{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:44:29Z","timestamp":1757627069600,"version":"3.44.0"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944475"},{"type":"electronic","value":"9783031944482"}],"license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94448-2_6","type":"book-chapter","created":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T19:08:27Z","timestamp":1756667307000},"page":"108-130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Is This the\u00a0Same Code? A Comprehensive Study of\u00a0Decompilation Techniques for\u00a0WebAssembly Binaries"],"prefix":"10.1007","author":[{"given":"Wei-Cheng","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yutian","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Hallgrimur David","family":"Egilsson","sequence":"additional","affiliation":[]},{"given":"David","family":"Park","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Hauser","sequence":"additional","affiliation":[]},{"given":"Weihang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,1]]},"reference":[{"key":"6_CR1","unstructured":"Akbary, S.: Wasmer, January 2023. https:\/\/wasmer.io\/"},{"key":"6_CR2","unstructured":"Angr: Angr (2023). https:\/\/angr.io\/"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Attrapadung, N., Hanaoka, G., Mitsunari, S., Sakai, Y., Shimizu, K., Teruya, T.: Efficient two-level homomorphic encryption in prime-order bilinear groups and a fast implementation in WebAssembly. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 685\u2013697 (2018)","DOI":"10.1145\/3196494.3196552"},{"key":"6_CR4","unstructured":"Auten, J.: Github - wwwg\/wasmdec: WebAssembly to C decompiler (2023). https:\/\/wwwg.github.io\/web-wasmdec\/"},{"key":"6_CR5","unstructured":"Battagline, R.: Hands-on Game Development with WebAssembly: Learn WebAssembly C++ Programming by Building a Retro Space Game. Packt Publishing Ltd. (2019)"},{"key":"6_CR6","unstructured":"Benali, A.: An initial investigation of neural decompilation for WebAssembly (2022)"},{"key":"6_CR7","unstructured":"Brandefelt, L.: Decompilation of WebAssembly using Datalog (2022)"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Chen, G., et al.: A refined decompiler to generate c code with high readability. In: 2010 17th Working Conference on Reverse Engineering, pp. 150\u2013154. IEEE Computer Society, Beverly, MA (2010). https:\/\/doi.org\/10.1109\/WCRE.2010.24","DOI":"10.1109\/WCRE.2010.24"},{"key":"6_CR9","unstructured":"Clang: Clang Indexing Library Bindings \u2014 libclang 15.0.6 documentation (2023). https:\/\/libclang.readthedocs.io\/en\/latest\/#"},{"key":"6_CR10","unstructured":"Emscripten contributors: Emscripten documentation. https:\/\/emscripten.org\/index.html"},{"key":"6_CR11","unstructured":"WABT developers: The WebAssembly Binary Toolkit (2023). https:\/\/github.com\/WebAssembly\/wabt"},{"key":"6_CR12","unstructured":"WABT developers: Wabt documentation (2023). https:\/\/webassembly.github.io\/wabt\/doc\/wasm-decompile.1.html"},{"key":"6_CR13","unstructured":"WABT developers: Wasm2c Documentation (2023). https:\/\/webassembly.github.io\/wabt\/doc\/wasm2c.1.html"},{"key":"6_CR14","unstructured":"Gohman, D.: Wasmtime, February 2023. https:\/\/wasmtime.dev\/"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Gurdeep\u00a0Singh, R., Scholliers, C.: WARDuino: a dynamic WebAssembly virtual machine for programming microcontrollers. In: Proceedings of the 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, MPLR 2019, pp. 27\u201336. Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3357390.3361029","DOI":"10.1145\/3357390.3361029"},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"Haas, A., et al.: Bringing the web up to speed with WebAssembly. In: Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2017, pp. 185\u2013200. Association for Computing Machinery, New York, NY, USA, June 2017. https:\/\/doi.org\/10.1145\/3062341.3062363. https:\/\/dl.acm.org\/doi\/10.1145\/3062341.3062363","DOI":"10.1145\/3062341.3062363"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Hara, Y., Tomiyama, H., Honda, S., Takada, H.: Proposal and quantitative analysis of the CHStone benchmark program suite for practical C-based high-level synthesis. J. Inf. Process. 