Fig. 2From: Bin2vec: learning representations of binary executable programs for security tasksAn example of the program graph. Parts of the graph are highlighted in the same color, as instructions on lines 1 and 2, to demonstrate where those instructions were mapped to in the graphBack to article page