{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T03:34:04Z","timestamp":1761881644764,"version":"build-2065373602"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10836-025-06191-5","type":"journal-article","created":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T03:38:37Z","timestamp":1759808317000},"page":"483-502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PrecIRisc: A High-Precision and Low-Bloat Dynamic Binary Instrumentation Tailored for RISC Architectures"],"prefix":"10.1007","volume":"41","author":[{"given":"Wenbing","family":"Xie","sequence":"first","affiliation":[]},{"given":"Ruixue","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Fanyue","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yiming","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,7]]},"reference":[{"issue":"1","key":"6191_CR1","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/TII.2017.2720726","volume":"14","author":"SK Singh","year":"2018","unstructured":"Singh SK, Khanna K, Bose R, Panigrahi BK, Joshi A (2018) Joint-transformation-based detection of false data injection attacks in smart grid. IEEE Trans Ind Inf 14(1):89\u201397","journal-title":"IEEE Trans Ind Inf"},{"issue":"4","key":"6191_CR2","doi-asserted-by":"publisher","first-page":"2107","DOI":"10.1109\/TSE.2022.3210580","volume":"49","author":"Z Chen","year":"2022","unstructured":"Chen Z, Zhang Q, Wu J, Yan J, Xue J (2022) A source-level instrumentation framework for the dynamic analysis of memory safety. IEEE Trans Softw Eng 49(4):2107\u20132127","journal-title":"IEEE Trans Softw Eng"},{"key":"6191_CR3","doi-asserted-by":"crossref","unstructured":"Chen Z, Wu J, Zhang Q, Xue J (2022) A dynamic analysis tool for memory safety based on smart status and source-level instrumentation. In: Proceedings of the ACM\/IEEE 44th International Conference on Software Engineering: Companion Proceedings. Companion Proceedings (ICSE-Companion), Pittsburgh, PA, USA, pp 6\u201310","DOI":"10.1145\/3510454.3516872"},{"issue":"4","key":"6191_CR4","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1109\/TSE.1978.231514","volume":"4","author":"WE Howden","year":"1978","unstructured":"Howden WE (1978) Theoretical and empirical studies of program testing. IEEE Trans Softw Eng 4(4):293\u2013298","journal-title":"IEEE Trans Softw Eng"},{"issue":"4","key":"6191_CR5","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.1109\/TDSC.2022.3153325","volume":"20","author":"J Shi","year":"2023","unstructured":"Shi J, Zou D, Xu S, Deng X, Jin H (2023) Does OpenBSD and firefox\u2019s security improve with time? IEEE Trans Dependable Secur Comput 20(4):2781\u20132793","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"6191_CR6","doi-asserted-by":"crossref","unstructured":"Liu T, Curtsinger C, Berger ED (2016) DoubleTake: Fast and Precise Error Detection via Evidence-Based Dynamic Analysis. In: IEEE\/ACM 38th International Conference on Software Engineering (ICSE), Austin, TX, USA, pp 911\u201392","DOI":"10.1145\/2884781.2884784"},{"issue":"7","key":"6191_CR7","doi-asserted-by":"publisher","DOI":"10.3390\/e24070947","volume":"24","author":"L Yuan","year":"2022","unstructured":"Yuan L, Zhou S, Pan P, Wang Z (2022) MLD: an intelligent memory leak detection scheme based on defect modes in software. Entropy 24(7):947","journal-title":"Entropy"},{"key":"6191_CR8","doi-asserted-by":"crossref","unstructured":"Niu G, Zhang F, Li X (2022) Eliminate the overhead of interrupt checking in full-system dynamic binary translator. In: Proceedings of the 15th ACM International Conference on Systems and Storage. New York, NY, USA, pp 1\u201312","DOI":"10.1145\/3534056.3534939"},{"key":"6191_CR9","doi-asserted-by":"crossref","unstructured":"Cota EG, Carloni LP (2019) Cross-ISA machine instrumentation using fast and scalable dynamic binary translation. In: Proceedings of the 15th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments. Providence, RI, USA, pp 74\u201387","DOI":"10.1145\/3313808.3313811"},{"issue":"6","key":"6191_CR10","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1273442.1250746","volume":"42","author":"N Nethercote","year":"2007","unstructured":"Nethercote N, Seward J (2007) Valgrind: a framework for heavyweight dynamic binary