{"id":"https://openalex.org/W4308411020","doi":"https://doi.org/10.1145/3548606.3563518","title":"Poster","display_name":"Poster","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308411020","doi":"https://doi.org/10.1145/3548606.3563518"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3563518","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3563518","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051083658","display_name":"Can Huang","orcid":"https://orcid.org/0000-0002-4317-1016"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Can Huang","raw_affiliation_strings":["Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100354242","display_name":"Cheng Li","orcid":"https://orcid.org/0000-0002-1853-7813"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Li","raw_affiliation_strings":["Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021759916","display_name":"Jiashuo Liang","orcid":"https://orcid.org/0000-0003-0410-5515"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiashuo Liang","raw_affiliation_strings":["Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042282426","display_name":"Xinhui Han","orcid":"https://orcid.org/0000-0002-7124-4278"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinhui Han","raw_affiliation_strings":["Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051083658"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13224864,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5","issue":null,"first_page":"3367","last_page":"3369"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8297408819198608},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.8234120607376099},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.581310510635376},{"id":"https://openalex.org/keywords/class-hierarchy","display_name":"Class hierarchy","score":0.5805362462997437},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.5316097736358643},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5041946172714233},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4888969957828522},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.47398582100868225},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36195987462997437},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3145446479320526},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26818424463272095},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22598877549171448},{"id":"https://openalex.org/keywords/object-oriented-programming","display_name":"Object-oriented programming","score":0.1994187831878662}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8297408819198608},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.8234120607376099},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.581310510635376},{"id":"https://openalex.org/C2781289151","wikidata":"https://www.wikidata.org/wiki/Q2903989","display_name":"Class hierarchy","level":3,"score":0.5805362462997437},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.5316097736358643},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5041946172714233},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4888969957828522},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.47398582100868225},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36195987462997437},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3145446479320526},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26818424463272095},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22598877549171448},{"id":"https://openalex.org/C73752529","wikidata":"https://www.wikidata.org/wiki/Q79872","display_name":"Object-oriented programming","level":2,"score":0.1994187831878662},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3563518","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3563518","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W1490011260"],"related_works":["https://openalex.org/W2931688134","https://openalex.org/W2461263520","https://openalex.org/W2079027950","https://openalex.org/W2357813254","https://openalex.org/W1971029554","https://openalex.org/W4388185001","https://openalex.org/W4399418838","https://openalex.org/W4229654425","https://openalex.org/W2051901529","https://openalex.org/W1541135463"],"abstract_inverted_index":{"In":[0],"this":[1],"poster,":[2],"we":[3,63,89],"proposed":[4],"a":[5,65],".NET":[6,26],"patch":[7,68,122],"analysis":[8,69],"framework":[9],"named":[10],"MSILDiffer":[11,19,51,108],"based":[12,75],"on":[13,76],"Microsoft":[14,78],"Intermediate":[15],"Language":[16],"(MSIL).":[17],"First,":[18],"directly":[20],"extracts":[21],"MSIL":[22],"instructions":[23],"from":[24],"the":[25,30,55,77,85,102,105],"assemblies,":[27],"and":[28,44,49,94,118],"retrieves":[29],"hierarchy":[31],"of":[32,67,87,115,121],"classes":[33],"as":[34,36],"well":[35],"their":[37],"internal":[38],"class":[39,73],"methods.":[40],"Then,":[41],"with":[42,57],"coarse":[43],"fine":[45],"granularity":[46],"feature":[47],"extraction":[48],"comparison,":[50],"quickly":[52],"filters":[53],"out":[54],"code":[56],"substantial":[58],"changes":[59],"after":[60],"patch.":[61],"Besides,":[62],"build":[64],"dataset":[66],"containing":[70],"24.46":[71],"million":[72],"methods":[74],"Exchange":[79],"mail":[80],"system":[81],"security":[82],"patches.":[83],"With":[84],"assistance":[86],"MSILDiffer,":[88],"generated":[90],"32":[91],"call":[92],"paths":[93],"crafted":[95],"corresponding":[96],"POCs":[97],"for":[98],"1-day":[99],"vulnerabilities":[100],"in":[101,113],"dataset.":[103],"Through":[104],"experiment":[106],"evaluation,":[107],"is":[109],"superior":[110],"to":[111],"JustAssembly":[112],"terms":[114],"coverage,":[116],"accuracy":[117],"time":[119],"consumption":[120],"difference":[123],"analysis.":[124]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-11-11T00:00:00"}
