{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T21:10:10Z","timestamp":1751663410079,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319929699"},{"type":"electronic","value":"9783319929705"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92970-5_10","type":"book-chapter","created":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T12:54:12Z","timestamp":1527598452000},"page":"155-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cross-Architecture Lifter Synthesis"],"prefix":"10.1007","author":[{"given":"Rijnard","family":"van Tonder","sequence":"first","affiliation":[]},{"given":"Claire","family":"Le Goues","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,30]]},"reference":[{"key":"10_CR1","unstructured":"BAP IR Operational Semantics (2018). https:\/\/github.com\/BinaryAnalysisPlatform\/bil\/releases\/download\/v0.1\/bil.pdf . Accessed 23 Apr 2018"},{"key":"10_CR2","unstructured":"BAP Warn Unused Analysis (2018). https:\/\/opam.ocaml.org\/packages\/bap-warn-unused\/bap-warn-unused.1.3.0\/ . Accessed 23 Apr 2018"},{"key":"10_CR3","unstructured":"Binary Analysis Platform (2018). https:\/\/github.com\/BinaryAnalysisPlatform\/bap . Accessed 23 Apr 2018"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Alur, R., Bod\u00edk, R., Juniwal, G., Martin, M.M.K., Raghothaman, M., Seshia, S.A., Singh, R., Solar-Lezama, A., Torlak, E., Udupa, A.: Syntax-guided synthesis. In: Formal Methods in Computer-Aided Design, pp. 1\u20138 (2013)","DOI":"10.1109\/FMCAD.2013.6679385"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Balakrishnan, G., Reps, T.: Analyzing memory accesses in x86 executables. In: Compiler Construction, pp. 2732\u20132733 (2004)","DOI":"10.1007\/978-3-540-24723-4_2"},{"key":"10_CR6","unstructured":"Bornholt, J., Torlak, E.: Scaling program synthesis by exploiting existing code. Machine Learning for Programming Languages (2015)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Bornholt, J., Torlak, E., Grossman, D., Ceze, L.: Optimizing synthesis with metasketches. In: POPL 2016, pp. 775\u2013788 (2016)","DOI":"10.1145\/2837614.2837666"},{"key":"10_CR8","unstructured":"Dullien, T., Porst, S.: REIL: a platform-independent intermediate representation of disassembled code for static code analysis. In: CanSecWest 2009 (2009)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Federico, A.D., Payer, M., Agosta, G.: rev.ng: a unified binary analysis framework to recover CFGs and function boundaries. In: CC 2017, pp. 131\u2013141 (2017)","DOI":"10.1145\/3033019.3033028"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Taly, A.: Automated synthesis of symbolic instruction encodings from I\/O samples. In: PLDI 2012, pp. 441\u2013452 (2012)","DOI":"10.1145\/2345156.2254116"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Gotovchits, I., van Tonder, R., Brumley, D.: Saluki: finding taint-style vulnerabilities with static property checking. In: BAR 2018 (2018)","DOI":"10.14722\/bar.2018.23019"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Hasabnis, N., Qiao, R., Sekar, R.: Checking correctness of code generator architecture specifications. In: CGO 2015, pp. 167\u2013178 (2015)","DOI":"10.1109\/CGO.2015.7054197"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Hasabnis, N., Sekar, R.: Extracting instruction semantics via symbolic execution of code generators. In: FSE 2016, pp. 301\u2013313 (2016)","DOI":"10.1145\/2950290.2950335"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Hasabnis, N., Sekar, R.: Lifting assembly to intermediate representation: a novel approach leveraging compilers. In: ASPLOS 2016, pp. 311\u2013324 (2016)","DOI":"10.1145\/2872362.2872380"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Heule, S., Schkufza, E., Sharma, R., Aiken, A.: Stratified synthesis: automatically learning the x86\u201364 instruction set. In: PLDI 2016, pp. 237\u2013250 (2016)","DOI":"10.1145\/2980983.2908121"},{"issue":"5","key":"10_CR16","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1145\/2902362","volume":"59","author":"A Hindle","year":"2016","unstructured":"Hindle, A., Barr, E.T., Gabel, M., Su, Z., Devanbu, P.T.: On the naturalness of software. Commun. ACM 59(5), 122\u2013131 (2016)","journal-title":"Commun. ACM"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Kim, S., Faerevaag, M., Junk, M., Jung, S., Oh, D., Lee, J., Cha, S.K.: Testing intermediate representations for binary analysis. In: ASE 2017 (2017)","DOI":"10.1109\/ASE.2017.8115648"},{"key":"10_CR18","unstructured":"Kinder, J., Veith, H.: Precise static analysis of untrusted driver binaries. In: FMCAD 2010, pp. 43\u201350 (2010)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Lattner, C., Adve, V.S.: LLVM: a compilation framework for lifelong program analysis & transformation. In: CGO 2004, pp. 75\u201388 (2004)","DOI":"10.1109\/CGO.2004.1281665"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Le, V., Sun, C., Su, Z.: Randomized stress-testing of link-time optimizers. In: ISSTA 2015, pp. 327\u2013337 (2015)","DOI":"10.1145\/2771783.2771785"},{"key":"10_CR21","unstructured":"Molnar, D., Li, X.C., Wagner, D.A.: Dynamic test generation to find integer bugs in x86 binary linux programs. In: USENIX Security Symposium 2009 (2009)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: IEEE Security and Privacy, pp. 317\u2013331 (2010)","DOI":"10.1109\/SP.2010.26"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Sun, C., Le, V., Zhang, Q., Su, Z.: Toward understanding compiler bugs in GCC and LLVM. In: ISSTA 2016, pp. 294\u2013305 (2016)","DOI":"10.1145\/2931037.2931074"},{"key":"10_CR24","volume-title":"Hacker\u2019s Delight","author":"HS Warren","year":"2013","unstructured":"Warren, H.S.: Hacker\u2019s Delight. Pearson Education, London (2013)"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92970-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T20:38:44Z","timestamp":1751661524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92970-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319929699","9783319929705"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92970-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}