{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:23Z","timestamp":1766449703495,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642238079"},{"type":"electronic","value":"9783642238086"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23808-6_34","type":"book-chapter","created":{"date-parts":[[2011,8,18]],"date-time":"2011-08-18T03:40:29Z","timestamp":1313638829000},"page":"522-536","source":"Crossref","is-referenced-by-count":39,"title":["Differentiating Code from Data in x86 Binaries"],"prefix":"10.1007","author":[{"given":"Richard","family":"Wartell","sequence":"first","affiliation":[]},{"given":"Yan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Kevin W.","family":"Hamlen","sequence":"additional","affiliation":[]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Balakrishnan, G., Gruian, R., Reps, T., Teitelbaum, T.: CodeSurfer\/x86\u2014a platform for analyzing x86 executables. In: Proceedings of the 14th International Conference on Compiler Construction (CC), pp. 250\u2013254 (2005)","DOI":"10.1007\/978-3-540-31985-6_19"},{"key":"34_CR2","first-page":"2673","volume":"7","author":"A. Bratko","year":"2006","unstructured":"Bratko, A., Cormack, G.V., Filipi\u010d, B., Lynam, T.R., Zupan, B.: Spam filtering using statistical data compression models. Journal of Machine Learning Research\u00a07, 2673\u20132698 (2006)","journal-title":"Journal of Machine Learning Research"},{"issue":"2\/3","key":"34_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1093\/comjnl\/40.2_and_3.67","volume":"40","author":"J.G. Cleary","year":"1997","unstructured":"Cleary, J.G., Teahan, W.J.: Unbounded length contexts for PPM. The Computer Journal\u00a040(2\/3), 67\u201375 (1997)","journal-title":"The Computer Journal"},{"issue":"4","key":"34_CR4","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TCOM.1984.1096090","volume":"32","author":"J.G. Cleary","year":"1984","unstructured":"Cleary, J.G., Witten, I.H.: Data compression using adaptive coding and partial string matching. IEEE Transactions on Communications\u00a032(4), 396\u2013402 (1984)","journal-title":"IEEE Transactions on Communications"},{"issue":"6","key":"34_CR5","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1093\/comjnl\/30.6.541","volume":"30","author":"G.V. Cormack","year":"1987","unstructured":"Cormack, G.V., Horspool, R.N.: Data compression using dynamic Markov modeling. The Computer Journal\u00a030(6), 541\u2013550 (1987)","journal-title":"The Computer Journal"},{"key":"34_CR6","volume-title":"The IDA Pro Book: The Unofficial Guide to the World\u2019s Most Popular Disassembler","author":"C. Eagle","year":"2008","unstructured":"Eagle, C.: The IDA Pro Book: The Unofficial Guide to the World\u2019s Most Popular Disassembler. No Starch Press, Inc., San Francisco (2008)"},{"key":"34_CR7","unstructured":"Erd\u00e9lyi, G.: IDAPython: User scripting for a complex application. Bachelor\u2019s thesis, EVTEK University of Applied Sciences (2008)"},{"key":"34_CR8","unstructured":"Hamlen, K.W., Mohan, V., Wartell, R.: Reining in Windows API abuses with in-lined reference monitors. Tech. Rep. UTDCS-18-10, The University of Texas at Dallas, Richardson, Texas (June 2010)"},{"key":"34_CR9","unstructured":"Hex-Rays: The IDA Pro disassembler and debugger (2011), \n                    \n                      www.hex-rays.com\/idapro"},{"key":"34_CR10","unstructured":"Hunt, G., Brubacher, D.: Detours: Binary interception of Win32 functions. In: Proceedings of the 3rd USENIX Windows NT Symposium (WINSYM), pp. 14\u201321 (1999)"},{"key":"34_CR11","unstructured":"Intel: Intel\u00ae 64 and IA-32 Architectures Software Developer\u2019s Manual, vol. 2A & 2B: Instruction Set Reference. Intel Corporation (2011)"},{"key":"34_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-540-70545-1_40","volume-title":"Computer Aided Verification","author":"J. Kinder","year":"2008","unstructured":"Kinder, J., Veith, H.: Jakstab: A static analysis platform for binaries. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.\u00a05123, pp. 423\u2013427. Springer, Heidelberg (2008)"},{"key":"34_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-540-93900-9_19","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"J. Kinder","year":"2009","unstructured":"Kinder, J., Zuleger, F., Veith, H.: An abstract interpretation-based framework for control flow reconstruction from binaries. In: Jones, N.D., M\u00fcller-Olm, M. (eds.) VMCAI 2009. LNCS, vol.\u00a05403, pp. 214\u2013228. Springer, Heidelberg (2009)"},{"key":"34_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0935-6","volume-title":"Compression and Coding Algorithms","author":"A. Moffat","year":"2002","unstructured":"Moffat, A., Turpin, A.: Compression and Coding Algorithms. Kluwer Academic Publishers, Boston (2002)"},{"issue":"3","key":"34_CR15","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1162\/089120100561746","volume":"26","author":"W.J. Teahan","year":"2000","unstructured":"Teahan, W.J., Wen, Y., McNab, R.J., Witten, I.H.: A compression-based algorithm for Chinese word segmentation. Computational Linguistics\u00a026(3), 375\u2013393 (2000)","journal-title":"Computational Linguistics"},{"key":"34_CR16","unstructured":"Teahan, W.J.: Text classification and segmentation using minimum cross-entropy. In: Proceedings of the 6th International Conference on Computer-Assisted Information Retrieval (RIAO), pp. 943\u2013961 (2000)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23808-6_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,31]],"date-time":"2019-03-31T14:14:14Z","timestamp":1554041654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23808-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642238079","9783642238086"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23808-6_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}