instrumentation. SIGPLAN not 42(6):89\u2013100","journal-title":"SIGPLAN not"},{"issue":"6","key":"6191_CR11","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/1064978.1065034","volume":"40","author":"C-K Luk","year":"2005","unstructured":"Luk C-K, Cohn R, Muth R, Patil H, Klauser A, Lowney G, Wallace S, Reddi VJ, Hazelwood K (2005) Pin: building customized program analysis tools with dynamic instrumentation. SIGPLAN not 40(6):190\u2013200","journal-title":"SIGPLAN not"},{"key":"6191_CR12","doi-asserted-by":"crossref","unstructured":"Bruening D, Garnett T, Amarasinghe S (2003) An infrastructure for adaptive dynamic optimization. In: International Symposium on Code Generation and Optimization. San Francisco, CA, USA, pp 265\u2013275","DOI":"10.1109\/CGO.2003.1191551"},{"key":"6191_CR13","unstructured":"Valgrind 2nd Official Valgrind Survey (2005) https:\/\/valgrind.org\/gallery\/survey_05\/report.txt\u00a0Last Accessed 1 May 2025"},{"key":"6191_CR14","doi-asserted-by":"crossref","unstructured":"Wang F, Shoshitaishvili Y (2017) Angr - The Next Generation of Binary Analysis. In: 2017 IEEE Cybersecurity Development (SecDev), Cambridge, MA, USA, 8\u20139","DOI":"10.1109\/SecDev.2017.14"},{"key":"6191_CR15","unstructured":"Becker M, Chakraborty S (2019) A Valgrind tool to compute the working set of a software process. The dblp Comput Sci Bibliogr, 1\u20138"},{"key":"6191_CR16","doi-asserted-by":"crossref","unstructured":"Heing-Becker M, Kamph T, Schupp S (2014) Bit-error injection for software developers. In: 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), Antwerp, Belgium, pp 434\u2013439","DOI":"10.1109\/CSMR-WCRE.2014.6747212"},{"key":"6191_CR17","doi-asserted-by":"crossref","unstructured":"Pe\u00f1a AJ, Balaji P (2014) A Framework for Tracking Memory Accesses in Scientific Applications. In: 2014 43rd International Conference on Parallel Processing Workshops, Minneapolis, MN, USA, pp 235\u2013244","DOI":"10.1109\/ICPPW.2014.40"},{"issue":"3","key":"6191_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3446371","volume":"54","author":"IU Haq","year":"2021","unstructured":"Haq IU, Caballero J (2021) A survey of binary code similarity. ACM Comput Surv (CSUR), 54(3):1\u201338","journal-title":"ACM Comput Surv (CSUR)"},{"key":"6191_CR19","doi-asserted-by":"crossref","unstructured":"Nethercote N, Seward J (2007) and Acm How to Shadow Every Byte of Memory Used by a Program. In: 3rd international conference on Virtual execution environments (VEE '07). Association for Computing Machinery, New York, NY, USA, pp 65\u201374","DOI":"10.1145\/1254810.1254820"},{"issue":"2","key":"6191_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3478520","volume":"3","author":"D.C D'Elia","year":"2022","unstructured":"D'Elia D.C., Invidia L, Palmaro F, Querzoni L (2022) Evaluating dynamic binary instrumentation systems for conspicuous features and artifacts. Digit Threats: Res Pract (DTRAP), 3(2):1\u201313","journal-title":"Digit Threats: Res Pract (DTRAP)"},{"key":"6191_CR21","unstructured":"Priyadarshan S, Nguyen H, Chouhan R, Sekar R (2023) SAFER: efficient and error-tolerant binary instrumentation. In: Proceedings of the 32nd USENIX Conference on Security Symposium. Anaheim, CA, USA, 1451\u20131468"},{"key":"6191_CR22","doi-asserted-by":"crossref","unstructured":"Pang C, Yu R, Chen Y, Koskinen E, Portokalidis G, Mao B, Xu J (2021) SoK: All You Ever Wanted to Know About x86\/x64 Binary Disassembly But Were Afraid to Ask. In: IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp 833\u2013851","DOI":"10.1109\/SP40001.2021.00012"},{"key":"6191_CR23","unstructured":"Bellard F (2005) QEMU, a fast and portable dynamic translator. In: Proceedings of the annual conference on USENIX Annual Technical Conference. Anaheim, CA, pp 41\u201346"},{"key":"6191_CR24","doi-asserted-by":"crossref","unstructured":"Kim S, Faerevaag M, Jung M, Jung S, Oh D, Lee J, Cha SK (2017) Testing intermediate representations for binary analysis. In: 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), Urbana, IL, USA, pp 353\u2013364","DOI":"10.1109\/ASE.2017.8115648"},{"key":"6191_CR25","unstructured":"Baumann TM, Gracia J (2013) Cudagrind: A Valgrind Extension for CUDA. In: Kn\u00fcpfer, A., Gracia, J., Nagel, W., Resch, M. (eds) Tools