{"id":"https://openalex.org/W2967278435","doi":"https://doi.org/10.1145/3374664.3375742","title":"ISAdetect","display_name":"ISAdetect","publication_year":2020,"publication_date":"2020-03-13","ids":{"openalex":"https://openalex.org/W2967278435","doi":"https://doi.org/10.1145/3374664.3375742","mag":"2967278435"},"language":"en","primary_location":{"id":"doi:10.1145/3374664.3375742","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3375742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1908.05459","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sami Kairaj\u00e4rvi","orcid":null},"institutions":[{"id":"https://openalex.org/I94722563","display_name":"University of Jyv\u00e4skyl\u00e4","ror":"https://ror.org/05n3dz165","country_code":"FI","type":"education","lineage":["https://openalex.org/I94722563"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Sami Kairaj\u00e4rvi","raw_affiliation_strings":["University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"],"affiliations":[{"raw_affiliation_string":"University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland","institution_ids":["https://openalex.org/I94722563"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Andrei Costin","orcid":null},"institutions":[{"id":"https://openalex.org/I94722563","display_name":"University of Jyv\u00e4skyl\u00e4","ror":"https://ror.org/05n3dz165","country_code":"FI","type":"education","lineage":["https://openalex.org/I94722563"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Andrei Costin","raw_affiliation_strings":["University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"],"affiliations":[{"raw_affiliation_string":"University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland","institution_ids":["https://openalex.org/I94722563"]}]},{"author_position":"last","author":{"id":null,"display_name":"Timo H\u00e4m\u00e4l\u00e4inen","orcid":null},"institutions":[{"id":"https://openalex.org/I94722563","display_name":"University of Jyv\u00e4skyl\u00e4","ror":"https://ror.org/05n3dz165","country_code":"FI","type":"education","lineage":["https://openalex.org/I94722563"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Timo H\u00e4m\u00e4l\u00e4inen","raw_affiliation_strings":["University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"],"affiliations":[{"raw_affiliation_string":"University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland","institution_ids":["https://openalex.org/I94722563"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I94722563"],"apc_list":null,"apc_paid":null,"fwci":1.6762,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.84021462,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"376","last_page":"380"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.8251000046730042},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.7728000283241272},{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.7689999938011169},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5011000037193298},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.46149998903274536},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4498000144958496},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.44600000977516174},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.435699999332428},{"id":"https://openalex.org/keywords/object-code","display_name":"Object code","score":0.4077000021934509}],"concepts":[{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.8251000046730042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8100000023841858},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.7728000283241272},{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.7689999938011169},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5011000037193298},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.46149998903274536},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4498000144958496},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.44600000977516174},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.435699999332428},{"id":"https://openalex.org/C154526789","wikidata":"https://www.wikidata.org/wiki/Q157965","display_name":"Object code","level":4,"score":0.4077000021934509},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.40549999475479126},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3953999876976013},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.35420000553131104},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.35350000858306885},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3393000066280365},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.3276999890804291},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.323199987411499},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.31769999861717224},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.3122999966144562},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.2989000082015991},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.29739999771118164},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C63435697","wikidata":"https://www.wikidata.org/wiki/Q864135","display_name":"Binary code","level":3,"score":0.29010000824928284},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.28189998865127563},{"id":"https://openalex.org/C199519371","wikidata":"https://www.wikidata.org/wiki/Q942695","display_name":"Source lines of