{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:00:34Z","timestamp":1743138034360,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031140532"},{"type":"electronic","value":"9783031140549"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-14054-9_19","type":"book-chapter","created":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T17:02:44Z","timestamp":1660150964000},"page":"190-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Using the Strings Metadata to Detect the Source Language of the Binary"],"prefix":"10.1007","author":[{"given":"Ashish","family":"Adhikari","sequence":"first","affiliation":[]},{"given":"Prasad A.","family":"Kulkarni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,11]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","unstructured":"Alrabaee, S., et al.: Compiler provenance attribution. In: Alrabaee, S., et al. (eds.) Binary Code Fingerprinting for Cybersecurity. ADIS, vol. 78, pp. 45\u201378. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-34238-8_3","DOI":"10.1007\/978-3-030-34238-8_3"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"S11","DOI":"10.1016\/j.diin.2016.04.002","volume":"18","author":"S Alrabaee","year":"2016","unstructured":"Alrabaee, S., Wang, L., Debbabi, M.: BinGold: towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs). Digit. Investig. 18, S11\u2013S22 (2016)","journal-title":"Digit. Investig."},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1007\/978-3-030-58811-3_72","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2020","author":"G Antal","year":"2020","unstructured":"Antal, G., Mosolyg\u00f3, B., V\u00e1ndor, N., Heged\u0171s, P.: A data-mining based study of security vulnerability types and their mitigation in different languages. In: Gervasi, O., et al. (eds.) ICCSA 2020. LNCS, vol. 12252, pp. 1019\u20131034. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58811-3_72"},{"key":"19_CR4","unstructured":"Arghire, G.: Detect packers, cryptors and compilers bundled with PE executables with the help of this reliable piece of software that boasts a high detection rate (2017). https:\/\/www.softpedia.com\/get\/Programming\/Packers-Crypters-Protectors\/PEiD-updated.shtml"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Filiol, E., Josse, S., Stamp, M.: Exploring hidden Markov models for virus analysis: a semantic approach. In: 2013 46th Hawaii International Conference on System Sciences, pp. 5039\u20135048 (2013)","DOI":"10.1109\/HICSS.2013.217"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Benoit, T., Marion, J.Y., Bardin, S.: Binary level toolchain provenance identification with graph neural networks. In: 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 131\u2013141 (2021)","DOI":"10.1109\/SANER50967.2021.00021"},{"key":"19_CR7","unstructured":"Bonaccorso, G.: Machine Learning Algorithms: A Reference Guide to Popular Algorithms for Data Science and Machine Learning. Packt Publishing (2017)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Coogan, K., Debray, S., Kaochar, T., Townsend, G.: Automatic static unpacking of malware binaries. In: 2009 16th Working Conference on Reverse Engineering, pp. 167\u2013176. IEEE (2009)","DOI":"10.1109\/WCRE.2009.24"},{"issue":"5","key":"19_CR9","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/3488716","volume":"65","author":"R Cox","year":"2022","unstructured":"Cox, R., Griesemer, R., Pike, R., Taylor, I.L., Thompson, K.: The Go programming language and environment. Commun. ACM 65(5), 70\u201378 (2022)","journal-title":"Commun. ACM"},{"issue":"5","key":"19_CR10","doi-asserted-by":"publisher","first-page":"405","DOI":"10.4304\/jcp.4.5.405-414","volume":"4","author":"J Dai","year":"2009","unstructured":"Dai, J., Guha, R.K., Lee, J.: Efficient virus detection using dynamic instruction sequences. J. Comput. 4(5), 405\u2013414 (2009)","journal-title":"J. Comput."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Edelson, D.R.: A mark-and-sweep collector C++. In: Proceedings of the 19th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 51\u201358. ACM (1992)","DOI":"10.1145\/143165.143178"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Eschweiler, S., Yakdan, K., Gerhards-Padilla, E.: discovRE: efficient cross-architecture identification of bugs in binary code. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23185"},{"key":"19_CR13","unstructured":"Gaynow, A.: What science can tell us about C and C++\u2019s security, 27 May 2020. https:\/\/alexgaynor.net\/2020\/may\/27\/science-on-memory-unsafety-and-security\/"},{"key":"19_CR14","unstructured":"Go Team: \u201cDownload and Install Go\u201d (2022). https:\/\/go.dev\/doc\/install"},{"key":"19_CR15","volume-title":"GCC: The Complete Reference","author":"A Griffith","year":"2002","unstructured":"Griffith, A.: GCC: The Complete Reference, 1st edn. McGraw-Hill Inc., New York (2002)","edition":"1"},{"key":"19_CR16","unstructured":"Hex-Rays: IDA F.L.I.R.T. Technology: In-Depth (2022). https:\/\/hex-rays.com\/products\/ida\/tech\/flirt\/in_depth\/"},{"key":"19_CR17","unstructured":"IDA Pro: Hex-rays IDA pro disassembler and debugger (2017). https:\/\/hex-rays.com\/"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Islam, R., Tian, R., Batten, L., Versteeg, S.: Classification of malware based on string and function feature selection. In: 2010 Second Cybercrime and Trustworthy Computing Workshop, pp. 9\u201317 (2010)","DOI":"10.1109\/CTC.2010.11"},{"key":"19_CR19","unstructured":"ISO\/IEC JTC 1\/SC22: Fortran Language Vulnerabilities (2022). http:\/\/www.open-std.org\/jtc1\/sc22\/wg23\/docs\/documents"},{"issue":"1","key":"19_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292577","volume":"52","author":"V Kalgutkar","year":"2019","unstructured":"Kalgutkar, V., Kaur, R., Gonzalez, H., Stakhanova, N., Matyukhina, A.: Code authorship attribution: methods and challenges. ACM Comput. Surv. 52(1), 1\u201336 (2019)","journal-title":"ACM Comput. Surv."