_3_2_1_21_1","volume-title":"ALBERT: A Lite BERT for Self-supervised Learning of Language Representations. In 8th International Conference on Learning Representations, ICLR","author":"Lan Zhenzhong","year":"2020","unstructured":"Zhenzhong Lan, Mingda Chen, Sebastian Goodman, Kevin Gimpel, Piyush Sharma, and Radu Soricut. 2020. ALBERT: A Lite BERT for Self-supervised Learning of Language Representations. In 8th International Conference on Learning Representations, ICLR 2020. OpenReview.net, Addis Ababa, Ethiopia, 16 pages. https:\/\/openreview.net\/forum?id=H1eA7AEtvS"},{"key":"e_1_3_2_1_22_1","volume-title":"BART: Denoising Sequence-to-Sequence Pre-training for Natural Language Generation, Translation, and Comprehension. arXiv:1910.13461 [cs.CL]","author":"Lewis Mike","year":"2019","unstructured":"Mike Lewis, Yinhan Liu, Naman Goyal, Marjan Ghazvininejad, Abdelrahman Mohamed, Omer Levy, Ves Stoyanov, and Luke Zettlemoyer. 2019. BART: Denoising Sequence-to-Sequence Pre-training for Natural Language Generation, Translation, and Comprehension. arXiv:1910.13461 [cs.CL]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134072"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484587"},{"key":"e_1_3_2_1_25_1","volume-title":"International conference on machine learning. PMLR, LongBeach, CA, USA, 3835--3845","author":"Li Yujia","year":"2019","unstructured":"Yujia Li, Chenjie Gu, Thomas Dullien, Oriol Vinyals, and Pushmeet Kohli. 2019. Graph matching networks for learning the similarity of graph structured objects. In International conference on machine learning. PMLR, LongBeach, CA, USA, 3835--3845."},{"key":"e_1_3_2_1_26_1","unstructured":"Shangqing Liu Yanzhou Li Xiaofei Xie and Yang Liu. 2023. CommitBART: A Large Pre-trained Model for GitHub Commits. arXiv:2208.08100 [cs.SE]"},{"key":"e_1_3_2_1_27_1","unstructured":"Yinhan Liu Myle Ott Naman Goyal Jingfei Du Mandar Joshi Danqi Chen Omer Levy Mike Lewis Luke Zettlemoyer and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. arXiv:1907.11692 [cs.CL]"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00038"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","first-page":"3771","DOI":"10.1109\/TSE.2021.3105556","article-title":"Modeling functional similarity in source code with graph-based siamese networks","volume":"48","author":"Mehrotra Nikita","year":"2021","unstructured":"Nikita Mehrotra, Navdha Agarwal, Piyush Gupta, Saket Anand, David Lo, and Rahul Purandare. 2021. Modeling functional similarity in source code with graph-based siamese networks. IEEE Transactions on Software Engineering 48, 10 (2021), 3771--3789.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24159"},{"key":"e_1_3_2_1_31_1","unstructured":"OpenAI. 2022. OpenAI ChatGPT. https:\/\/openai.com\/blog\/chatgpt."},{"key":"e_1_3_2_1_32_1","unstructured":"OpenAI. 2022. OpenAI Codex. https:\/\/openai.com\/blog\/openai-codex."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485471"},{"key":"e_1_3_2_1_34_1","unstructured":"PalmTree. 2021. Pre-trained BERT model. https:\/\/drive.google.com\/file\/d\/1yC3M-kVTFWql6hCgM_QCbKtc1PbdVdvp\/view."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23112"},{"key":"e_1_3_2_1_36_1","unstructured":"Alec Radford Karthik Narasimhan Tim Salimans Ilya Sutskever et al. 2018. Improving language understanding by generative pre-training. https:\/\/cdn.openai.com\/research-covers\/language-unsupervised\/language_understanding_paper.pdf"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468551"},{"key":"e_1_3_2_1_38_1","unstructured":"The DWARF Debugging Standard. 2021. Welcome to the DWARF Debugging Standard Website. http:\/\/dwarfstd.org\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484593"},{"key":"e_1_3_2_1_40_1","unstructured":"Synopsys technology. 2023. 2023 Open Source Security and Risk Analysis Report. https:\/\/www.synopsys.com\/software-integrity\/resources\/analyst-reports\/open-source-security-risk-analysis.html."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227176"},{"key":"e_1_3_2_1_42_1","volume-title":"2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE","author":"Wang Min","year":"2019","unstructured":"Min Wang, Zeqi Lin, Yanzhen Zou, and Bing Xie. 2019. Cora: Decomposing and describing tangled code changes for reviewer. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, San Diego, CA, USA, 1050--1061."