{"id":"https://openalex.org/W4403582747","doi":"https://doi.org/10.1145/3627673.3679726","title":"Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection","display_name":"Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection","publication_year":2024,"publication_date":"2024-10-20","ids":{"openalex":"https://openalex.org/W4403582747","doi":"https://doi.org/10.1145/3627673.3679726"},"language":"en","primary_location":{"id":"doi:10.1145/3627673.3679726","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3627673.3679726","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090218224","display_name":"Litao Li","orcid":"https://orcid.org/0000-0001-7925-764X"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Litao Li","raw_affiliation_strings":["Queen's University, Kingston, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Queen's University, Kingston, Ontario, Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007693994","display_name":"Steven H. H. Ding","orcid":"https://orcid.org/0000-0003-4513-200X"},"institutions":[{"id":"https://openalex.org/I5023651","display_name":"McGill University","ror":"https://ror.org/01pxwe438","country_code":"CA","type":"education","lineage":["https://openalex.org/I5023651"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Steven H. H. Ding","raw_affiliation_strings":["McGill University, Montreal, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"McGill University, Montreal, Quebec, Canada","institution_ids":["https://openalex.org/I5023651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078803261","display_name":"Andrew Walenstein","orcid":"https://orcid.org/0000-0003-1103-2465"},"institutions":[{"id":"https://openalex.org/I4210139826","display_name":"Blackberry (Canada)","ror":"https://ror.org/03mmk1j33","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210139826"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Andrew Walenstein","raw_affiliation_strings":["BlackBerry Limited, Waterloo, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"BlackBerry Limited, Waterloo, Ontario, Canada","institution_ids":["https://openalex.org/I4210139826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052958340","display_name":"Philippe Charland","orcid":"https://orcid.org/0000-0003-4051-9942"},"institutions":[{"id":"https://openalex.org/I1297460800","display_name":"Defence Research and Development Canada","ror":"https://ror.org/00hgy8d33","country_code":"CA","type":"funder","lineage":["https://openalex.org/I1297460800","https://openalex.org/I1336338359","https://openalex.org/I2802286613"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Philippe Charland","raw_affiliation_strings":["Mission Critical Cyber Security Section, Defence R&amp;D, Quebec City, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"Mission Critical Cyber Security Section, Defence R&amp;D, Quebec City, Quebec, Canada","institution_ids":["https://openalex.org/I1297460800"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021788449","display_name":"Benjamin C. M. Fung","orcid":"https://orcid.org/0000-0001-8423-2906"},"institutions":[{"id":"https://openalex.org/I5023651","display_name":"McGill University","ror":"https://ror.org/01pxwe438","country_code":"CA","type":"education","lineage":["https://openalex.org/I5023651"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Benjamin C. M. Fung","raw_affiliation_strings":["McGill University, Montreal, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"McGill University, Montreal, Quebec, Canada","institution_ids":["https://openalex.org/I5023651"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5090218224"],"corresponding_institution_ids":["https://openalex.org/I204722609"],"apc_list":null,"apc_paid":null,"fwci":0.3475,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67564219,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1215","last_page":"1225"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9688000082969666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.9587000012397766,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6825512051582336},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5574581027030945},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5330988764762878},{"id":"https://openalex.org/keywords/flow","display_name":"Flow (mathematics)","score":0.4553523361682892},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.43900761008262634},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.42837515473365784},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4164654314517975},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26893019676208496},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2096726894378662},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11574813723564148}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6825512051582336},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5574581027030945},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5330988764762878},{"id":"https://openalex.org/C38349280","wikidata":"https://www.wikidata.org/wiki/Q1434290","display_name":"Flow (mathematics)","level":2,"score":0.4553523361682892},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.43900761008262634},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.42837515473365784},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4164654314517975},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26893019676208496},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2096726894378662},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11574813723564148},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3627673.3679726","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3627673.3679726","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1501856433","https://openalex.org/W1966801132","https://openalex.org/W2101512909","https://openalex.org/W2114345296","https://openalex.org/W2547625248","https://openalex.org/W2749008552","https://openalex.org/W2808052182","https://openalex.org/W2888320512","https://openalex.org/W2907492528","https://openalex.org/W2963723316","https://openalex.org/W2976184969","https://openalex.org/W2978569165","https://openalex.org/W2997915791","https://openalex.org/W2999054565","https://openalex.org/W2999905431","https://openalex.org/W3005144047","https://openalex.org/W3007413911","https://openalex.org/W3007993592","https://openalex.org/W3010126799","https://openalex.org/W3011088748","https://openalex.org/W3048297080","https://openalex.org/W3085131702","https://openalex.org/W3085175543","https://openalex.org/W3105926539","https://openalex.org/W3108936298","https://openalex.org/W3137781054","https://openalex.org/W3161938055","https://openalex.org/W3168151787","https://openalex.org/W3201167453","https://openalex.org/W4206471719","https://openalex.org/W4295016751","https://openalex.org/W4301172471","https://openalex.org/W6782808188"],"related_works":["https://openalex.org/W2095999892","https://openalex.org/W2018764758","https://openalex.org/W2383689843","https://openalex.org/W1550668881","https://openalex.org/W617913288","https://openalex.org/W2062873522","https://openalex.org/W2319323865","https://openalex.org/W2951745010","https://openalex.org/W2347958299","https://openalex.org/W2963125730"],"abstract_inverted_index":{"Software":[0],"vulnerabilities":[1,20],"are":[2,10,21,224],"a":[3,116,140,169,187,195,219],"challenge":[4],"in":[5,52],"cybersecurity.":[6],"Manual":[7],"security":[8,54],"patches":[9],"often":[11,136],"difficult":[12],"and":[13,30,37,49,60,73,113,185,197,229,240,243],"slow":[14],"to":[15,34,95,147,175,190],"be":[16,123],"deployed,":[17],"while":[18],"new":[19],"created.":[22],"Binary":[23],"code":[24],"vulnerability":[25,196,247],"detection":[26,248],"is":[27,237],"less":[28],"studied":[29],"more":[31],"complex":[32,97],"compared":[33],"source":[35],"code,":[36],"this":[38],"has":[39,45],"important":[40],"practical":[41],"implications.":[42],"Deep":[43],"learning":[44,65,174],"become":[46],"an":[47,105,124,158,238],"efficient":[48,241],"powerful":[50],"tool":[51],"the":[53,68,96,102,109,127,132,165,177,192,215,245],"domain,":[55],"where":[56],"it":[57],"provides":[58],"end-to-end":[59],"accurate":[61,239],"prediction.":[62],"Modern":[63],"deep":[64],"approaches":[66],"learn":[67,191],"program":[69,100,111,129,182,199],"semantics":[70],"through":[71],"sequence":[72],"graph":[74,141],"neural":[75,142,161,204],"networks,":[76],"using":[77],"various":[78],"intermediate":[79],"representation":[80],"of":[81,99,104,126,134,168],"programs,":[82],"such":[83],"as":[84],"abstract":[85],"syntax":[86],"trees":[87],"(AST)":[88],"or":[89],"control":[90],"flow":[91],"graphs":[92],"(CFG).":[93],"Due":[94],"nature":[98],"execution,":[101],"output":[103],"execution":[106,166],"depends":[107],"on":[108,226],"many":[110],"states":[112],"inputs.":[114],"Also,":[115],"CFG":[117],"generated":[118],"from":[119],"static":[120],"analysis":[121],"can":[122],"overestimation":[125],"true":[128],"flow.":[130],"Moreover,":[131],"size":[133],"programs":[135],"does":[137],"not":[138],"allow":[139],"network":[143,162,205],"with":[144],"fixed":[145],"layers":[146],"aggregate":[148],"global":[149],"information.":[150],"To":[151],"address":[152],"these":[153],"issues,":[154],"we":[155],"propose":[156],"DeepEXE,":[157],"agent-based":[159],"implicit":[160],"that":[163,235],"mimics":[164],"path":[167],"program.":[170],"We":[171,233],"use":[172],"reinforcement":[173],"enhance":[176],"branching":[178],"decision":[179],"at":[180,218],"every":[181],"state":[183,209],"transition":[184],"create":[186],"dynamic":[188],"environment":[189],"dependency":[193],"between":[194],"certain":[198],"states.":[200],"An":[201],"implicitly":[202],"defined":[203],"enables":[206],"nearly":[207],"infinite":[208],"transitions":[210],"until":[211],"convergence,":[212],"which":[213],"captures":[214],"structural":[216],"information":[217],"higher":[220],"level.":[221],"The":[222],"experiments":[223],"conducted":[225],"two":[227,230],"semi-synthetic":[228],"real-world":[231],"datasets.":[232],"show":[234],"DeepEXE":[236],"method":[242],"outperforms":[244],"state-of-the-art":[246],"methods.":[249]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
