{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:44:56Z","timestamp":1766159096635,"version":"3.40.3"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031226762"},{"type":"electronic","value":"9783031226779"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-22677-9_21","type":"book-chapter","created":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T09:04:32Z","timestamp":1673341472000},"page":"392-411","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Automated Binary Analysis: A Survey"],"prefix":"10.1007","author":[{"given":"Zian","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Ejaz","sequence":"additional","affiliation":[]},{"given":"Dongxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,11]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","unstructured":"Aafer, Y., Tao, G., Huang, J., Zhang, X., Li, N.: Precise android API protection mapping derivation and reasoning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. CCS 2018, pp. 1151\u20131164. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3243734.3243842","DOI":"10.1145\/3243734.3243842"},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Afianian, A., Niksefat, S., Sadeghiyan, B., Baptiste, D.: Malware dynamic analysis evasion techniques: a survey. ACM Comput. Surv. 52(6) (2019). https:\/\/doi.org\/10.1145\/3365001","DOI":"10.1145\/3365001"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: NDSS. The Internet Society (2014). https:\/\/dblp.uni-trier.de\/db\/conf\/ndss\/ndss2014.html#ArpSHGR14","DOI":"10.14722\/ndss.2014.23247"},{"key":"21_CR4","doi-asserted-by":"publisher","unstructured":"Arzt, S., et al.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. PLDI 2014, pp. 259\u2013269. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2594291.2594299","DOI":"10.1145\/2594291.2594299"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3182657","volume":"51","author":"R Baldoni","year":"2018","unstructured":"Baldoni, R., Coppa, E., D\u2019Elia, D.C., Demetrescu, C., Finocchi, I.: A survey of symbolic execution techniques. ACM Comput. Surv. (CSUR) 51, 1\u201339 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Bardin, S., David, R., Marion, J.Y.: Backward-bounded DSE: targeting infeasibility questions on obfuscated codes. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 633\u2013651 (2017)","DOI":"10.1109\/SP.2017.36"},{"key":"21_CR7","doi-asserted-by":"publisher","unstructured":"Bhat, P., Dutta, K.: A survey on various threats and current state of security in android platform. ACM Comput. Surv. 52(1) (2019). https:\/\/doi.org\/10.1145\/3301285","DOI":"10.1145\/3301285"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Biondo, A., Conti, M., Lain, D.: Back to the epilogue: evading control flow guard via unaligned targets. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23318"},{"key":"21_CR9","unstructured":"Blazytko, T., Contag, M., Aschermann, C., Holz, T.: Syntia: synthesizing the semantics of obfuscated code. In: Proceedings of the 26th USENIX Conference on Security Symposium. SEC 2017, pp. 643\u2013659. USENIX Association, USA (2017)"},{"key":"21_CR10","doi-asserted-by":"publisher","unstructured":"Chandramohan, M., Xue, Y., Xu, Z., Liu, Y., Cho, C.Y., Tan, H.B.K.: Bingo: cross-architecture cross-OS binary search. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, p. 678\u2013689. FSE 2016, Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2950290.2950350","DOI":"10.1145\/2950290.2950350"},{"key":"21_CR11","unstructured":"Chapman, J.P.: Sad thug: structural anomaly detection for transmissions of high-value information using graphics. In: Proceedings of the 27th USENIX Conference on Security Symposium. SEC 2018, pp. 1147\u20131164. USENIX Association, USA (2018)"},{"key":"21_CR12","unstructured":"Chen, K., et al.: Finding unknown malice in 10 seconds: mass vetting for new threats at the google-play scale. In: USENIX Security, pp. 659\u2013674 (2015)"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1109\/TIFS.2019.2932228","volume":"15","author":"X Chen","year":"2020","unstructured":"Chen, X., et al.: Android HIV: a study of repackaging malware for evading machine-learning detection. IEEE Trans. Inf. Forensics Secur. 15, 987\u20131001 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Norax: enabling execute-only memory for cots binaries on aarch64. