{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:33:02Z","timestamp":1768339982150,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540938996","type":"print"},{"value":"9783540939009","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-93900-9_19","type":"book-chapter","created":{"date-parts":[[2008,12,15]],"date-time":"2008-12-15T04:35:59Z","timestamp":1229315759000},"page":"214-228","source":"Crossref","is-referenced-by-count":46,"title":["An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Kinder","sequence":"first","affiliation":[]},{"given":"Florian","family":"Zuleger","sequence":"additional","affiliation":[]},{"given":"Helmut","family":"Veith","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","first-page":"23","volume-title":"7th Int\u2019l. Workshop on Real-Time Computing and Applications Symp. (RTCSA 2000)","author":"H. Theiling","year":"2000","unstructured":"Theiling, H.: Extracting safe and precise control flow from binaries. In: 7th Int\u2019l. Workshop on Real-Time Computing and Applications Symp (RTCSA 2000), pp. 23\u201330. IEEE Computer Society, Los Alamitos (2000)"},{"key":"19_CR2","first-page":"45","volume-title":"9th Working Conf. Reverse Engineering (WCRE 2002)","author":"B. Schwarz","year":"2002","unstructured":"Schwarz, B., Debray, S.K., Andrews, G.R.: Disassembly of executable code revisited. In: 9th Working Conf. Reverse Engineering (WCRE 2002), pp. 45\u201354. IEEE Computer Society, Los Alamitos (2002)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-540-24723-4_2","volume-title":"Compiler Construction","author":"G. Balakrishnan","year":"2004","unstructured":"Balakrishnan, G., Reps, T.W.: Analyzing memory accesses in x86 executables. In: Duesterwald, E. (ed.) CC 2004. LNCS, vol.\u00a02985, pp. 5\u201323. Springer, Heidelberg (2004)"},{"issue":"5","key":"19_CR4","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1127577.1127590","volume":"33","author":"L.C. Harris","year":"2005","unstructured":"Harris, L.C., Miller, B.P.: Practical analysis of stripped binary code. SIGARCH Comput. Archit. News\u00a033(5), 63\u201368 (2005)","journal-title":"SIGARCH Comput. Archit. News"},{"key":"19_CR5","first-page":"46","volume-title":"2002 Jt. Conf. Languages, Compilers, and Tools for Embedded Systems & Software and Compilers for Embedded Systems (LCTES 2002-SCOPES 2002)","author":"D. K\u00e4stner","year":"2002","unstructured":"K\u00e4stner, D., Wilhelm, S.: Generic control flow reconstruction from assembly code. In: 2002 Jt. Conf. Languages, Compilers, and Tools for Embedded Systems & Software and Compilers for Embedded Systems (LCTES 2002-SCOPES 2002), pp. 46\u201355. ACM Press, New York (2002)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-540-70545-1_40","volume-title":"Computer Aided Verification","author":"J. Kinder","year":"2008","unstructured":"Kinder, J., Veith, H.: Jakstab: A static analysis platform for binaries. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.\u00a05123, pp. 423\u2013427. Springer, Heidelberg (2008)"},{"issue":"5","key":"19_CR7","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1145\/1086642.1086645","volume":"27","author":"B. De Sutter","year":"2005","unstructured":"De Sutter, B., De Bus, B., De Bosschere, K.: Link-time binary rewriting techniques for program compaction. ACM Trans. Program. Lang. Syst.\u00a027(5), 882\u2013945 (2005)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"5","key":"19_CR8","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1002\/spe.4380220502","volume":"22","author":"P.P. Chang","year":"1992","unstructured":"Chang, P.P., Mahlke, S.A., Chen, W.Y., Hwu, W.W.: Profile-guided automatic inline expansion for C programs. Softw., Pract. Exper.\u00a022(5), 349\u2013369 (1992)","journal-title":"Softw., Pract. Exper."},{"key":"19_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F. Nielson","year":"1999","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)"},{"issue":"2","key":"19_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.2140\/pjm.1955.5.285","volume":"5","author":"A. Tarski","year":"1955","unstructured":"Tarski, A.: A lattice-theoretical fixpoint theorem and its applications. Pacific J. Math.