{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:24:56Z","timestamp":1775053496596,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642157684","type":"print"},{"value":"9783642157691","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15769-1_14","type":"book-chapter","created":{"date-parts":[[2010,9,13]],"date-time":"2010-09-13T02:09:40Z","timestamp":1284343780000},"page":"218-235","source":"Crossref","is-referenced-by-count":6,"title":["Modelling Metamorphism by Abstract Interpretation"],"prefix":"10.1007","author":[{"given":"Mila","family":"Dalla Preda","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Giacobazzi","sequence":"additional","affiliation":[]},{"given":"Saumya","family":"Debray","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Coogan","sequence":"additional","affiliation":[]},{"given":"Gregg M.","family":"Townsend","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-540-31985-6_19","volume-title":"Compiler Construction","author":"G. Balakrishnan","year":"2005","unstructured":"Balakrishnan, G., Gruian, R., Reps, T.W., Teitelbaum, T.: Codesurfer\/x86-a platform for analyzing x86 executables. In: Bodik, R. (ed.) CC 2005. LNCS, vol.\u00a03443, pp. 250\u2013254. Springer, Heidelberg (2005)"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-540-24723-4_2","volume-title":"Compiler Construction","author":"G. Balakrishnan","year":"2004","unstructured":"Balakrishnan, G., Reps, T.W.: Analyzing memory accesses in x86 executables. In: Duesterwald, E. (ed.) CC 2004. LNCS, vol.\u00a02985, pp. 5\u201323. Springer, Heidelberg (2004)"},{"key":"14_CR3","unstructured":"Bruynooghe, M., Janssens, G., Callebaut, A., Demoen, B.: Abstract Interpretation: Towards the Global Optimization of Prolog Programs. In: Proc. Symposium on Logic Programming, pp. 192\u2013204 (1987)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Cai, H., Shao, Z., Vaynberg, A.: Certified self-modifying code. In: Proc. ACM Conf. on Programming Language Design and Implementation (PLDI 2007), pp. 66\u201377 (2007)","DOI":"10.1145\/1250734.1250743"},{"key":"14_CR5","unstructured":"Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proc. USENIX Security Symp., pp. 169\u2013186 (2003)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S.: Testing malware detectors. In: Proc. ACM SIGSOFT Internat. Symp. on Software Testing and Analysis (ISSTA 2004), pp. 34\u201344 (2004)","DOI":"10.1145\/1007512.1007518"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: Proc. IEEE Security and Privacy 32\u201346 (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proc. ACM Symp. on Principles of Programming Languages (POPL 1977), pp. 238\u2013252 (1977)","DOI":"10.1145\/512950.512973"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: Proc. ACM Symp. on Principles of Programming Languages (POPL 1979), pp. 269\u2013282 (1979)","DOI":"10.1145\/567752.567778"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Formal language, grammar and set-constraint-based program analysis by abstract interpretation. In: Proc. ACM Conf. on Functional Programming Languages and Computer Architecture, pp. 170\u2013181 (1995)","DOI":"10.1145\/224164.224199"},{"issue":"1-2","key":"14_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/S0304-3975(00)00313-3","volume":"277","author":"P. Cousot","year":"2002","unstructured":"Cousot, P.: Constructive design of a hierarchy of semantics of a transition system by abstract interpretation. Theor. Comput. Sci.\u00a0277(1-2), 47\u2013103 (2002)","journal-title":"Theor. Comput. Sci."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Cousot, P., Halbwachs, N.: Automatic discovery of linear restraints among variables of a program. In: Proc. ACM Symp. on Principles of Programming Languages, POPL 1978 (1978)","DOI":"10.1145\/512760.512770"},{"issue":"5","key":"14_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1387673.1387674","volume":"30","author":"M. Preda Dalla","year":"2008","unstructured":"Dalla Preda, M., Christodorescu, M., Jha, S., Debray, S.: A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst.\u00a030(5), 1\u201354 (2008)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"14_CR14","unstructured":"D\u2019Silva, V.: Widening for automata. Diploma Thesis, Institut Fur Informatick, Universitat Zurich (2006)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Emami, M., Ghiya, R., Hendren, L.J.: Context-sensitive interprocedural points-to analysis in the presence of function pointers. In: Proc. ACM Conf. Programming Language Design and Implementation, pp. 242\u2013256 (1994)","DOI":"10.1145\/178243.178264"},{"key":"14_CR16","unstructured":"Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. In: Proc. World Academy of Science, Engineering and Technology (PWASET), vol.\u00a020 (2007)"},{"issue":"2","key":"14_CR17","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1145\/333979.333989","volume":"47","author":"R. Giacobazzi","year":"2000","unstructured":"Giacobazzi, R., Ranzato, F., Scozzari, F.: Making abstract interpretations complete. J. of the ACM.\u00a047(2), 361\u2013416 (2000)","journal-title":"J. of the ACM."},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/978-3-540-75867-9_63","volume-title":"Computer Aided Systems Theory \u2013 EUROCAST 2007","author":"A. Holzer","year":"2007","unstructured":"Holzer, A., Kinder, J., Veith, H.: Using verification technology to specify and detect malware. In: Moreno D\u00edaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. LNCS, vol.\u00a04739, pp. 497\u2013504. Springer, Heidelberg (2007)"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11506881_11","volume-title":"Intrusion and Malware Detection and Vulnerability Assessment","author":"J. Kinder","year":"2005","unstructured":"Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting malicious code by model checking. In: Julisch, K., Kr\u00fcgel, C. (eds.) DIMVA 2005. LNCS, vol.\u00a03548, pp. 174\u2013187. Springer, Heidelberg (2005)"},{"key":"14_CR20","unstructured":"Qozah. Polymorphism and grammars. 29A E-zine (2009)"},{"key":"14_CR21","unstructured":"Singh, P., Lakhotia, A.: Static verification of worm and virus behaviour in binary executables using model checking. In: Proc. IEEE Information Assurance Workshop (2003)"},{"key":"14_CR22","volume-title":"The Art of Computer Virus Research and Defense","author":"P. Szor","year":"2005","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005)"},{"key":"14_CR23","unstructured":"Sz\u00f6r, P., Ferrie, P.: Hunting for metamorphic. In: Proc. Virus Bulleting Conference, pp. 123\u2013144. Virus Bulletin Ltd. (2001)"},{"issue":"1","key":"14_CR24","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/BF03037026","volume":"1","author":"H. Tamaki","year":"1983","unstructured":"Tamaki, H., Sato, T.: Program Transformation Through Meta-shifting. New Generation Computing\u00a01(1), 93\u201398 (1983)","journal-title":"New Generation Computing"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Zbitskiy, P.: Code mutation techniques by means of formal grammars and automatons. Journal in Computer Virology (2009)","DOI":"10.1007\/s11416-009-0121-9"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15769-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,20]],"date-time":"2019-03-20T06:07:21Z","timestamp":1553062041000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15769-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157684","9783642157691"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15769-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}