{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:28:11Z","timestamp":1743042491951,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819708000"},{"type":"electronic","value":"9789819708017"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0801-7_14","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T08:03:04Z","timestamp":1709193784000},"page":"235-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LAST: An Efficient In-place Static Binary Translator for\u00a0RISC Architectures"],"prefix":"10.1007","author":[{"given":"Yanzhi","family":"Lan","sequence":"first","affiliation":[]},{"given":"Qi","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Gen","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Xinyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Liangpu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Fuxin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,1]]},"reference":[{"key":"14_CR1","unstructured":"Apple: Rosetta. https:\/\/support.apple.com\/en-us\/HT211861"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Baraz, L., et al.: IA-32 execution layer: a two-phase dynamic translator designed to support IA-32 applications on Itanium\/spl reg\/-based systems. In: 2003 Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO-36, pp. 191\u2013201 (2003). https:\/\/doi.org\/10.1109\/MICRO.2003.1253195","DOI":"10.1109\/MICRO.2003.1253195"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Bauman, E., Lin, Z., Hamlen, K.W.: Superset disassembly: statically rewriting x86 binaries without heuristics. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018. Internet Society, Reston (2018). wOS:000722005800038. https:\/\/doi.org\/10.14722\/ndss.2018.23300","DOI":"10.14722\/ndss.2018.23300"},{"key":"14_CR4","unstructured":"Bellard, F.: QEMU, a fast and portable dynamic translator. In: Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference, 10\u201315 April 2005, pp. 41\u201346. USENIX, Anaheim (2005). https:\/\/www.usenix.org\/events\/usenix05\/tech\/freenix\/bellard.html"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Bruening, D., Garnett, T., Amarasinghe, S.: An infrastructure for adaptive dynamic optimization. In: 2003 International Symposium on Code Generation and Optimization, CGO 2003, pp. 265\u2013275 (2003). https:\/\/doi.org\/10.1109\/CGO.2003.1191551","DOI":"10.1109\/CGO.2003.1191551"},{"key":"14_CR6","unstructured":"Bruening, D., Garnett, T., Amarasinghe, S.: An infrastructure for adaptive dynamic optimization. In: Proceedings of the International Symposium on Code Generation and Optimization: Feedback-Directed and Runtime Optimization, CGO 2003, pp. 265\u2013275. IEEE Computer Society, USA (2003)"},{"key":"14_CR7","unstructured":"Chow, F.C., Himelstein, M.I., Killian, E., Weber, L.: Engineering a RISC compiler system. In: COMPCON, pp. 132\u2013137 (1986)"},{"issue":"3","key":"14_CR8","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/2.825697","volume":"33","author":"C Cifuentes","year":"2000","unstructured":"Cifuentes, C., Van Emmerik, M.: UQBT: adaptable binary translation at low cost. Computer 33(3), 60\u201366 (2000). https:\/\/doi.org\/10.1109\/2.825697","journal-title":"Computer"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Cota, E.G., Bonzini, P., Benn\u00e9e, A., Carloni, L.P.: Cross-ISA machine emulation for multicores. In: Proceedings of the 2017 International Symposium on Code Generation and Optimization, CGO 2017, pp. 210\u2013220. IEEE Press (2017)","DOI":"10.1109\/CGO.2017.7863741"},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Cota, E.G., Carloni, L.P.: Cross-ISA machine instrumentation using fast and scalable dynamic binary translation. In: Proceedings of the 15th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments, VEE 2019, pp. 74\u201387. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3313808.3313811","DOI":"10.1145\/3313808.3313811"},{"key":"14_CR11","doi-asserted-by":"publisher","unstructured":"Cunha, M., Fournel, N., P\u00e9trot, F.: Collecting traces in dynamic binary translation based virtual prototyping platforms. In: Proceedings of the 2015 Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools, RAPIDO 2015, Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2693433.2693437","DOI":"10.1145\/2693433.2693437"},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"d\u2019Antras, A., Gorgovan, C., Garside, J., Luj\u00e1n, M.: Optimizing indirect branches in dynamic binary translators. ACM Trans. Archit. Code Optim. 13(1) (2016). https:\/\/doi.org\/10.1145\/2866573","DOI":"10.1145\/2866573"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Dehnert, J.C., et al.: The Transmeta Code Morphing$$^{\\rm TM}$$ software: using speculation, recovery, and adaptive retranslation to address real-life challenges. In: Proceedings of the International Symposium on Code Generation and Optimization: Feedback-Directed and Runtime Optimization, CGO 2003, pp. 15\u201324. IEEE Computer Society, USA (2003)","DOI":"10.1109\/CGO.2003.1191529"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-35632-2_8","volume-title":"Runtime Verification","author":"J Eyolfson","year":"2013","unstructured":"Eyolfson, J., Lam, P.: Detecting unread memory using dynamic binary translation. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 49\u201363. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35632-2_8"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Federico, A.D., Agosta, G.: A jump-target identification method for multi-architecture static binary translation. In: 2016 International Conference on Compliers, Architectures, and Synthesis of Embedded Systems (CASES), pp. 1\u201310 (2016)","DOI":"10.1145\/2968455.2968514"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Horspool, R., Marovac, N.: An approach to the problem of detranslation of computer-programs. Comput. J. 23(3), 223\u2013229 (1980). WOS:A1980KD91500005. https:\/\/doi.org\/10.1093\/comjnl\/23.3.223","DOI":"10.1093\/comjnl\/23.3.223"},{"key":"14_CR17","doi-asserted-by":"publisher","unstructured":"Hu, W., et al.: Godson-3B: a 1GHz 40W 8-core 128GFLOPS processor in 65nm CMOS. In: 2011 IEEE International Solid-State Circuits Conference, pp. 76\u201378 (2011). https:\/\/doi.org\/10.1109\/ISSCC.2011.5746226","DOI":"10.1109\/ISSCC.2011.5746226"},{"issue":"1","key":"14_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/JSSC.2013.2284649","volume":"49","author":"W Hu","year":"2014","unstructured":"Hu, W., Yang, L., Fan, B., Wang, H., Chen, Y.: An 8-core MIPS-compatible processor in 32\/28 nm bulk CMOS. IEEE J. Solid-State Circ. 49(1), 41\u201349 (2014). https:\/\/doi.org\/10.1109\/JSSC.2013.2284649","journal-title":"IEEE J. Solid-State Circ."},{"key":"14_CR19","doi-asserted-by":"publisher","unstructured":"Hu, W., et al.: Godson-3B1500: a 32nm 1.35GHz 40W 172.8GFLOPS 8-core processor. In: 2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers, pp. 54\u201355 (2013). https:\/\/doi.org\/10.1109\/ISSCC.2013.6487634","DOI":"10.1109\/ISSCC.2013.6487634"},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Luk, C.K., et al.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2005, pp. 190\u2013200. Association for Computing Machinery, New York (2005). https:\/\/doi.org\/10.1145\/1065010.1065034","DOI":"10.1145\/1065010.1065034"},{"key":"14_CR21","unstructured":"Molnar, I.: Performance counters for Linux (2009). https:\/\/lwn.net\/Articles\/337493\/. Accessed 23 Feb 2022"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Niu, G., Zhang, F., Li, X.: Eliminate the overhead of interrupt checking in full-system dynamic binary translator. In: Proceedings of the 15th ACM International Conference on Systems and Storage (2022)","DOI":"10.1145\/3534056.3534939"},{"key":"14_CR23","unstructured":"Prasad, M.: A binary rewriting defense against stack-based buffer overflow attacks. In: 2003 USENIX Annual Technical Conference, USENIX ATC 03, San Antonio, TX, June 2003. USENIX Association (2003). https:\/\/www.usenix.org\/conference\/2003-usenix-annual-technical-conference\/binary-rewriting-defense-against-stack-based"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Shen, B.Y., Chen, J.Y., Hsu, W.C., Yang, W.: LLBT: an LLVM-based static binary translator. In: International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (2012)","DOI":"10.1145\/2380403.2380419"},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Shen, B.Y., Hsu, W.C., Yang, W.: A retargetable static binary translator for the arm architecture. ACM Trans. Archit. Code Optim. 11(2) (2014). https:\/\/doi.org\/10.1145\/2629335","DOI":"10.1145\/2629335"},{"key":"14_CR26","unstructured":"Loongson Technology: Loongarch documentation (2022). https:\/\/loongson.github.io\/LoongArch-Documentation\/"},{"key":"14_CR27","unstructured":"Weiwu, H., et al.: Loongson instruction set architecture technology. J. Comput. Res. Dev., 1\u201322 (2022)"},{"issue":"3","key":"14_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3316415","volume":"52","author":"M Wenzl","year":"2020","unstructured":"Wenzl, M., Merzdovnik, G., Ullrich, J., Weippl, E.: From hack to elaborate technique - a survey on binary rewriting. ACM Comput. Surv. 52(3), 1\u201337 (2020)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0801-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T08:13:44Z","timestamp":1731485624000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0801-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819708000","9789819708017"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0801-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tjutanklab.com\/ica3pp2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Online submission system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"439","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}