\u00a05(2), 285\u2013309 (1955)","journal-title":"Pacific J. Math."},{"issue":"7","key":"19_CR11","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1002\/spe.4380250706","volume":"25","author":"C. Cifuentes","year":"1995","unstructured":"Cifuentes, C., Gough, K.J.: Decompilation of binary programs. Softw., Pract. Exper.\u00a025(7), 811\u2013829 (1995)","journal-title":"Softw., Pract. Exper."},{"key":"19_CR12","first-page":"27","volume-title":"11th Working Conf. Reverse Engineering (WCRE 2004)","author":"M. Emmerik van","year":"2004","unstructured":"van Emmerik, M., Waddington, T.: Using a decompiler for real-world source recovery. In: 11th Working Conf. Reverse Engineering (WCRE 2004), pp. 27\u201336. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/11823230_21","volume-title":"Static Analysis","author":"B. Chang","year":"2006","unstructured":"Chang, B., Harren, M., Necula, G.: Analysis of low-level code using cooperating decompilers. In: Yi, K. (ed.) SAS 2006. LNCS, vol.\u00a04134, pp. 318\u2013335. Springer, Heidelberg (2006)"},{"key":"19_CR14","unstructured":"Schwarz, B., Debray, S.K., Andrews, G.R.: PLTO: A link-time optimizer for the intel IA-32 architecture. In: Proc. Workshop on Binary Translation, WBT 2001 (2001)"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/3-540-45449-7_32","volume-title":"Embedded Software","author":"C. Ferdinand","year":"2001","unstructured":"Ferdinand, C., Heckmann, R., Langenbach, M., Martin, F., Schmidt, M., Theiling, H., Thesing, S., Wilhelm, R.: Reliable and precise WCET determination for a real-life processor. In: Henzinger, T.A., Kirsch, C.M. (eds.) EMSOFT 2001. LNCS, vol.\u00a02211, pp. 469\u2013485. Springer, Heidelberg (2001)"},{"key":"19_CR16","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1250734.1250746","volume-title":"Proc. ACM SIGPLAN 2007 Conf. Programming Language Design and Implementation (PLDI 2007)","author":"N. Nethercote","year":"2007","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. In: Proc. ACM SIGPLAN 2007 Conf. Programming Language Design and Implementation (PLDI 2007), pp. 89\u2013100. ACM Press, New York (2007)"},{"issue":"3","key":"19_CR17","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/2.825697","volume":"33","author":"C. Cifuentes","year":"2000","unstructured":"Cifuentes, C., van Emmerik, M.: UQBT: Adaptive binary translation at low cost. IEEE Computer\u00a033(3), 60\u201366 (2000)","journal-title":"IEEE Computer"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11506881_11","volume-title":"Intrusion and Malware Detection and Vulnerability Assessment","author":"J. Kinder","year":"2005","unstructured":"Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting malicious code by model checking. In: Julisch, K., Kr\u00fcgel, C. (eds.) DIMVA 2005. LNCS, vol.\u00a03548, pp. 174\u2013187. Springer, Heidelberg (2005)"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/SP.2005.20","volume-title":"IEEE Symp. Security and Privacy (S&P 2005)","author":"M. Christodorescu","year":"2005","unstructured":"Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., Bryant, R.E.: Semantics-aware malware detection. In: IEEE Symp. Security and Privacy (S&P 2005), pp. 32\u201346. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"2-3","key":"19_CR20","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/S0167-6423(01)00014-4","volume":"40","author":"C. Cifuentes","year":"2001","unstructured":"Cifuentes, C., van Emmerik, M.: Recovery of jump table case statements from binary code. Sci. Comput. Program.\u00a040(2-3), 171\u2013188 (2001)","journal-title":"Sci. Comput. Program."}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-93900-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T05:55:08Z","timestamp":1551678908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-93900-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540938996","9783540939009"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-93900-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}