{"id":"https://openalex.org/W4409657448","doi":"https://doi.org/10.1145/3696410.3714723","title":"Instruction Vulnerability Prediction for WebAssembly with Semantic Enhanced Code Property Graph","display_name":"Instruction Vulnerability Prediction for WebAssembly with Semantic Enhanced Code Property Graph","publication_year":2025,"publication_date":"2025-04-22","ids":{"openalex":"https://openalex.org/W4409657448","doi":"https://doi.org/10.1145/3696410.3714723"},"language":"en","primary_location":{"id":"doi:10.1145/3696410.3714723","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3696410.3714723","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3696410.3714723","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Web Conference 2025","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3696410.3714723","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117243255","display_name":"Bao Wen","orcid":"https://orcid.org/0009-0004-4750-6516"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bao Wen","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100370034","display_name":"Jingjing Gu","orcid":"https://orcid.org/0000-0002-3989-1520"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingjing Gu","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101682487","display_name":"Hao Han","orcid":"https://orcid.org/0000-0002-7912-027X"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Han","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102017383","display_name":"Pengfei Yu","orcid":"https://orcid.org/0000-0002-9926-9442"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Yu","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104360912","display_name":"Yang Liu","orcid":"https://orcid.org/0009-0001-2596-8419"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5117243255"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07750666,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4134","last_page":"4145"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.755695104598999},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.5783637762069702},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5225098729133606},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5167814493179321},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5011136531829834},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4716488718986511},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3168463408946991},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2017783522605896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.755695104598999},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.5783637762069702},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5225098729133606},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5167814493179321},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5011136531829834},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4716488718986511},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3168463408946991},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2017783522605896},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3696410.3714723","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3696410.3714723","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3696410.3714723","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Web Conference 2025","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3696410.3714723","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3696410.3714723","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3696410.3714723","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Web Conference 2025","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4409657448.pdf","grobid_xml":"https://content.openalex.org/works/W4409657448.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1546563748","https://openalex.org/W1619770058","https://openalex.org/W2156487548","https://openalex.org/W2485797780","https://openalex.org/W2798938542","https://openalex.org/W2939057911","https://openalex.org/W2940949463","https://openalex.org/W2969294022","https://openalex.org/W3013156154","https://openalex.org/W3033150170","https://openalex.org/W3046609696","https://openalex.org/W3088385171","https://openalex.org/W3107418514","https://openalex.org/W3117923638","https://openalex.org/W3119533254","https://openalex.org/W3138081324","https://openalex.org/W3155555003","https://openalex.org/W3170418062","https://openalex.org/W3191817707","https://openalex.org/W3198151908","https://openalex.org/W3211099997","https://openalex.org/W4206578767","https://openalex.org/W4212937970","https://openalex.org/W4226064176","https://openalex.org/W4230792291","https://openalex.org/W4232751114","https://openalex.org/W4232975446","https://openalex.org/W4238091974","https://openalex.org/W4309857285","https://openalex.org/W4311263188","https://openalex.org/W4312529005","https://openalex.org/W4313171097","https://openalex.org/W4313598843","https://openalex.org/W4367046638","https://openalex.org/W4376606648","https://openalex.org/W4380520367","https://openalex.org/W4384155734","https://openalex.org/W4391069661","https://openalex.org/W4400120919","https://openalex.org/W4400121797","https://openalex.org/W4400410018","https://openalex.org/W4401878097"],"related_works":["https://openalex.org/W2095999892","https://openalex.org/W2018764758","https://openalex.org/W2383689843","https://openalex.org/W1550668881","https://openalex.org/W617913288","https://openalex.org/W2062873522","https://openalex.org/W2319323865","https://openalex.org/W2951745010","https://openalex.org/W2347958299","https://openalex.org/W2963125730"],"abstract_inverted_index":{"WebAssembly":[0],"(Wasm)":[1],"is":[2,64],"a":[3,82,133,177],"universal":[4],"low-level":[5],"bytecode":[6],"designed":[7],"to":[8,28,87,106,131,159,184],"build":[9,176],"modern":[10],"web":[11,60],"systems.":[12],"Recent":[13],"studies":[14],"have":[15],"shown":[16],"that":[17],"technologies":[18],"such":[19],"as":[20,57],"voltage":[21],"scaling":[22],"and":[23,62,123,128,156,180,198,217],"RowHammer":[24],"attacks":[25],"are":[26],"expected":[27],"increase":[29],"the":[30,47,69,89,141,204],"likelihood":[31],"of":[32,49,71,92,114,144,209],"bit":[33,50,93,186],"flips,":[34],"which":[35,55,139],"may":[36],"cause":[37],"unacceptable":[38],"or":[39],"catastrophic":[40],"system":[41,183],"failures.":[42],"This":[43],"raises":[44],"concerns":[45],"about":[46],"impact":[48],"flips":[51,94,187],"on":[52,148],"Wasm":[53,72,96,178,189],"programs,":[54],"run":[56],"instructions":[58],"in":[59,207],"systems,":[61],"it":[63],"an":[65],"undeveloped":[66],"topic":[67],"since":[68],"features":[70],"differ":[73],"from":[74],"traditional":[75],"programs.":[76,97],"In":[77,173],"this":[78,149],"paper,":[79],"we":[80,99,119,151,175],"propose":[81],"novel":[83],"paradigm,":[84],"namely":[85],"IVPSEG,":[86],"understand":[88],"error":[90,145,166],"propagation":[91,167],"within":[95],"Specifically,":[98],"first":[100],"use":[101],"Large":[102],"Language":[103],"Models":[104],"(LLMs)":[105],"automatically":[107],"extract":[108],"instruction":[109,161,170],"embeddings":[110,122,162],"containing":[111],"semantic":[112,134],"knowledge":[113],"each":[115],"instruction's":[116],"context.":[117],"Then,":[118],"exploit":[120],"these":[121],"program":[124],"structure":[125],"(control":[126],"execution":[127],"data":[129],"transfer)":[130],"construct":[132],"enhanced":[135],"code":[136],"property":[137],"graph,":[138,150],"implicates":[140],"potential":[142],"path":[143],"propagation.":[146],"Based":[147],"utilize":[152],"graph":[153],"neural":[154],"networks":[155],"attention":[157],"diffusion":[158],"optimize":[160],"by":[163],"capturing":[164],"different":[165],"patterns":[168],"for":[169],"vulnerability":[171],"prediction.":[172],"particular,":[174],"compilation":[179],"fault":[181],"generation":[182],"simulate":[185],"at":[188],"runtime.":[190],"Our":[191],"experimental":[192],"results":[193],"with":[194],"14":[195],"benchmark":[196],"programs":[197],"test":[199],"cases":[200],"show":[201],"IVPSEG":[202],"outperforms":[203],"state-of-the-art":[205],"methods":[206],"terms":[208],"accuracy":[210],"(average":[211,215],"13.06%\u037d":[212],"),":[213],"F1-score":[214],"14.93%\u2191),":[216],"model":[218],"robustness.":[219]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
