{"id":"https://openalex.org/W4311165734","doi":"https://doi.org/10.1145/3564625.3567998","title":"Boosting Neural Networks to Decompile Optimized Binaries","display_name":"Boosting Neural Networks to Decompile Optimized Binaries","publication_year":2022,"publication_date":"2022-12-03","ids":{"openalex":"https://openalex.org/W4311165734","doi":"https://doi.org/10.1145/3564625.3567998"},"language":"en","primary_location":{"id":"doi:10.1145/3564625.3567998","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3564625.3567998","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3564625.3567998","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3564625.3567998","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101444117","display_name":"Ying Cao","orcid":"https://orcid.org/0000-0002-1689-653X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ying Cao","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072373338","display_name":"Ruigang Liang","orcid":"https://orcid.org/0000-0002-8751-9918"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruigang Liang","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100437976","display_name":"Kai Chen","orcid":"https://orcid.org/0000-0002-5624-2987"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054356228","display_name":"Peiwei Hu","orcid":"https://orcid.org/0000-0003-2803-7166"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peiwei Hu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and School of CyberSecurity, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101444117"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":3.1267,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.92403269,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"508","last_page":"518"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.832099437713623},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.7520927786827087},{"id":"https://openalex.org/keywords/machine-translation","display_name":"Machine translation","score":0.6887732744216919},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5967590808868408},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4852159321308136},{"id":"https://openalex.org/keywords/intermediate-language","display_name":"Intermediate language","score":0.42574092745780945},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3993709683418274},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3736840784549713},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.3692775368690491}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.832099437713623},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.7520927786827087},{"id":"https://openalex.org/C203005215","wikidata":"https://www.wikidata.org/wiki/Q79798","display_name":"Machine translation","level":2,"score":0.6887732744216919},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5967590808868408},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4852159321308136},{"id":"https://openalex.org/C77660490","wikidata":"https://www.wikidata.org/wiki/Q244916","display_name":"Intermediate language","level":3,"score":0.42574092745780945},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3993709683418274},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3736840784549713},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3692775368690491}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3564625.3567998","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3564625.3567998","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3564625.3567998","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2301.00969","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2301.00969","pdf_url":"https://arxiv.org/pdf/2301.00969","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3564625.3567998","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3564625.3567998","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3564625.3567998","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 38th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1992562646","display_name":null,"funder_award_id":"U1836211","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"},{"id":"https://openalex.org/F4320335892","display_name":"Youth Innovation Promotion Association","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4311165734.pdf","grobid_xml":"https://content.openalex.org/works/W4311165734.grobid-xml"},"referenced_works_count":89,"referenced_works":["https://openalex.org/W13344852","https://openalex.org/W18539376","https://openalex.org/W45136908","https://openalex.org/W73325334","https://openalex.org/W191489030","https://openalex.org/W583762186","https://openalex.org/W646354405","https://openalex.org/W937140903","https://openalex.org/W1412775481","https://openalex.org/W1489192843","https://openalex.org/W1490704196","https://openalex.org/W1490966766","https://openalex.org/W1491178396","https://openalex.org/W1493010432","https://openalex.org/W1494199306","https://openalex.org/W1538775592","https://openalex.org/W1591331301","https://openalex.org/W1600307053","https://openalex.org/W1878781946","https://openalex.org/W1895577753","https://openalex.org/W1902237438","https://openalex.org/W1965555277","https://openalex.org/W1967925153","https://openalex.org/W1977997607","https