17, 242\u2013254 (2009)","DOI":"10.2197\/ipsjjip.17.242"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Hilbig, A., Lehmann, D., Pradel, M.: An empirical study of real-world WebAssembly binaries: security, languages, use cases. In: Proceedings of the Web Conference 2021, pp. 2696\u20132708. ACM, Ljubljana Slovenia, April 2021. https:\/\/doi.org\/10.1145\/3442381.3450138. https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3450138","DOI":"10.1145\/3442381.3450138"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Jeong, H., Jeong, J., Park, S., Kim, K.: WATT: a novel web-based toolkit to generate WebAssembly-based libraries and applications. In: 2018 IEEE International Conference on Consumer Electronics (ICCE), pp.\u00a01\u20132. IEEE (2018)","DOI":"10.1109\/ICCE.2018.8326230"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Konoth, R.K., et al.: MineSweeper: an in-depth look into drive-by cryptocurrency mining and its defense. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1714\u20131730 (2018)","DOI":"10.1145\/3243734.3243858"},{"key":"6_CR21","unstructured":"K\u0159oustek, J., Matula, P., Zemek, P.: RetDec: an open-source machine-code decompiler, July 2017"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Lattner, C., Adve, V.: LLVM: a compilation framework for lifelong program analysis & transformation. In: International Symposium on Code Generation and Optimization, CGO 2004, pp. 75\u201386. IEEE (2004)","DOI":"10.1109\/CGO.2004.1281665"},{"key":"6_CR23","unstructured":"Lehmann, D., Kinder, J., Pradel, M.: Everything old is new again: binary security of WebAssembly. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 217\u2013234 (2020)"},{"key":"6_CR24","doi-asserted-by":"publisher","unstructured":"Liu, R., Garcia, L., Srivastava, M.: Aerogel: lightweight access control framework for WebAssembly-based bare-metal IoT devices. In: 2021 IEEE\/ACM Symposium on Edge Computing (SEC), pp. 94\u2013105. Institute of Electrical and Electronics Engineers, New York City, NY (2021). https:\/\/doi.org\/10.1145\/3453142.3491282","DOI":"10.1145\/3453142.3491282"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Liu, Z., Wang, S.: How far we have come: testing decompilation correctness of C decompilers. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 475\u2013487 (2020)","DOI":"10.1145\/3395363.3397370"},{"key":"6_CR26","unstructured":"Marjam\u00e4ki, D.: Cppcheck. https:\/\/cppcheck.sourceforge.io\/"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"McCabe, T.J.: A complexity measure. IEEE Trans. Softw. Eng. SE-2(4), 308\u2013320 (1976)","DOI":"10.1109\/TSE.1976.233837"},{"key":"6_CR28","unstructured":"McCallum, T.: The future of eWASM (2019). https:\/\/hackernoon.com\/diving-into-ethereums-virtual-machine-the-future-of-ewasm-wrk32iy"},{"key":"6_CR29","volume-title":"Code Complete","author":"S McConnell","year":"2004","unstructured":"McConnell, S.: Code Complete, 2nd edn. Microsoft Press, United States (2004)","edition":"2"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Musch, M., Wressnegger, C., Johns, M., Rieck, K.: Thieves in the browser: web-based Cryptojacking in the wild. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2019)","DOI":"10.1145\/3339252.3339261"},{"key":"6_CR31","unstructured":"M\u00fcller, B.: W2c2 (2023). https:\/\/github.com\/turbolent\/w2c2"},{"key":"6_CR32","unstructured":"Narayan, S., et al.: Retrofitting fine grain isolation in the Firefox renderer. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 699\u2013716. USENIX Association, Berkeley, CA, August 2020. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/narayan"},{"key":"6_CR33","unstructured":"Narayan, S., Garfinkel, T., Lerner, S., Shacham, H., Stefan, D.: Gobi: Webassembly as a practical path to library sandboxing. arXiv preprint arXiv:1912.02285 (2019)"},{"key":"6_CR34","unstructured":"Nguyen, V., Deeds-Rubin, S., Tan, T., Boehm, B.: A SLOC counting standard. In: COCOMO II Forum, vol.\u00a02007, pp. 1\u201316. Citeseer (2007)"},{"key":"6_CR35","unstructured":"NSA: Ghidra (2023). https:\/\/ghidra-sre.org\/"},{"key":"6_CR36","unstructured":"OpenCV: Opencv: Build opencv.js. https:\/\/docs.opencv.org\/4.7.0\/d4\/da1\/tutorial_js_setup.html"},{"key":"6_CR37","doi-asserted-by":"publisher","unstructured":"Pop, V.A.B., Niemi, A., Manea, V., Rusanen, A., Ekberg, J.E.: Towards securely migrating WebAssembly enclaves. In: Proceedings of the 15th European Workshop on Systems Security, EuroSec 2022, pp. 43\u201349. Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3517208.3523755","DOI":"10.1145\/3517208.3523755"},{"key":"6_CR38","unstructured":"Pouchet, L.N.: PolyBench\/C \u2013 Homepage of Louis-No\u00ebl Pouchet (2023). https:\/\/web.cse.ohio-state.edu\/~pouchet.2\/software\/polybench\/"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Romano, A., Liu, X., Kwon, Y., Wang, W.: An empirical study of bugs in WebAssembly compilers. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 42\u201354. IEEE (2021)","DOI":"10.1109\/ASE51524.2021.9678776"},{"key":"6_CR40","unstructured":"Rossberg, A.: Introduction - WebAssembly 2.0 (draft 2023-03-01), March 2023. https:\/\/webassembly.github.io\/spec\/core\/intro\/introduction.html"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Schulte, E., Ruchti, J., Noonan, M., Ciarletta, D., Loginov, A.: Evolving exact decompilation. In: Workshop on Binary Analysis Research (BAR) (2018)","DOI":"10.14722\/bar.2018.23008"},{"key":"6_CR42","unstructured":"Software, P.: WebAssembly analysis (2023). https:\/\/www.pnfsoftware.com\/jeb\/manual\/webassembly\/"},{"key":"6_CR43","unstructured":"Wagner, L.: WebAssembly consensus and end of browser preview, February 2017"},{"issue":"9","key":"6_CR44","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1109\/32.6178","volume":"14","author":"EJ Weyuker","year":"1988","unstructured":"Weyuker, E.J.: Evaluating software complexity measures. IEEE Trans. Softw. Eng. 14(9), 1357\u20131365 (1988)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"6_CR45","unstructured":"Wwwg: Wwwg\/wasmdec: Webassembly to c decompiler (2023). https:\/\/github.com\/wwwg\/wasmdec"},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Yakdan, K., Eschweiler, S., Gerhards-Padilla, E., Smith, M.: No more gotos: decompilation using pattern-independent control-flow structuring and semantic-preserving transformations. In: NDSS. Citeseer (2015)","DOI":"10.14722\/ndss.2015.23185"},{"key":"6_CR47","doi-asserted-by":"crossref","unstructured":"Yang, X., Chen, Y., Eide, E., Regehr, J.: Finding and understanding bugs in c compilers. In: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 283\u2013294 (2011)","DOI":"10.1145\/1993498.1993532"},{"key":"6_CR48","unstructured":"Yegord: Yegord\/snowman: Snowman decompiler (2023). https:\/\/github.com\/yegord\/snowman"},{"key":"6_CR49","unstructured":"Yuan, A., Dukhan, M.: Supercharging the TensorFlow.js WebAssembly backend with SIMD and multi-threading (2020). https:\/\/blog.tensorflow.org\/2020\/09\/supercharging-tensorflowjs-webassembly.html"},{"key":"6_CR50","unstructured":"Zakai, A.: WasmBoxC: Simple, easy, and fast VM-less sandboxing. https:\/\/kripken.github.io\/blog\/wasm\/2020\/07\/27\/wasmboxc.html"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94448-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T00:16:15Z","timestamp":1757463375000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94448-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"ISBN":["9783031944475","9783031944482"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94448-2_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,9,1]]},"assertion":[{"value":"1 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}