{"id":"https://openalex.org/W4311166089","doi":"https://doi.org/10.1145/3564625.3567975","title":"Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning","display_name":"Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning","publication_year":2022,"publication_date":"2022-12-03","ids":{"openalex":"https://openalex.org/W4311166089","doi":"https://doi.org/10.1145/3564625.3567975"},"language":"en","primary_location":{"id":"doi:10.1145/3564625.3567975","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3564625.3567975","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034811227","display_name":"Sunwoo Ahn","orcid":"https://orcid.org/0000-0002-7843-9510"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Sunwoo Ahn","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Seoul National University, Korea, South \u2013 Republic of Korea and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Seoul National University, Korea, South \u2013 Republic of Korea and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087747023","display_name":"Seonggwan Ahn","orcid":"https://orcid.org/0000-0003-0813-8349"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seonggwan Ahn","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Seoul National University, Korea, South \u2013 Republic of Korea and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Seoul National University, Korea, South \u2013 Republic of Korea and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002028881","display_name":"Hyungjoon Koo","orcid":"https://orcid.org/0000-0003-0799-0230"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyungjoon Koo","raw_affiliation_strings":["Department of Computer Science and Engineering, Sungkyunkwan University, Korea, South \u2013 Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sungkyunkwan University, Korea, South \u2013 Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082524666","display_name":"Yunheung Paek","orcid":"https://orcid.org/0000-0002-6412-2926"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yunheung Paek","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Seoul National University, Korea, South \u2013 Republic of Korea and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Seoul National University, Korea, South \u2013 Republic of Korea and Inter-university Semiconductor Research Center, Seoul National University, Republic of Korea","institution_ids":["https://openalex.org/I139264467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5034811227"],"corresponding_institution_ids":["https://openalex.org/I139264467"],"apc_list":null,"apc_paid":null,"fwci":6.6988,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.97741153,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"361","last_page":"374"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7813736200332642},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5642654299736023},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5101718902587891},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.46981480717658997},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4595540761947632},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.4346623718738556},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4339079260826111},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42483559250831604},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.35280847549438477},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33605650067329407},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18242594599723816},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.10730108618736267}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7813736200332642},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5642654299736023},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5101718902587891},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.46981480717658997},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4595540761947632},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.4346623718738556},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4339079260826111},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42483559250831604},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.35280847549438477},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33605650067329407},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18242594599723816},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.10730108618736267},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3564625.3567975","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3564625.3567975","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W200653874","https://openalex.org/W1573286687","https://openalex.org/W1690253345","https://openalex.org/W1942295288","https://openalex.org/W1965297308","https://openalex.org/W1967185446","https://openalex.org/W1984978725","https://openalex.org/W1990762361","https://openalex.org/W2009614414","https://openalex.org/W2052854541","https://openalex.org/W2064675550","https://openalex.org/W2096733369","https://openalex.org/W2157364932","https://openalex.org/W2187089797","https://openalex.org/W2323777246","https://openalex.org/W2414803796","https://openalex.org/W2439280908","https://openalex.org/W2532962075","https://openalex.org/W2547625248","https://openalex.org/W2559784535","https://openalex.org/W2577142429","https://openalex.org/W2618635610","https://openalex.org/W2627063456","https://openalex.org/W2731423391","https://openalex.org/W2749008552","https://openalex.org/W2806869036","https://openalex.org/W2886694146","https://openalex.org/W2888320512","https://openalex.org/W2901689459","https://openalex.org/W2914982603","https://openalex.org/W2926178846","https://openalex.org/W2963408280","https://openalex.org/W2963485370","https://openalex.org/W2979826702","https://openalex.org/W2990954041","https://openalex.org/W2997915791","https://openalex.org/W2998010923","https://openalex.org/W3007413911","https://openalex.org/W3011088748","https://openalex.org/W3014585688","https://openalex.org/W3043519510","https://openalex.org/W3046937268","https://openalex.org/W3105926539","https://openalex.org/W3109206613","https://openalex.org/W3133719257","https://openalex.org/W3153398259","https://openalex.org/W3183467446","https://openalex.org/W3193122818","https://openalex.org/W3195235276","https://openalex.org/W3201578899","https://openalex.org/W4200070817","https://openalex.org/W4285586654"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W2975527072"],"abstract_inverted_index":{"Binary":[0],"code":[1,62],"similarity":[2],"detection":[3],"(BCSD)":[4],"serves":[5],"as":[6],"a":[7,10,31,52,57],"basis":[8],"for":[9],"wide":[11],"spectrum":[12],"of":[13,27,30,39,51,60,67],"applications,":[14],"including":[15],"software":[16],"plagiarism,":[17],"malware":[18],"classification,":[19],"and":[20,64],"known":[21],"vulnerability":[22],"discovery.":[23],"However,":[24],"the":[25,37,49,65,68],"inference":[26],"contextual":[28],"meanings":[29],"binary":[32],"is":[33],"challenging":[34],"due":[35],"to":[36],"absence":[38],"semantic":[40],"information":[41],"available":[42],"in":[43],"source":[44],"codes.":[45],"Recent":[46],"advances":[47],"leverage":[48],"benefits":[50],"deep":[53],"learning":[54],"architecture":[55,70],"into":[56,71],"better":[58,72],"understanding":[59],"underlying":[61],"semantics":[63],"advantages":[66],"Siamese":[69],"BCSD.":[73]},"counts_by_year":[{"year":2025,"cited_by_count":30},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":6}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