://openalex.org/W1985830587","https://openalex.org/W1995139576","https://openalex.org/W1996931099","https://openalex.org/W2029934607","https://openalex.org/W2043539602","https://openalex.org/W2044951665","https://openalex.org/W2048459878","https://openalex.org/W2053615683","https://openalex.org/W2056198286","https://openalex.org/W2056907916","https://openalex.org/W2064675550","https://openalex.org/W2087110336","https://openalex.org/W2089757823","https://openalex.org/W2090554354","https://openalex.org/W2103828746","https://openalex.org/W2104062382","https://openalex.org/W2104912713","https://openalex.org/W2105488231","https://openalex.org/W2123033018","https://openalex.org/W2125678429","https://openalex.org/W2130942839","https://openalex.org/W2133564696","https://openalex.org/W2134312016","https://openalex.org/W2144981449","https://openalex.org/W2147118954","https://openalex.org/W2157331557","https://openalex.org/W2161563510","https://openalex.org/W2168452204","https://openalex.org/W2194775991","https://openalex.org/W2509067210","https://openalex.org/W2514974017","https://openalex.org/W2525778437","https://openalex.org/W2582743722","https://openalex.org/W2752061190","https://openalex.org/W2753395445","https://openalex.org/W2795422216","https://openalex.org/W2889143459","https://openalex.org/W2890042297","https://openalex.org/W2896457183","https://openalex.org/W2914660537","https://openalex.org/W2926178846","https://openalex.org/W2950898568","https://openalex.org/W2953253175","https://openalex.org/W2963212250","https://openalex.org/W2963925437","https://openalex.org/W2971324691","https://openalex.org/W2984661639","https://openalex.org/W3000168638","https://openalex.org/W3006080408","https://openalex.org/W3013840636","https://openalex.org/W3018180091","https://openalex.org/W3037855651","https://openalex.org/W3043641306","https://openalex.org/W3048053993","https://openalex.org/W3098605233","https://openalex.org/W3137108338","https://openalex.org/W3152266692","https://openalex.org/W3158305201","https://openalex.org/W3206706367","https://openalex.org/W4255621959","https://openalex.org/W4285091613","https://openalex.org/W4288349907","https://openalex.org/W4294170691","https://openalex.org/W4385245566","https://openalex.org/W6739901393"],"related_works":["https://openalex.org/W1713081424","https://openalex.org/W2127315869","https://openalex.org/W1523769955","https://openalex.org/W3083197299","https://openalex.org/W2245390655","https://openalex.org/W4379536100","https://openalex.org/W3129800153","https://openalex.org/W1980076962","https://openalex.org/W4236307538","https://openalex.org/W75415634"],"abstract_inverted_index":{"Decompilation":[0],"aims":[1],"to":[2,57,81,87,146,149,172],"transform":[3],"a":[4,23,73,128,140],"low-level":[5],"program":[6,16],"language":[7,17,51],"(LPL)":[8],"(eg.,":[9],"binary":[10],"file)":[11],"into":[12,175],"its":[13],"functionally-equivalent":[14],"high-level":[15],"(HPL)":[18],"(e.g.,":[19],"C/C++).":[20],"It":[21],"is":[22],"core":[24],"technology":[25],"in":[26,30,49],"software":[27],"security,":[28],"especially":[29],"vulnerability":[31],"discovery":[32],"and":[33,78,91,161],"malware":[34],"analysis.":[35],"In":[36,123],"recent":[37],"years,":[38],"with":[39,103,199],"the":[40,63,69,83,156],"successful":[41],"application":[42],"of":[43,65,190],"neural":[44,59,142,205],"machine":[45],"translation":[46,74,181],"(NMT)":[47],"models":[48],"natural":[50],"processing":[52],"(NLP),":[53],"researchers":[54],"have":[55,119],"tried":[56],"build":[58],"decompilers":[60,98,112],"by":[61],"borrowing":[62],"idea":[64],"NMT.":[66],"They":[67],"formulate":[68],"decompilation":[70,89,206],"process":[71],"as":[72],"problem":[75],"between":[76,158],"LPL":[77,148],"HPL,":[79],"aiming":[80],"reduce":[82],"human":[84],"cost":[85],"required":[86],"develop":[88],"tools":[90],"improve":[92],"their":[93],"generalizability.":[94],"However,":[95],"state-of-the-art":[96,204],"learning-based":[97,130],"do":[99,114],"not":[100,115],"cope":[101],"well":[102],"compiler-optimized":[104,136],"binaries.":[105,137],"Since":[106],"real-world":[107],"binaries":[108,118,198],"are":[109],"mostly":[110],"compiler-optimized,":[111],"that":[113,134,193],"consider":[116],"optimized":[117,162,197],"limited":[120],"practical":[121],"significance.":[122],"this":[124],"paper,":[125],"we":[126],"propose":[127],"novel":[129],"approach":[131],"named":[132],"NeurDP,":[133],"targets":[135],"NeurDP":[138,194],"uses":[139],"graph":[141],"network":[143],"(GNN)":[144],"model":[145],"convert":[147],"an":[150,167],"intermediate":[151],"representation":[152],"(IR),":[153],"which":[154],"bridges":[155],"gap":[157],"source":[159],"code":[160,177],"binary.":[163],"We":[164],"also":[165],"design":[166],"Optimized":[168],"Translation":[169],"Unit":[170],"(OTU)":[171],"split":[173],"functions":[174],"smaller":[176],"fragments":[178],"for":[179],"better":[180],"performance.":[182],"Evaluation":[183],"results":[184],"on":[185],"datasets":[186],"containing":[187],"various":[188],"types":[189],"statements":[191],"show":[192],"can":[195],"decompile":[196],"45.21%":[200],"higher":[201],"accuracy":[202],"than":[203],"frameworks.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":10}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