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.00035"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243844"},{"key":"e_1_3_2_1_45_1","volume-title":"2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, IEEE","author":"Wang Xinda","year":"2019","unstructured":"Xinda Wang, Kun Sun, Archer Batcheller, and Sushil Jajodia. 2019. Detecting\" 0-Day\" Vulnerability: An Empirical Study of Secret Security Patch in OSS. In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, IEEE, Portland, OR, USA, 485--492."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00030"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9652940"},{"key":"e_1_3_2_1_48_1","volume-title":"2020 IEEE Conference on Communications and Network Security (CNS). IEEE, IEEE","author":"Wang Xinda","year":"2020","unstructured":"Xinda Wang, Shu Wang, Kun Sun, Archer Batcheller, and Sushil Jajodia. 2020. A machine learning approach to classify security patches into vulnerability types. In 2020 IEEE Conference on Communications and Network Security (CNS). IEEE, IEEE, Avignon, France, 1--9."},{"key":"e_1_3_2_1_49_1","article-title":"Enhancing security patch identification by capturing structures in commits","volume":"20","author":"Wu Bozhi","year":"2022","unstructured":"Bozhi Wu, Shangqing Liu, Ruitao Feng, Xiaofei Xie, Jingkai Siow, and Shang-Wei Lin. 2022. Enhancing security patch identification by capturing structures in commits. IEEE Transactions on Dependable and Secure Computing 20, 6 (2022), 15 pages.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_50_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Wu Qiushi","year":"2020","unstructured":"Qiushi Wu, Yang He, Stephen McCamant, and Kangjie Lu. 2020. Precisely characterizing security impact in a flood of patches via symbolic rule comparison. In Network and Distributed System Security Symposium (NDSS). Internet Society, USA, 1--18."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.49"},{"key":"e_1_3_2_1_52_1","volume-title":"Automatic Hot Patch Generation for Android Kernels. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Xu Zhengzi","year":"2020","unstructured":"Zhengzi Xu, Yulong Zhang, Longri Zheng, Liangzhao Xia, Chenfu Bao, Zhi Wang, and Yang Liu. 2020. Automatic Hot Patch Generation for Android Kernels. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, New Yord, NY, USA, 2397--2414. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/xu"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"e_1_3_2_1_54_1","volume-title":"Precise and Accurate Patch Presence Test for Binaries. In 27th USENIX Security Symposium (USENIX Security). USENIX Association","author":"Zhang Hang","year":"2018","unstructured":"Hang Zhang and Zhiyun Qian. 2018. Precise and Accurate Patch Presence Test for Binaries. In 27th USENIX Security Symposium (USENIX Security). USENIX Association, Baltimore, MD, 887--902. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/zhang-hang"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527905"},{"key":"e_1_3_2_1_56_1","volume-title":"An Investigation of the Android Kernel Patch Ecosystem. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Zhang Zheng","year":"2021","unstructured":"Zheng Zhang, Hang Zhang, Zhiyun Qian, and Billy Lau. 2021. An Investigation of the Android Kernel Patch Ecosystem. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, New York, NY, USA, 3649--3666. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/zhang-zheng"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3468854","article-title":"SPI: Automated identification of security patches via commits","volume":"31","author":"Zhou Yaqin","year":"2021","unstructured":"Yaqin Zhou, Jing Kai Siow, Chenyu Wang, Shangqing Liu, and Yang Liu. 2021. SPI: Automated identification of security patches via commits. ACM Transactions on Software Engineering and Methodology (TOSEM) 31, 1 (2021), 1--27.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"deposited":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T12:31:27Z","timestamp":1719577887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3637666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":57,"alternative-id":["10.1145\/3634737.3637666","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3637666","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}