{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:17:06Z","timestamp":1742912226451,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319059471"},{"type":"electronic","value":"9783319059488"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05948-8_9","type":"book-chapter","created":{"date-parts":[[2014,3,19]],"date-time":"2014-03-19T09:09:55Z","timestamp":1395220195000},"page":"85-94","source":"Crossref","is-referenced-by-count":2,"title":["An Adaptable Infrastructure to Generate Training Datasets for Decompilation Issues"],"prefix":"10.1007","author":[{"given":"Javier","family":"Escalada","sequence":"first","affiliation":[]},{"given":"Franciso","family":"Ortin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Guilfanov, I.: Decompilers and beyond. Black Hat USA (2008)"},{"key":"9_CR2","unstructured":"Troshina, K., Chernov, A., Derevenets, Y.: C Decompilation: Is It Possible. In: Proceedings of International Workshop on Program Understanding, Altai Mountains, Russia, pp. 18\u201327 (2009)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Troshina, K., Chernov, A., Fokin, A.: Profile-based type reconstruction for decompilation. In: 2009 IEEE 17th International Conference on Program Comprehension, pp. 263\u2013267. IEEE (2009)","DOI":"10.1109\/ICPC.2009.5090054"},{"key":"9_CR4","unstructured":"Cifuentes, C.: A structuring algorithm for decompilation. In: Proceedings of the XIX Conferencia Latinoamericana de Inform\u00e1tica, pp. 267\u2013276 (1993)"},{"key":"9_CR5","unstructured":"Schwartz, E., Lee, J., Woo, M., Brumley, D.: Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring. In: USENIX Secur. Symp. (2013)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Fokin, A., Derevenetc, E., Chernov, A., Troshina, K.: SmartDec: Approaching C++ Decompilation. In: 2011 18th Working Conference on Reverse Engineering, pp. 347\u2013356. IEEE (2011)","DOI":"10.1109\/WCRE.2011.49"},{"key":"9_CR7","unstructured":"Rosenblum, N., Zhu, X., Miller, B., Hunt, K.: Learning to analyze binary computer code. In: Proceedings of the 23rd Conference on Artificial Intelligence, Chicago, pp. 798\u2013804 (2008)"},{"key":"9_CR8","unstructured":"Van Emmerik, M.: Boomerang: Information for students, \n                    http:\/\/boomerang.sourceforge.net\/students.php"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1007\/978-3-642-23808-6_34","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"R. Wartell","year":"2011","unstructured":"Wartell, R., Zhou, Y., Hamlen, K.W., Kantarcioglu, M., Thuraisingham, B.: Differentiating code from data in x86 binaries. In: Gunopulos, D., Hofmann, T., Malerba, D., Vazirgiannis, M. (eds.) ECML PKDD 2011, Part III. LNCS, vol.\u00a06913, pp. 522\u2013536. Springer, Heidelberg (2011)"},{"key":"9_CR10","unstructured":"Watt, D., Brown, D., Sebesta, R.W.: Programming Language Processors in Java: Compilers and Interpreters and Concepts of Programming Languages (2007)"},{"key":"9_CR11","unstructured":"Muchnick, S.S.: Advanced compiler design and implementation (1998)"},{"key":"9_CR12","unstructured":"Alpaydin, E.: Introduction to Machine Learning. The MIT Press (2010)"},{"key":"9_CR13","unstructured":"MSDN: Calling conventions, \n                    http:\/\/msdn.microsoft.com\/en-us\/library\/k2b2ssfy.aspx"},{"key":"9_CR14","unstructured":"J\u00f6nsson, A.: Calling conventions on the x86 platform, \n                    http:\/\/www.angelcode.com\/dev\/callconv\/callconv.html"},{"key":"9_CR15","unstructured":"Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., Stal, M.: Pattern-Oriented Software Architecture. A System of Patterns, vol.\u00a01. Wiley (1996)"},{"key":"9_CR16","unstructured":"Clang: a C language family frontend for LLVM, \n                    http:\/\/clang.llvm.org\/"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J. Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: Simplified Data Processing on Large Clusters. Commun. ACM\u00a051, 1\u201313 (2008)","journal-title":"Commun. ACM"},{"key":"9_CR18","unstructured":"Hanif, Z., Calhoun, T., Trost, J.: BinaryPig: Scalable Static Binary Analysis Over Hadoop. Black Hat USA 2013 (2012)"},{"key":"9_CR19","unstructured":"Lafferty, J., McCallum, A., Pereira, F.: Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In: Proc. 18th International Conf. on Machine Learning 18th International Conf. on Machine Learning, pp. 282\u2013289 (2001)"},{"key":"9_CR20","first-page":"21","volume-title":"Proceedings of the 9th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, PASTE 2010","author":"N.E. Rosenblum","year":"2010","unstructured":"Rosenblum, N.E., Miller, B.P., Zhu, X.: Extracting compiler provenance from program binaries. In: Proceedings of the 9th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, PASTE 2010, p. 21. ACM Press, Toronto (2010)"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-21323-6_29","volume-title":"Computational Intelligence in Security for Information Systems","author":"X. Ugarte-Pedrero","year":"2011","unstructured":"Ugarte-Pedrero, X., Santos, I., Bringas, P.G.: Structural feature based anomaly detection for packed executable identification. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol.\u00a06694, pp. 230\u2013237. Springer, Heidelberg (2011)"},{"key":"9_CR22","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/2030376.2030379","volume-title":"Proceedings of the 8th Annual Anti-Abuse and Spam Conference on Collaboration, Electronic Messaging, CEAS 2011","author":"I. Santos","year":"2011","unstructured":"Santos, I., Ugarte-Pedrero, X., Sanz, B., Laorden, C., Bringas, P.G.: Collective classification for packed executable identification. In: Proceedings of the 8th Annual Anti-Abuse and Spam Conference on Collaboration, Electronic Messaging, CEAS 2011, pp. 23\u201330. ACM Press, Perth (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","New Perspectives in Information Systems and Technologies, Volume 2"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05948-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T23:36:22Z","timestamp":1676849782000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05948-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319059471","9783319059488"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05948-8_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}