{"id":"https://openalex.org/W4389366545","doi":"https://doi.org/10.1145/3628797.3628996","title":"Binary Representation Embedding and Deep Learning For Binary Code Similarity Detection in Software Security Domain","display_name":"Binary Representation Embedding and Deep Learning For Binary Code Similarity Detection in Software Security Domain","publication_year":2023,"publication_date":"2023-12-06","ids":{"openalex":"https://openalex.org/W4389366545","doi":"https://doi.org/10.1145/3628797.3628996"},"language":"en","primary_location":{"id":"doi:10.1145/3628797.3628996","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3628797.3628996","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Symposium on Information and Communication Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068961791","display_name":"Th\u1ecbnh Nguy\u1ec5n H\u01b0ng","orcid":"https://orcid.org/0009-0008-5125-6870"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Thinh Nguyen Hung","raw_affiliation_strings":["University of Information Technology Vietnam National University, Viet Nam"],"affiliations":[{"raw_affiliation_string":"University of Information Technology Vietnam National University, Viet Nam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024421759","display_name":"Hai Nguyen Phuc","orcid":"https://orcid.org/0009-0007-2974-6577"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hai Nguyen Phuc","raw_affiliation_strings":["University of Information Technology Vietnam National University, Viet Nam"],"affiliations":[{"raw_affiliation_string":"University of Information Technology Vietnam National University, Viet Nam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071741561","display_name":"Khoa Tran Dinh","orcid":"https://orcid.org/0009-0007-9408-8531"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Khoa Tran Dinh","raw_affiliation_strings":["University of Information Technology Vietnam National University, Viet Nam"],"affiliations":[{"raw_affiliation_string":"University of Information Technology Vietnam National University, Viet Nam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102795982","display_name":"Nhan Le Tran Thanh","orcid":"https://orcid.org/0009-0001-5123-0725"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nhan Le Tran Thanh","raw_affiliation_strings":["University of Information Technology Vietnam National University, Viet Nam"],"affiliations":[{"raw_affiliation_string":"University of Information Technology Vietnam National University, Viet Nam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064488776","display_name":"Nghia To Trong","orcid":"https://orcid.org/0000-0003-4810-9550"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nghia To Trong","raw_affiliation_strings":["University of Information Technology Vietnam National University, Viet Nam"],"affiliations":[{"raw_affiliation_string":"University of Information Technology Vietnam National University, Viet Nam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091639692","display_name":"Khoa Ngo-Khanh","orcid":"https://orcid.org/0009-0002-4637-8140"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Khoa Ngo Khanh","raw_affiliation_strings":["University of Information Technology Vietnam National University, Viet Nam"],"affiliations":[{"raw_affiliation_string":"University of Information Technology Vietnam National University, Viet Nam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009023958","display_name":"Phan The Duy","orcid":"https://orcid.org/0000-0002-5945-3712"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Duy Phan The","raw_affiliation_strings":["University of Information Technology Vietnam National University, Viet Nam"],"affiliations":[{"raw_affiliation_string":"University of Information Technology Vietnam National University, Viet Nam","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045030863","display_name":"Van-Hau Pham","orcid":"https://orcid.org/0000-0003-3147-3356"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hau Pham Van","raw_affiliation_strings":["University of Information Technology Vietnam National University, Viet Nam"],"affiliations":[{"raw_affiliation_string":"University of Information Technology Vietnam National University, Viet Nam","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5068961791"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2033,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.48100394,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"785","last_page":"792"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7817983627319336},{"id":"https://openalex.org/keywords/binary-code","display_name":"Binary