},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Layton, R., Azab, A.: Authorship analysis of the Zeus botnet source code. In: 2014 Fifth Cybercrime and Trustworthy Computing Conference, pp. 38\u201343. IEEE (2014)","DOI":"10.1109\/CTC.2014.14"},{"key":"19_CR22","unstructured":"Lupsan, H.: Security vulnerability classes in popular programming languages (2021). https:\/\/versprite.com\/blog\/security-research\/security-vulnerability-classes-in-popular-programming-languages\/"},{"key":"19_CR23","unstructured":"Myers, N.C.: Memory Management in C++, pp. 363\u2013374. SIGS Publications, Inc., Thousand Oaks (1996)"},{"key":"19_CR24","doi-asserted-by":"publisher","first-page":"163461","DOI":"10.1109\/ACCESS.2021.3132950","volume":"9","author":"D Pizzolotto","year":"2021","unstructured":"Pizzolotto, D., Inoue, K.: Identifying compiler and optimization level in binary code from multiple architectures. IEEE Access 9, 163461\u2013163475 (2021)","journal-title":"IEEE Access"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Rosenblum, N., Miller, B.P., Zhu, X.: Recovering the toolchain provenance of binary code. In: Proceedings of the 2011 International Symposium on Software Testing and Analysis, pp. 100\u2013110. ACM (2011)","DOI":"10.1145\/2001420.2001433"},{"key":"19_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-23822-2_10","volume-title":"Computer Security \u2013 ESORICS 2011","author":"N Rosenblum","year":"2011","unstructured":"Rosenblum, N., Zhu, X., Miller, B.P.: Who wrote this code? identifying the authors of program binaries. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 172\u2013189. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23822-2_10"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Rosenblum, N.E., Miller, B.P., Zhu, X.: Extracting compiler provenance from program binaries. In: Proceedings of the 9th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, pp. 21\u201328. ACM (2010)","DOI":"10.1145\/1806672.1806678"},{"key":"19_CR28","unstructured":"Rust Team: Guide to Rustc development (2022). https:\/\/www.swift.org\/swift-compiler\/"},{"key":"19_CR29","unstructured":"Sarda, S., Pandey, M.: LLVM Essentials. Packt Publishing (2015)"},{"key":"19_CR30","unstructured":"Swift Team: Swift Compiler (2022). https:\/\/www.swift.org\/swift-compiler\/"},{"issue":"4","key":"19_CR31","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/64.511768","volume":"11","author":"GJ Tesauro","year":"1996","unstructured":"Tesauro, G.J., Kephart, J.O., Sorkin, G.B.: Neural networks for computer virus recognition. IEEE Expert 11(4), 5\u20136 (1996)","journal-title":"IEEE Expert"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Tian, R., Batten, L., Islam, M.R., Versteeg, S.: An automated classification system based on the strings of Trojan and virus families, pp. 23\u201330, November 2009","DOI":"10.1109\/MALWARE.2009.5403021"},{"key":"19_CR33","doi-asserted-by":"publisher","first-page":"49160","DOI":"10.1109\/ACCESS.2021.3069227","volume":"9","author":"Z Tian","year":"2021","unstructured":"Tian, Z., Huang, Y., Xie, B., Chen, Y., Chen, L., Wu, D.: Fine-grained compiler identification with sequence-oriented neural modeling. IEEE Access 9, 49160\u201349175 (2021)","journal-title":"IEEE Access"},{"key":"19_CR34","unstructured":"Tung, L.: Programming language security: These are the worst bugs for each top language (2020). https:\/\/www.zdnet.com\/article\/programming-language-security-these-are-the-worst-bugs-for-each-top-language\/"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Wang, S., Wang, P., Wu, D.: Semantics-aware machine learning for function recognition in binary code. In: 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME) (2017)","DOI":"10.1109\/ICSME.2017.59"},{"key":"19_CR36","unstructured":"WhiteSource: What are the most secure programming languages? (2021). https:\/\/www.whitesourcesoftware.com\/most-secure-programming-languages\/"},{"key":"19_CR37","unstructured":"Wikibooks: C programming (2017). https:\/\/en.wikibooks.org\/wiki\/C_Programming"},{"key":"19_CR38","doi-asserted-by":"publisher","first-page":"65889","DOI":"10.1109\/ACCESS.2019.2917668","volume":"7","author":"H Xue","year":"2019","unstructured":"Xue, H., Sun, S., Venkataramani, G., Lan, T.: Machine learning-based analysis of program binaries: a comprehensive study. IEEE Access 7, 65889\u201365912 (2019)","journal-title":"IEEE Access"},{"key":"19_CR39","doi-asserted-by":"crossref","unstructured":"Zeng, J., Fu, Y., Miller, K.A., Lin, Z., Zhang, X., Xu, D.: Obfuscation resilient binary code reuse through trace-oriented programming. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 487\u2013498 (2013)","DOI":"10.1145\/2508859.2516664"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the ICR\u201922 International Conference on Innovations in Computing Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14054-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T17:04:39Z","timestamp":1660151079000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14054-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031140532","9783031140549"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14054-9_19","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Innovations in Computing Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icr12022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iicser.org\/icr22","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}