{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:58:12Z","timestamp":1769731092431,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642548062","type":"print"},{"value":"9783642548079","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54807-9_4","type":"book-chapter","created":{"date-parts":[[2014,3,21]],"date-time":"2014-03-21T05:34:10Z","timestamp":1395380050000},"page":"61-84","source":"Crossref","is-referenced-by-count":14,"title":["Recovery of Class Hierarchies and Composition Relationships from Machine Code"],"prefix":"10.1007","author":[{"given":"Venkatesh","family":"Srinivasan","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Reps","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-69738-1_1","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"G. Balakrishnan","year":"2007","unstructured":"Balakrishnan, G., Reps, T.: DIVINE: DIscovering Variables IN Executables. In: VMCAI 2007. LNCS, vol.\u00a04349, pp. 1\u201328. Springer, Heidelberg (2007)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Balakrishnan, G., Reps, T.: WYSINWYX: What You See Is Not What You eXecute. TOPLAS\u00a032(6) (2010)","DOI":"10.1145\/1749608.1749612"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-18275-4_6","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"S. Bardin","year":"2011","unstructured":"Bardin, S., Herrmann, P., V\u00e9drine, F.: Refinement-based CFG reconstruction from unstructured programs. In: Jhala, R., Schmidt, D. (eds.) VMCAI 2011. LNCS, vol.\u00a06538, pp. 54\u201369. Springer, Heidelberg (2011)"},{"key":"4_CR4","unstructured":"Bojic, D., Velasevic, D.: A Use-case driven method of architecture recovery for program understanding and reuse reengineering. In: CSMR (2000)"},{"key":"4_CR5","unstructured":"Cho, C.Y., Babi\u0107, D., Poosankam, P., Chen, K.Z., Wu, E.X., Song, D.: MACE: Model inference assisted concolic exploration for protocol and vulnerability discovery. In: USENIX Sec. Symp. (2011)"},{"key":"4_CR6","unstructured":"Cozzie, A., Stratton, F., Xue, H., King, S.T.: Digging for data structures. In: OSDI (2008)"},{"key":"4_CR7","unstructured":"D Programming Language, \n                    \n                      http:\/\/dlang.org"},{"key":"4_CR8","unstructured":"DMCA \u00a71201. Circumvention of Copyright Protection Systems, \n                    \n                      www.copyright.gov\/title17\/92chap12.html#1201"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Driscoll, E., Burton, A., Reps, T.: Checking compatibility of a producer and a consumer. In: FSE (2011)","DOI":"10.1145\/2025113.2025132"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"ElWazeer, K., Anand, K., Kotha, A., Smithson, M., Barua, R.: Scalable variable and data type detection in a binary rewriter. In: PLDI (2013)","DOI":"10.1145\/2491956.2462165"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Fokin, A., Derevenetc, E., Chernov, A., Troshina, K.: SmartDec: Approaching C++ decompilation. In: WCRE (2011)","DOI":"10.1109\/WCRE.2011.49"},{"key":"4_CR12","unstructured":"Freecode, \n                    \n                      www.freecode.com"},{"key":"4_CR13","unstructured":"GNU Software Repository, \n                    \n                      www.gnu.org\/software\/software.html"},{"key":"4_CR14","unstructured":"Itanium C++ ABI, \n                    \n                      refspecs.linux-foundation.org\/cxxabi-1.83.html"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Jacobson, E.R., Rosenblum, N., Miller, B.P.: Labeling library functions in stripped binaries. In: PASTE (2011)","DOI":"10.1145\/2024569.2024571"},{"key":"4_CR16","unstructured":"Lee, J., Avgerinos, T., Brumley, D.: TIE: Principled reverse engineering of types in binary programs. In: NDSS (2011)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Lim, J., Reps, T., Liblit, B.: Extracting output formats from executables. In: WCRE (2006)","DOI":"10.1109\/WCRE.2006.29"},{"key":"4_CR18","unstructured":"Lin, Z., Zhang, X., Xu, D.: Automatic reverse engineering of data structures from binary execution. In: NDSS (2010)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Lindig, C., Snelting, G.: Assessing modular structure of legacy code based on mathematical concept analysis. In: ICSE (1997)","DOI":"10.1145\/253228.253354"},{"key":"4_CR20","unstructured":"Luk, C.-K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: Building customized program analysis tools with dynamic instrumentation. In: PLDI (2005)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Roundy, K.A., Miller, B.P.: Binary-code obfuscations in prevalent packer tools. ACM Computing Surveys\u00a046(1) (2013)","DOI":"10.1145\/2522968.2522972"},{"key":"4_CR22","unstructured":"Schwartz, E.J., Lee, J., Woo, M., Brumley, D.: Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring. In: USENIX Sec. Symp. (2013)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Siff, M., Reps, T.: Identifying modules via concept analysis. TSE\u00a025(6) (1999)","DOI":"10.1109\/32.824377"},{"key":"4_CR24","unstructured":"Slowinska, A., Stancescu, T., Bos, H.: Howard: A Dynamic excavator for reverse engineering data structures. In: NDSS (2011)"},{"key":"4_CR25","unstructured":"SourceForge, \n                    \n                      http:\/\/sourceforge.net"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Tonella, P.: Concept analysis for module restructuring. TSE\u00a027(4) (2001)","DOI":"10.1109\/32.917524"}],"container-title":["Lecture Notes in Computer Science","Compiler Construction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54807-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T08:13:48Z","timestamp":1558858428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54807-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642548062","9783642548079"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54807-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}