{"id":"https://openalex.org/W7108215488","doi":"https://doi.org/10.1109/tdsc.2025.3637812","title":"Identifying Non-Control Security-Critical Data Through Program Dependence Learning","display_name":"Identifying Non-Control Security-Critical Data Through Program Dependence Learning","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7108215488","doi":"https://doi.org/10.1109/tdsc.2025.3637812"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3637812","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3637812","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Zhilong Wang","orcid":"https://orcid.org/0009-0008-0377-2213"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhilong Wang","raw_affiliation_strings":["Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Haizhou Wang","orcid":"https://orcid.org/0000-0001-8337-1488"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haizhou Wang","raw_affiliation_strings":["Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hong Hu","orcid":"https://orcid.org/0000-0002-6261-3190"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hong Hu","raw_affiliation_strings":["Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":null,"display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79557857,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"3597","last_page":"3611"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.5936999917030334,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.5936999917030334,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.23100000619888306,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0340999998152256,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/toolchain","display_name":"Toolchain","score":0.9779000282287598},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7699999809265137},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.7387999892234802},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.6851999759674072},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6689000129699707},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5936999917030334},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.45559999346733093}],"concepts":[{"id":"https://openalex.org/C2777062904","wikidata":"https://www.wikidata.org/wiki/Q545406","display_name":"Toolchain","level":3,"score":0.9779000282287598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.859499990940094},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7699999809265137},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.7387999892234802},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.6851999759674072},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6689000129699707},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5936999917030334},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5034000277519226},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.45559999346733093},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45179998874664307},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4255000054836273},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.421099990606308},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3391999900341034},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.3273000121116638},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.296099990606308},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29510000348091125},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2824999988079071},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.28119999170303345},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2793999910354614},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.27149999141693115},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.25519999861717224},{"id":"https://openalex.org/C79610928","wikidata":"https://www.wikidata.org/wiki/Q1656743","display_name":"Parameter identification problem","level":3,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3637812","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3637812","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7864387035369873}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1538332098","https://openalex.org/W1922844761","https://openalex.org/W1969501726","https://openalex.org/W1973326708","https://openalex.org/W1993682390","https://openalex.org/W2036853599","https://openalex.org/W2080313875","https://openalex.org/W2109219878","https://openalex.org/W2134633067","https://openalex.org/W2155851497","https://openalex.org/W2162800072","https://openalex.org/W2258876169","https://openalex.org/W2512784977","https://openalex.org/W2575425722","https://openalex.org/W2891196279","https://openalex.org/W2963020213","https://openalex.org/W2963355447","https://openalex.org/W2963486920","https://openalex.org/W2969364302","https://openalex.org/W2984971239","https://openalex.org/W2997992893","https://openalex.org/W2998496395","https://openalex.org/W3015513242","https://openalex.org/W3090264346","https://openalex.org/W3098605233","https://openalex.org/W3133719257","https://openalex.org/W3138733102","https://openalex.org/W3156527753","https://openalex.org/W3194771370","https://openalex.org/W4210660460","https://openalex.org/W4234020632","https://openalex.org/W4238089251","https://openalex.org/W4302784197"],"related_works":[],"abstract_inverted_index":{"As":[0],"control-flow":[1,16],"protection":[2],"gets":[3],"widely":[4],"deployed,":[5],"it":[6],"is":[7,39],"difficult":[8],"for":[9],"attackers":[10],"to":[11,28,40,64,102,143,154,196],"corrupt":[12],"control-data":[13],"and":[14,31,136,191],"achieve":[15,202],"hijacking.":[17],"Instead,":[18],"data-oriented":[19,34,232],"attacks,":[20,35],"which":[21,178],"manipulate":[22],"non-control":[23],"data,":[24,95],"have":[25,186],"been":[26],"demonstrated":[27],"be":[29],"feasible":[30],"powerful.":[32],"In":[33,215],"a":[36,74,86,116,162,179,188],"fundamental":[37],"step":[38],"identify":[41,65,93,103],"non-control,":[42],"security-critical":[43],"data.":[44,67,118],"However,":[45],"critical":[46,66,94,117,127,180,210,227],"data":[47,128],"identification":[48,129],"processes":[49],"are":[50,110],"not":[51],"scalable":[52],"in":[53,125,212],"previous":[54,149],"works,":[55],"because":[56],"they":[57],"mainly":[58],"rely":[59],"on":[60],"tedious":[61],"human":[62],"efforts":[63],"To":[68],"address":[69],"this":[70,159],"issue,":[71],"we":[72,96,131,217],"propose":[73,98],"novel":[75],"approach":[76],"that":[77,109,167],"combines":[78],"traditional":[79],"program":[80,105,139,157],"analysis":[81,100],"with":[82,112],"deep":[83,152],"learning.":[84],"At":[85],"higher":[87],"level,":[88],"by":[89,121,229],"examining":[90],"how":[91],"analysts":[92],"first":[97],"dynamic":[99],"algorithms":[101],"the":[104,113,122,126,133,145,170,175,197,219,222,225],"semantics":[106],"(and":[107],"features)":[108],"correlated":[111],"impact":[114],"of":[115,221],"Then,":[119],"motivated":[120],"unique":[123],"challenges":[124],"task,":[130],"formalize":[132],"distinguishing":[134],"features":[135],"use":[137],"customized":[138],"dependence":[140],"graphs":[141],"(PDG)":[142],"embed":[144],"features.":[146],"Different":[147],"from":[148],"works":[150],"using":[151,224],"learning":[153],"learn":[155],"basic":[156],"semantics,":[158],"paper":[160],"adopts":[161],"special":[163],"neural":[164],"network":[165],"architecture":[166],"can":[168,201],"capture":[169],"long":[171],"dependency":[172],"paths":[173],"(in":[174],"PDG),":[176],"through":[177,234],"variable":[181],"propagates":[182],"its":[183],"impact.":[184],"We":[185],"implemented":[187],"fully-automatic":[189],"toolchain":[190,206],"conducted":[192],"comprehensive":[193],"evaluations.":[194],"According":[195],"evaluations,":[198],"our":[199],"model":[200],"90%":[203],"accuracy.":[204],"The":[205],"uncovers":[207],"80":[208],"potential":[209],"variables":[211,228],"Google":[213],"FuzzBench.":[214],"addition,":[216],"demonstrate":[218],"harmfulness":[220],"exploits":[223],"identified":[226],"simulating":[230],"7":[231],"attacks":[233],"GDB.":[235]},"counts_by_year":[],"updated_date":"2026-03-17T06:59:57.516163","created_date":"2025-12-03T00:00:00"}