code","level":3,"score":0.2791000008583069},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.27639999985694885},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.27619999647140503},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2646999955177307},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.26019999384880066}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3374664.3375742","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3375742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1908.05459","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1908.05459","pdf_url":"https://arxiv.org/pdf/1908.05459","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:jyx.jyu.fi:123456789/68398","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3374664.3375742\"","pdf_url":"http://urn.fi/URN:NBN:fi:jyu-202003312612","source":{"id":"https://openalex.org/S4306400563","display_name":"Jyv\u00e4skyl\u00e4 University Digital Archive (University of Jyv\u00e4skyl\u00e4)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I94722563","host_organization_name":"University of Jyv\u00e4skyl\u00e4","host_organization_lineage":["https://openalex.org/I94722563"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"A4"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1908.05459","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1908.05459","pdf_url":"https://arxiv.org/pdf/1908.05459","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W17195072","https://openalex.org/W162878183","https://openalex.org/W1167346692","https://openalex.org/W1942295288","https://openalex.org/W1987272921","https://openalex.org/W2021362805","https://openalex.org/W2091939272","https://openalex.org/W2107558499","https://openalex.org/W2113864883","https://openalex.org/W2119251836","https://openalex.org/W2137530017","https://openalex.org/W2158302406","https://openalex.org/W2180970301","https://openalex.org/W2203654293","https://openalex.org/W2514974017","https://openalex.org/W2532962075","https://openalex.org/W2577142429","https://openalex.org/W2782780792","https://openalex.org/W2997591727","https://openalex.org/W4213412204"],"related_works":[],"abstract_inverted_index":{"Static":[0],"and":[1,14,67,83,88,127,132,143,150,156,175,180,185,194,215,224,229,240,264,282],"dynamic":[2],"binary":[3,23,100,183,248],"analysis":[4,31,43],"techniques":[5],"are":[6,197,262],"actively":[7],"used":[8],"to":[9,15,34,77],"reverse":[10,68],"engineer":[11],"software's":[12],"behavior":[13],"detect":[16],"its":[17],"vulnerabilities,":[18],"even":[19],"when":[20],"only":[21],"the":[22,48,54,84,99,116,137,147,171,192,232,235,267,271,275,279],"code":[24,56,124],"is":[25,73],"available":[26,141],"for":[27,37,121],"analysis.":[28,58,112],"To":[29],"avoid":[30],"errors":[32],"due":[33,76],"misreading":[35],"op-codes":[36],"a":[38,207],"wrong":[39],"CPU":[40,62],"architecture,":[41],"these":[42],"tools":[44,70],"must":[45,71],"precisely":[46],"identify":[47],"Instruction":[49],"Set":[50],"Architecture":[51],"(ISA)":[52],"of":[53,61,80,86,107,109,115,139,152,173,178,182,210,226,231,234,270,278],"object":[55,123,186],"under":[57],"The":[59,113,260],"variety":[60],"architectures":[63],"that":[64,96,196],"modern":[65],"security":[66],"engineering":[69],"support":[72,138],"ever":[74],"increasing":[75],"massive":[78],"proliferation":[79],"IoT":[81,110],"devices":[82],"diversity":[85],"firmware":[87,111],"malware":[89],"targeting":[90],"those":[91,153,286],"devices.":[92],"Recent":[93],"studies":[94],"concluded":[95],"falsely":[97],"identifying":[98],"code's":[101],"ISA":[102,120],"caused":[103],"alone":[104],"about":[105],"10%":[106],"failures":[108],"state":[114,233,269],"art":[117,236],"approaches":[118,283],"detecting":[119],"executable":[122,247],"look":[125],"promising,":[126],"their":[128],"results":[129,230,261],"demonstrate":[130],"effectiveness":[131],"high-performance.":[133],"However,":[134],"they":[135],"lack":[136],"publicly":[140],"datasets":[142,195],"toolsets,":[144],"which":[145],"makes":[146],"evaluation,":[148],"comparison,":[149],"improvement":[151],"techniques,":[154],"datasets,":[155],"machine":[157],"learning":[158],"models":[159],"quite":[160],"challenging":[161],"(if":[162],"not":[163],"impossible).":[164],"This":[165],"paper":[166],"bridges":[167],"multiple":[168],"gaps":[169],"in":[170,199,285],"field":[172],"automated":[174],"precise":[176],"identification":[177],"architecture":[179],"endianness":[181],"files":[184],"code.":[187],"We":[188,219],"develop":[189],"from":[190,246],"scratch":[191],"toolset":[193],"lacking":[198],"this":[200],"research":[201],"space.":[202],"As":[203],"such,":[204],"we":[205],"contribute":[206],"comprehensive":[208],"collection":[209],"open":[211,213,216],"data,":[212],"source,":[214],"API":[217],"web-services.":[218],"also":[220],"attempt":[221],"experiment":[222],"reconstruction":[223],"cross-validation":[225],"effectiveness,":[227],"efficiency,":[228],"methods.":[237],"When":[238],"training":[239],"testing":[241],"classifiers":[242,252],"using":[243],"solely":[244],"code-sections":[245],"files,":[249],"all":[250],"our":[251],"performed":[253],"equally":[254],"well":[255],"achieving":[256],"over":[257],"98%":[258],"accuracy.":[259],"consistent":[263],"comparable":[265],"with":[266],"current":[268],"art,":[272],"hence":[273],"supports":[274],"general":[276],"validity":[277],"algorithms,":[280],"features,":[281],"suggested":[284],"works.":[287]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":9}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2019-08-22T00:00:00"}