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 304\u2013319 (2017)","DOI":"10.1109\/SP.2017.30"},{"key":"21_CR15","doi-asserted-by":"publisher","unstructured":"Chen, Y., You, W., Lee, Y., Wang, K.C.X., Zou, W.: Mass discovery of android traffic imprints through instantiated partial execution. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), pp. 815\u2013828. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3133956.3134009","DOI":"10.1145\/3133956.3134009"},{"key":"21_CR16","doi-asserted-by":"publisher","unstructured":"Cheng, B., et al.: Towards paving the way for large-scale windows malware analysis: generic binary unpacking with orders-of-magnitude performance boost. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), pp. 395\u2013411. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3243734.3243771","DOI":"10.1145\/3243734.3243771"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Chua, L.Z., Wang, Y., Baluta, T., Saxena, P., Liang, Z., Su, P.: One engine to serve \u2019em all - inferring taint rules without architectural semantics. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23339"},{"key":"21_CR18","unstructured":"Chua, Z.L., Shen, S., Saxena, P., Liang, Z.: Neural nets can learn function type signatures from binaries. In: Proceedings of the 26th USENIX Conference on Security Symposium. SEC 2017, pp. 99\u2013116. USENIX Association, USA (2017)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Ding, S.H.H., Fung, B.C.M., Charland, P.: ASM2VEC: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 472\u2013489 (2019)","DOI":"10.1109\/SP.2019.00003"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Duan, Y., et al.: Things you may not know about android (un)packers: a systematic study based on whole-system emulation. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23296"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Feng, Q., Zhou, R., Xu, C., Cheng, Y., Testa, B., Yin, H.: Scalable graph-based bug search for firmware images. In: ACM Conference on Computer and Communications Security (CCS 2016) (2016)","DOI":"10.1145\/2976749.2978370"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: semantics-based detection of android malware through static analysis. In: FSE, pp. 576\u2013587 (2014)","DOI":"10.1145\/2635868.2635869"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Feng, Y., Bastani, O., Martins, R., Dillig, I., Anand, S.: Automated synthesis of semantic malware signatures using maximum satisfiability. In: NDSS. The Internet Society (2017). https:\/\/dblp.uni-trier.de\/db\/conf\/ndss\/ndss2017.html#FengBMDA17","DOI":"10.14722\/ndss.2017.23379"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Fratantonio, Y., Bianchi, A., Robertson, W.K., Kirda, E., Kr\u00fcgel, C., Vigna, G.: TriggerScope: towards detecting logic bombs in android applications. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 377\u2013396 (2016)","DOI":"10.1109\/SP.2016.30"},{"key":"21_CR25","unstructured":"Gasparis, I., Qian, Z., Song, C., Krishnamurthy, S.V.: Detecting android root exploits by learning from root providers. In: Proceedings of the 26th USENIX Conference on Security Symposium. SEC 2017, pp. 1129\u20131144. USENIX Association, USA (2017)"},{"key":"21_CR26","doi-asserted-by":"publisher","unstructured":"Ghaffarinia, M., Hamlen, K.W.: Binary control-flow trimming. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS 2019, pp. 1009\u20131022. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3319535.3345665","DOI":"10.1145\/3319535.3345665"},{"key":"21_CR27","unstructured":"Guo, W., Mu, D., Xing, X., Du, M., Song, D.: DeepVSA: facilitating value-set analysis with deep learning for postmortem program analysis. In: Proceedings of the 28th USENIX Conference on Security Symposium. SEC 2019, pp. 1787\u20131804. USENIX Association, USA (2019)"},{"key":"21_CR28","doi-asserted-by":"publisher","unstructured":"He, J., Ivanov, P., Tsankov, P., Raychev, V., Vechev, M.: Debin: predicting debug information in stripped binaries. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. CCS 2018, pp. 1667\u20131680. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3243734.3243866","DOI":"10.1145\/3243734.3243866"},{"key":"21_CR29","doi-asserted-by":"publisher","unstructured":"Hu, Y., Zhang, Y., Li, J., Gu, D.: Binary code clone detection across architectures and compiling configurations. In: Proceedings of the 25th International Conference on Program Comprehension. ICPC 2017, pp. 88\u201398. IEEE Press (2017). https:\/\/doi.org\/10.1109\/ICPC.2017.22","DOI":"10.1109\/ICPC.2017.22"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Jagielski, M., Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., Li, B.: Manipulating machine learning: poisoning attacks and countermeasures for regression learning. