{"id":"https://openalex.org/W7125767459","doi":"https://doi.org/10.3233/faia251707","title":"BiAttnNet: A Bidirectional Attentive Framework for Firmware Semantic Modeling in Industrial Control System Security","display_name":"BiAttnNet: A Bidirectional Attentive Framework for Firmware Semantic Modeling in Industrial Control System Security","publication_year":2026,"publication_date":"2026-01-27","ids":{"openalex":"https://openalex.org/W7125767459","doi":"https://doi.org/10.3233/faia251707"},"language":null,"primary_location":{"id":"doi:10.3233/faia251707","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251707","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/faia251707","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123920761","display_name":"Linfeng Du","orcid":null},"institutions":[{"id":"https://openalex.org/I4210113818","display_name":"China Electronic Product Reliability and Environmental Test Institute","ror":"https://ror.org/01f4k3b46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210113818"]},{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Linfeng Du","raw_affiliation_strings":["China Electronic Product Reliability and Environmental Testing Research Institute, Guangzhou, China","Key Laboratory of General Quality Technology and Application of Intelligent Manufacturing Equipment, Ministry of Industry and Information Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"China Electronic Product Reliability and Environmental Testing Research Institute, Guangzhou, China","institution_ids":["https://openalex.org/I4210113818"]},{"raw_affiliation_string":"Key Laboratory of General Quality Technology and Application of Intelligent Manufacturing Equipment, Ministry of Industry and Information Technology, Guangzhou, China","institution_ids":["https://openalex.org/I890469752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123983396","display_name":"Lei Yun","orcid":null},"institutions":[{"id":"https://openalex.org/I4210113818","display_name":"China Electronic Product Reliability and Environmental Test Institute","ror":"https://ror.org/01f4k3b46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210113818"]},{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Yun","raw_affiliation_strings":["China Electronic Product Reliability and Environmental Testing Research Institute, Guangzhou, China","Key Laboratory of General Quality Technology and Application of Intelligent Manufacturing Equipment, Ministry of Industry and Information Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"China Electronic Product Reliability and Environmental Testing Research Institute, Guangzhou, China","institution_ids":["https://openalex.org/I4210113818"]},{"raw_affiliation_string":"Key Laboratory of General Quality Technology and Application of Intelligent Manufacturing Equipment, Ministry of Industry and Information Technology, Guangzhou, China","institution_ids":["https://openalex.org/I890469752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123995997","display_name":"Siqi Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siqi Zhang","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124020703","display_name":"Jiangchuan Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangchuan Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124014285","display_name":"Ziyu Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyu Liu","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123964731","display_name":"Junjiang He","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjiang He","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5123920761"],"corresponding_institution_ids":["https://openalex.org/I4210113818","https://openalex.org/I890469752"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.57754011,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.5740000009536743,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.5740000009536743,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.1152999997138977,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.08030000329017639,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.8269000053405762},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.6082000136375427},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5885000228881836},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.49320000410079956},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.4510999917984009},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.3546000123023987}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.8269000053405762},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8195000290870667},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.6082000136375427},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5885000228881836},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.49320000410079956},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.4510999917984009},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3783999979496002},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36010000109672546},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3546000123023987},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.31029999256134033},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3100000023841858},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3019999861717224},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2623000144958496},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.25940001010894775}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia251707","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251707","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia251707","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251707","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.6701380610466003}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Firmware":[0],"has":[1],"become":[2],"a":[3,51,83,96,144],"critical":[4,103],"attack":[5],"surface":[6],"in":[7,23,123,151],"industrial":[8],"control":[9],"systems":[10],"(ICS),":[11],"where":[12],"vulnerabilities":[13],"can":[14],"enable":[15],"privilege":[16],"escalation,":[17],"remote":[18],"control,":[19],"or":[20],"persistent":[21],"backdoors":[22],"embedded":[24],"devices.":[25],"Accurate":[26],"semantic":[27,54,111,148],"modeling":[28],"of":[29,109],"firmware":[30,59,126,154],"functions":[31],"is":[32],"therefore":[33],"essential":[34],"for":[35,58,146],"effective":[36],"vulnerability":[37,155],"detection":[38],"and":[39,44,121],"similarity":[40],"analysis":[41],"across":[42],"architectures":[43],"optimization":[45],"levels.":[46],"This":[47],"paper":[48],"proposes":[49],"BiAttnNet,":[50],"bidirectional":[52,88],"attentive":[53],"feature":[55],"extraction":[56],"framework":[57,132],"function":[60,141],"representation.":[61,112],"The":[62],"model":[63],"first":[64],"employs":[65],"the":[66,106,110,130],"Skip-Gram":[67],"algorithm":[68],"to":[69,86],"embed":[70],"instruction":[71,78,92,137],"streams":[72],"while":[73],"preserving":[74],"operand-related":[75],"semantics":[76,138],"through":[77],"normalization.":[79],"It":[80],"then":[81],"integrates":[82],"BiLSTM":[84],"network":[85],"capture":[87],"dependencies":[89],"within":[90],"long":[91],"sequences,":[93],"followed":[94],"by":[95],"self-attention":[97],"mechanism":[98],"that":[99],"adaptively":[100],"focuses":[101],"on":[102],"instructions,":[104],"enhancing":[105],"discriminative":[107],"power":[108],"Compared":[113],"with":[114,139],"existing":[115],"methods,":[116],"BiAttnNet":[117],"demonstrates":[118],"superior":[119],"robustness":[120],"generalization":[122],"cross":[124],"platform":[125],"analysis.":[127],"More":[128],"importantly,":[129],"proposed":[131],"effectively":[133],"bridges":[134],"low":[135],"level":[136],"global":[140],"understanding,":[142],"laying":[143],"foundation":[145],"future":[147],"structural":[149],"fusion":[150],"large":[152],"scale":[153],"detection.":[156]},"counts_by_year":[],"updated_date":"2026-01-28T23:18:48.515280","created_date":"2026-01-28T00:00:00"}
