Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/117348
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Faculty of Computer and Mathematical Sciences | en_US |
| dc.creator | Gong, X | en_US |
| dc.creator | Xu, Y | en_US |
| dc.creator | Zhang, S | en_US |
| dc.creator | He, C | en_US |
| dc.date.accessioned | 2026-02-13T01:57:52Z | - |
| dc.date.available | 2026-02-13T01:57:52Z | - |
| dc.identifier.issn | 0893-6080 | en_US |
| dc.identifier.uri | http://hdl.handle.net/10397/117348 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Pergamon Press | en_US |
| dc.subject | Binary code similarity detection | en_US |
| dc.subject | Binary similarity analysis | en_US |
| dc.subject | Function semantic | en_US |
| dc.subject | Graph Matching Networks (GMN) | en_US |
| dc.subject | Transformer | en_US |
| dc.subject | Vulnerability detection | en_US |
| dc.title | ex2vec : enhancing assembly code semantics with end-to-end execution-aware embeddings | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.volume | 189 | en_US |
| dc.identifier.doi | 10.1016/j.neunet.2025.107506 | en_US |
| dcterms.abstract | Binary code similarity detection (BSCD), whose goal is to identify and analyze similar or identical functions in compiled binaries, is an essential task in computer security. Recent methods leveraging deep neural networks (DNN) for numerical vector representation of code have achieved significant success. However, these methods primarily adapt techniques from masked language modeling (MLM), encoding code instructions by predicting missing values from an instruction context, which limits their ability to fully capture execution semantics. In this paper, we propose Ex2vec, an innovative end-to-end encoding method that generates high-quality embeddings rich in execution semantics for BCSD. Ex2vec employs a novel pre-training strategy that enables the model to learn the impact of assembly instructions on register states, thus mitigating the reliance on learning the frequency and co-occurrence of the instructions in the assembly context. By simulating the execution of assembly instructions, Ex2Vec accurately captures the semantic features of assembly code, which is further demonstrated by Principal Component Analysis (PCA) that functionally similar instructions cluster closely in the embedding space. Extensive experiments on large datasets validate that Ex2vec performs exceptionally well in binary code similarity detection, surpassing all existing state-of-the-art methods. In real-world vulnerability detection experiments, Ex2Vec exhibits the highest accuracy. | en_US |
| dcterms.accessRights | embargoed access | en_US |
| dcterms.bibliographicCitation | Neural networks, Sept 2025, v. 189, 107506 | en_US |
| dcterms.isPartOf | Neural networks | en_US |
| dcterms.issued | 2025-09 | - |
| dc.identifier.scopus | 2-s2.0-105004392532 | - |
| dc.identifier.pmid | 40339297 | - |
| dc.identifier.artn | 107506 | en_US |
| dc.description.validate | 202602 bchy | en_US |
| dc.description.oa | Not applicable | en_US |
| dc.identifier.SubFormID | G000940/2025-11 | - |
| dc.description.fundingSource | Others | en_US |
| dc.description.fundingText | This work was supported in part by the National Natural Science Foundation of China under Grant 62406268, in part by the Central Government Guides Local Science and Technology Development Special Funds, China under Grant [2018]4008, in part by the Science and Technology Platform Project of Guizhou Province, China under grant ZSYS[2025]011, and in part by the Science and Technology Planned Project of Guizhou Province, China under grant [2023]YB449. | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.date.embargo | 2027-09-30 | en_US |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