code","score":0.6118853092193604},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5410193204879761},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4985818862915039},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4756193459033966},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.46747350692749023},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.44199687242507935},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43397772312164307},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4316948652267456},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.41679874062538147},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37090742588043213},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.27794167399406433},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10496363043785095}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7817983627319336},{"id":"https://openalex.org/C63435697","wikidata":"https://www.wikidata.org/wiki/Q864135","display_name":"Binary code","level":3,"score":0.6118853092193604},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5410193204879761},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4985818862915039},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4756193459033966},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.46747350692749023},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.44199687242507935},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43397772312164307},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4316948652267456},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.41679874062538147},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37090742588043213},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.27794167399406433},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10496363043785095},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3628797.3628996","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3628797.3628996","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Symposium on Information and Communication Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1942295288","https://openalex.org/W1967185446","https://openalex.org/W1990762361","https://openalex.org/W2009614414","https://openalex.org/W2024671287","https://openalex.org/W2091939272","https://openalex.org/W2314538066","https://openalex.org/W2618635610","https://openalex.org/W2627063456","https://openalex.org/W2731423391","https://openalex.org/W2888320512","https://openalex.org/W2888698761","https://openalex.org/W2897937925","https://openalex.org/W2914373984","https://openalex.org/W2926178846","https://openalex.org/W2997915791","https://openalex.org/W3134256959","https://openalex.org/W4205487502","https://openalex.org/W4244720976","https://openalex.org/W4285586654"],"related_works":["https://openalex.org/W4226493464","https://openalex.org/W4312417841","https://openalex.org/W3193565141","https://openalex.org/W3133861977","https://openalex.org/W3167935049","https://openalex.org/W3029198973","https://openalex.org/W3202613528","https://openalex.org/W2134880816","https://openalex.org/W2111298487","https://openalex.org/W4308157887"],"abstract_inverted_index":{"Binary":[0],"Code":[1],"Similarity":[2],"Detection":[3],"(BCSD)":[4],"is":[5,185],"the":[6,10,27,42,73,106,114,126,145,168,194],"process":[7],"of":[8,13,38,75,116,141,147,170,182],"analyzing":[9],"binary":[11,43,54,62,76,117],"representations":[12],"two":[14],"functions,":[15],"programs,":[16],"or":[17],"related":[18],"entities":[19],"to":[20,59,112,143],"generate":[21],"a":[22,35,53,60,95,139,160,179],"quantitative":[23],"output":[24],"that":[25,56,175],"signifies":[26],"similarity":[28],"score":[29],"between":[30],"them.":[31],"This":[32,103],"task":[33,169],"encompasses":[34],"wide":[36],"range":[37],"applications,":[39],"including":[40],"addressing":[41],"search":[44],"problem,":[45],"which":[46,109,121,184],"involves":[47],"searching":[48],"for":[49,167],"code":[50,63,77],"segments":[51],"within":[52,72],"file":[55],"are":[57,122],"similar":[58],"specified":[61],"segment.":[64],"These":[65],"capabilities":[66],"open":[67],"up":[68],"numerous":[69],"potential":[70],"applications":[71],"domain":[74],"analysis":[78],"such":[79],"as":[80],"software":[81],"vulnerability":[82],"detection,":[83,85],"clone":[84],"and":[86,163,196],"malware":[87],"analysis.":[88],"In":[89],"this":[90],"paper,":[91],"we":[92,110,137],"introduce":[93],"BiSim-Inspector,":[94],"BCSD":[96],"tool":[97,104],"based":[98],"on":[99],"Deep":[100],"Learning":[101],"(DL).":[102],"leverages":[105],"Bytes2vec":[107],"method,":[108],"develop":[111],"transform":[113],"bytecode":[115],"functions":[118],"into":[119,125],"vectors,":[120],"then":[123],"fed":[124],"Convolutional":[127],"Neural":[128],"Network":[129],"-":[130],"Gated":[131],"Recurrent":[132],"Unit":[133],"(CNN-GRU)":[134],"model.":[135],"Additionally,":[136],"conducted":[138],"series":[140],"experiments":[142],"assess":[144],"effectiveness":[146],"our":[148,176],"method":[149],"by":[150],"comparing":[151],"it":[152],"with":[153],"existing":[154,189],"state-of-the-art":[155],"(SOTA)":[156],"tools.":[157],"We":[158],"use":[159],"large-scale,":[161],"well-structured,":[162],"diversified":[164],"dataset,":[165],"BinaryCorp,":[166],"BCSD.":[171],"The":[172],"results":[173],"show":[174],"framework":[177],"achieves":[178],"Recall":[180],"rate":[181],"89%,":[183],"25%":[186],"higher":[187],"than":[188],"SOTA":[190],"methods,":[191],"without":[192],"compromising":[193],"training":[195],"prediction":[197],"time.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