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 19\u201335 (2018)","DOI":"10.1109\/SP.2018.00057"},{"key":"21_CR31","doi-asserted-by":"publisher","unstructured":"Kirat, D., Vigna, G.: Malgene: automatic extraction of malware analysis evasion signature. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. CCS 2015, pp. 769\u2013780. Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2810103.2813642","DOI":"10.1145\/2810103.2813642"},{"key":"21_CR32","unstructured":"Kirat, D., Vigna, G., Kruegel, C.: Barecloud: bare-metal analysis-based evasive malware detection. In: 23rd USENIX Security Symposium (USENIX Security 2014), pp. 287\u2013301. USENIX Association, San Diego, August 2014. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/kirat"},{"key":"21_CR33","doi-asserted-by":"publisher","unstructured":"Korczynski, D., Yin, H.: Capturing malware propagations with code injections and code-reuse attacks. In: In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), pp. 1691\u20131708. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3133956.3134099","DOI":"10.1145\/3133956.3134099"},{"key":"21_CR34","unstructured":"Lee, Y., et al.: Understanding IoS-based crowdturfing through hidden UI analysis. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 765\u2013781. USENIX Association, Santa Clara, August 2019. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/lee"},{"key":"21_CR35","doi-asserted-by":"publisher","unstructured":"Li, J., Lin, Z., Caballero, J., Zhang, Y., Gu, D.: K-hunt: pinpointing insecure cryptographic keys from execution traces. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), pp. 412\u2013425. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3243734.3243783","DOI":"10.1145\/3243734.3243783"},{"key":"21_CR36","doi-asserted-by":"crossref","unstructured":"Li, L., et al.: ICCTA: detecting inter-component privacy leaks in android apps. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 280\u2013291 (2015)","DOI":"10.1109\/ICSE.2015.48"},{"key":"21_CR37","doi-asserted-by":"publisher","unstructured":"Luo, L., Ming, J., Wu, D., Liu, P., Zhu, S.: Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. FSE 2014, pp. 389\u2013400. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2635868.2635900","DOI":"10.1145\/2635868.2635900"},{"key":"21_CR38","doi-asserted-by":"publisher","unstructured":"Maiorca, D., Biggio, B., Giacinto, G.: Towards adversarial malware detection: lessons learned from pdf-based attacks. ACM Comput. Surv. 52(4) (2019). https:\/\/doi.org\/10.1145\/3332184","DOI":"10.1145\/3332184"},{"key":"21_CR39","doi-asserted-by":"publisher","unstructured":"Mendoza, A., Gu, G.: Mobile application web API reconnaissance: web-to-mobile inconsistencies & vulnerabilities. In: 2018 IEEE Symposium on Security and Privacy (S &P 2018) (2018). https:\/\/doi.org\/10.1109\/SP.2018.00039","DOI":"10.1109\/SP.2018.00039"},{"key":"21_CR40","unstructured":"Ming, J., Xu, D., Jiang, Y., Wu, D.: Binsim: trace-based semantic binary diffing via system call sliced segment equivalence checking. In: Proceedings of the 26th USENIX Conference on Security Symposium (SEC 2017), pp. 253\u2013270. USENIX Association, USA (2017)"},{"key":"21_CR41","doi-asserted-by":"publisher","unstructured":"Onwuzurike, L., Mariconti, E., Andriotis, P., Cristofaro, E.D., Ross, G., Stringhini, G.: Mamadroid: detecting android malware by building Markov chains of behavioral models (extended version). ACM Trans. Priv. Secur. 22(2) (2019). https:\/\/doi.org\/10.1145\/3313391","DOI":"10.1145\/3313391"},{"key":"21_CR42","unstructured":"Pan, X., et al.: Flowcog: context-aware semantics extraction and analysis of information flow leaks in android apps. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 1669\u20131685. USENIX Association, Baltimore, August 2018. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/pan"},{"key":"21_CR43","doi-asserted-by":"crossref","unstructured":"Pan, X., Wang, X., Duan, Y., Wang, X., Yin, H.: Dark hazard: learning-based, large-scale discovery of hidden sensitive operations in android apps. In: 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, 26 February\u20131 March 2017. The Internet Society (2017). https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/dark-hazard-learning-based-large-scale-discovery-hidden-sensitive-operations-android-apps\/","DOI":"10.14722\/ndss.2017.23265"},{"key":"21_CR44","unstructured":"Qian, C., Hu, H., Alharthi, M., Chung, P.H., Kim, T., Lee, W.: Razor: a framework for post-deployment software debloating. In: Proceedings of the 28th USENIX Conference on Security Symposium (SEC 2019), pp. 1733\u20131750. USENIX Association (2019)"},{"key":"21_CR45","doi-asserted-by":"publisher","unstructured":"Schwartz, E.J., Cohen, C.F., Duggan, M., Gennari, J., Havrilla, J.S., Hines, C.: Using logic programming to recover C++ classes and methods from compiled executables. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), pp. 426\u2013441. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3243734.3243793","DOI":"10.1145\/3243734.3243793"},{"key":"21_CR46","doi-asserted-by":"crossref","unstructured":"Shoshitaishvili, Y., et al.: Sok: (state of) the art of war: offensive techniques in binary analysis. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 138\u2013157 (2016)","DOI":"10.1109\/SP.2016.17"},{"key":"21_CR47","doi-asserted-by":"publisher","unstructured":"Wang, R., et al.: Ramblr: making reassembly great again, January 2017. https:\/\/doi.org\/10.14722\/ndss.2017.23225","DOI":"10.14722\/ndss.2017.23225"},{"key":"21_CR48","unstructured":"Wang, S., Wang, P., Wu, D.: Reassembleable disassembling. In: Proceedings of the 24th USENIX Conference on Security Symposium. SEC 2015, pp. 627\u2013642. USENIX Association, USA (2015)"},{"key":"21_CR49","unstructured":"Wang, X., Sun, Y., Nanda, S., Wang, X.: Looking from the mirror: evaluating IoT device security through mobile companion apps. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 1151\u20131167. USENIX Association, Santa Clara, August 2019. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/wang-xueqiang"},{"key":"21_CR50","doi-asserted-by":"publisher","unstructured":"Wenzl, M., Merzdovnik, G., Ullrich, J., Weippl, E.: From hack to elaborate technique - a survey on binary rewriting. ACM Comput. Surv. 52(3) (2019). https:\/\/doi.org\/10.1145\/3316415","DOI":"10.1145\/3316415"},{"key":"21_CR51","doi-asserted-by":"crossref","unstructured":"Wong, M.Y., Lie, D.: Intellidroid: a targeted input generator for the dynamic analysis of android malware. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23118"},{"key":"21_CR52","unstructured":"Wong, M.Y., Lie, D.: Tackling runtime-based obfuscation in android with tiro. In: Proceedings of the 27th USENIX Conference on Security Symposium (SEC 2018), pp. 1247\u20131262. USENIX Association, USA (2018)"},{"key":"21_CR53","unstructured":"Wu, W., Chen, Y., Xing, X., Zou, W.: Kepler: facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerabilities. In: Proceedings of the 28th USENIX Conference on Security Symposium (SEC 2019), pp. 1187\u20131204. USENIX Association, USA (2019)"},{"key":"21_CR54","doi-asserted-by":"publisher","unstructured":"Xu, D., Ming, J., Fu, Y., Wu, D.: VMHunt: a verifiable approach to partially-virtualized binary code simplification. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), pp. 442\u2013458. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3243734.3243827","DOI":"10.1145\/3243734.3243827"},{"key":"21_CR55","doi-asserted-by":"crossref","unstructured":"Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., Song, D.X.: Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3134018"},{"key":"21_CR56","unstructured":"Xue, L., Zhou, Y., Chen, T., Luo, X., Gu, G.: Malton: towards on-device non-invasive mobile malware analysis for ART. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 289\u2013306. USENIX Association, Vancouver, August 2017. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/xue"},{"key":"21_CR57","unstructured":"Zhang, X., et al.: An empirical study of web resource manipulation in real-world mobile applications. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 1183\u20131198. USENIX Association, Baltimore, August 2018. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/zhang-xiaohan"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22677-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T09:09:50Z","timestamp":1673341790000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22677-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031226762","9783031226779"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22677-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"11 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"91","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}