{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:47:47Z","timestamp":1747284467395,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319686899"},{"type":"electronic","value":"9783319686905"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68690-5_26","type":"book-chapter","created":{"date-parts":[[2017,10,9]],"date-time":"2017-10-09T21:14:51Z","timestamp":1507583691000},"page":"430-446","source":"Crossref","is-referenced-by-count":10,"title":["Learning Types for Binaries"],"prefix":"10.1007","author":[{"given":"Zhiwu","family":"Xu","sequence":"first","affiliation":[]},{"given":"Cheng","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Shengchao","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,11]]},"reference":[{"key":"26_CR1","unstructured":"Lin, Z., Zhang, X., Xu, D.: Automatic reverse engineering of data structures from binary execution. In: Network and Distributed System Security Symposium (2010)"},{"key":"26_CR2","unstructured":"Lee, J.H., Avgerinos, T., Brumley, D.: Tie: principled reverse engineering of types in binary programs. In: Network and Distributed System Security Symposium (2011)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Fokin, A., Derevenetc, E., Chernov, A., Troshina, K.: SmartDec: approaching C++ decompilation. In: Reverse Engineering, pp. 347\u2013356 (2011)","DOI":"10.1109\/WCRE.2011.49"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Elwazeer, K., Anand, K., Kotha, A., Smithson, M., Barua, R.: Scalable variable and data type detection in a binary rewriter. In: ACM Sigplan Conference on Programming Language Design and Implementation, pp. 51\u201360 (2013)","DOI":"10.1145\/2491956.2462165"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Noonan, M., Loginov, A., Cok, D.: Polymorphic type inference for machine code. In: ACM Sigplan Conference on Programming Language Design and Implementation, pp. 27\u201341 (2016)","DOI":"10.1145\/2908080.2908119"},{"key":"26_CR6","unstructured":"The IDA Pro and Hex-Rays. http:\/\/www.hex-rays.com\/idapro\/"},{"key":"26_CR7","unstructured":"Balakrishnan, G., Reps, T.: Analyzing memory accesses in x86 binary executables. University of Wisconsin-Madison Department of Computer Sciences (2012)"},{"issue":"2","key":"26_CR8","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"CJC Burges","year":"1998","unstructured":"Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Disc. 2(2), 121\u2013167 (1998)","journal-title":"Data Min. Knowl. Disc."},{"issue":"1","key":"26_CR9","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/PL00013831","volume":"22","author":"AJ Smola","year":"1998","unstructured":"Smola, A.J., Schlkopf, B.: On a kernel-based method for pattern recognition, regression, approximation, and operator inversion. Algorithmica 22(1), 211\u2013231 (1998)","journal-title":"Algorithmica"},{"key":"26_CR10","unstructured":"IntelCorporation: Intel 64 and IA-32 Architectures Software Developer Manuals, December 2016"},{"key":"26_CR11","volume-title":"Introduction to Modern Information Retrieval","author":"J Crnic","year":"1983","unstructured":"Crnic, J.: Introduction to Modern Information Retrieval. McGraw-Hill, New York (1983)"},{"issue":"11","key":"26_CR12","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton, G.: A vector space model for automatic indexing. Commun. ACM 18(11), 613\u2013620 (1975)","journal-title":"Commun. ACM"},{"issue":"PB","key":"26_CR13","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1016\/j.neucom.2014.08.006","volume":"149","author":"S Kang","year":"2015","unstructured":"Kang, S., Cho, S., Kang, P.: Constructing a multi-class classifier using one-against-one approach with different binary classifiers. Neurocomputing 149(PB), 677\u2013682 (2015)","journal-title":"Neurocomputing"},{"key":"26_CR14","unstructured":"LIBSVM. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/"},{"key":"26_CR15","unstructured":"178 Algorithm C language source code. http:\/\/www.codeforge.com\/article\/220463"},{"key":"26_CR16","volume-title":"Commonly Used Algorithm Assembly (C Language Description)","author":"S Xu","year":"2004","unstructured":"Xu, S.: Commonly Used Algorithm Assembly (C Language Description). Tsinghua University Press, Beijing (2004). (in Chinese)"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Robbins, E., Howe, J.M., King, A.: Theory propagation and rational-trees. In: Symposium on Principles and Practice of Declarative Programming, pp. 193\u2013204 (2013)","DOI":"10.1145\/2505879.2505901"},{"issue":"4","key":"26_CR18","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/2896499","volume":"48","author":"J Caballero","year":"2016","unstructured":"Caballero, J., Lin, Z.: Type inference on executables. ACM Comput. Surv. 48(4), 65 (2016)","journal-title":"ACM Comput. Surv."},{"issue":"47","key":"26_CR19","first-page":"46","volume":"47","author":"M Zhang","year":"2013","unstructured":"Zhang, M., Prakash, A., Li, X., Liang, Z., Yin, H.: Identifying and analyzing pointer misuses for sophisticated memory-corruption exploit diagnosis. Proc. West. Pharmacol. Soc. 47(47), 46\u201349 (2013)","journal-title":"Proc. West. Pharmacol. Soc."},{"key":"26_CR20","unstructured":"Yan, Q., McCamant, S.: Conservative signed\/unsigned type inference for binaries using minimum cut. Technical report, University of Minnesota (2014)"},{"key":"26_CR21","unstructured":"Slowinska, A., Stancescu, T., Bos, H.: Howard: a dynamic excavator for reverse engineering data structures. In: Network and Distributed System Security Symposium (2011)"},{"key":"26_CR22","unstructured":"Elwazeer, K., Anand, K., Kotha, A., Smithson, M., Barua, R.: Artiste: automatic generation of hybrid data structure signatures from binary code executions. Technical report TRIMDEA-SW-2012-001, IMDEA Software Institute (2012)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Haller, I., Slowinska, A., Bos, H.: MemPick: high-level data structure detection in C\/C++ binaries. In: Reverse Engineering, pp. 32\u201341 (2013)","DOI":"10.1109\/WCRE.2013.6671327"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Jin, W., Cohen, C., Gennari, J., Hines, C., Chaki, S., Gurfinkel, A., Havrilla, J., Narasimhan, P.: Recovering C++ objects from binaries using inter-procedural data-flow analysis. In: ACM Sigplan on Program Protection and Reverse Engineering Workshop, p. 1 (2014)","DOI":"10.1145\/2556464.2556465"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Yoo, K., Barua, R.: Recovery of object oriented features from C++ binaries. In: Asia-Pacific Software Engineering Conference, pp. 231\u2013238 (2014)","DOI":"10.1109\/APSEC.2014.44"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Katz, O., El-Yaniv, R., Yahav, E.: Estimating types in binaries using predictive modeling. In: ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 313\u2013326 (2016)","DOI":"10.1145\/2837614.2837674"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Raychev, V., Vechev, M., Krause, A.: Predicting program properties from \u201cbig code\u201d. In: The ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 111\u2013124 (2015)","DOI":"10.1145\/2676726.2677009"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68690-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T07:26:42Z","timestamp":1570174002000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68690-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319686899","9783319686905"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68690-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}