for High Performance Computing 2013. Springer, Cham, pp 763\u2013772"},{"issue":"7","key":"6191_CR26","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1837854.1736001","volume":"45","author":"A Pohle","year":"2010","unstructured":"Pohle A, Dobel B, Roitzsch M, Hartig H (2010) Capability wrangling made easy: debugging on a microkernel with Valgrind. Proceedings of the 6th ACM SIGPLAN\/SIGOPS international conference on Virtual execution environments (VEE '10). New York, NY, USA, pp 3\u201312","journal-title":"ACM SIGPLAN Not"},{"key":"6191_CR27","doi-asserted-by":"crossref","unstructured":"VenkataKeerthy S, Banerjee S, Dey S, Andaluri Y, PS R, Kalyanasundaram S, Pereira FMQ, Upadrasta R (2025) VexIR2Vec: an Architecture-Neutral embedding framework for binary similarity. ACM Trans Softw Eng Methodol 2025(3): 1\u201349","DOI":"10.1145\/3721481"},{"key":"6191_CR28","doi-asserted-by":"crossref","unstructured":"Pewny J, Garmany B, Gawlik R, Rossow C, Holz T (2015) Cross-Architecture Bug Search in Binary Executables. In: 2015 IEEE Symposium on Security and Privacy. pp 709\u2013724","DOI":"10.1109\/SP.2015.49"},{"key":"6191_CR29","doi-asserted-by":"crossref","unstructured":"Hu Y, Zhang Y, Li J, Gu D (2017) Binary Code Clone Detection across Architectures and Compiling Configurations. In: 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC), Buenos Aires, Argentina, pp 88\u201398","DOI":"10.1109\/ICPC.2017.22"},{"issue":"6","key":"6191_CR30","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/3140587.3062387","volume":"52","author":"Y David","year":"2017","unstructured":"David Y, Partush N, Yahav E (2017) Similarity of binaries through re-optimization. In: Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2017). Association for Computing Machinery, New York, NY, USA, pp 79\u201394","journal-title":"SIGPLAN not"},{"issue":"2","key":"6191_CR31","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1145\/3296957.3177157","volume":"53","author":"Y David","year":"2018","unstructured":"David Y, Partush N, Yahav E (2018) Firmup: precise static detection of common vulnerabilities in firmware. In: Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '18). Association for Computing Machinery, New York, NY, USA, pp 392\u2013404","journal-title":"SIGPLAN not"},{"key":"6191_CR32","doi-asserted-by":"crossref","unstructured":"Meng X, Anderson JM, Mellor-Crummey J, Krentel MW, Miller BP, Milakovi\u0107 S (2021) Parallel binary code analysis. In: Proceedings of the 26th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. Virtual Event, Republic of Korea: Association for Computing Machinery, pp 76\u201389","DOI":"10.1145\/3437801.3441604"},{"key":"6191_CR33","doi-asserted-by":"crossref","unstructured":"Brumley D, Jager I, Avgerinos T, Schwartz EJ (2011) BAP: a binary analysis platform. In: Proceedings of the 23rd international conference on Computer aided verification. Snowbird, UT: Springer-Verlag, pp 463\u2013469","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"6191_CR34","doi-asserted-by":"crossref","unstructured":"Song D et al (2008) BitBlaze: A New Approach to Computer Security via Binary Analysis. In: Proceedings of the 4th International Conference on Information Systems Security. Hyderabad, India: Springer-Verlag, pp 1\u201325","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"6191_CR35","doi-asserted-by":"crossref","unstructured":"Yadavalli SB, Smith A (2019) Raising binaries to LLVM IR with MCTOLL (WIP paper). In: Proceedings of the 20th ACM SIGPLAN\/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems. Phoenix, AZ, USA: Association for Computing Machinery: 213\u2013218","DOI":"10.1145\/3316482.3326354"},{"key":"6191_CR36","first-page":"1","volume":"21","author":"B Xie","year":"2024","unstructured":"Xie B et al (2024) An instruction inflation analyzing framework for dynamic binary translators. ACM Transactions on Architecture and Code Optimization 21(2):1\u201325","journal-title":"ACM Trans Archit Code Optim"},{"key":"6191_CR37","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-030-80515-9_8","volume-title":"SSA-based compiler design","author":"F Brandner","year":"2022","unstructured":"Brandner F, Novillo D (2022) Propagating information using SSA. In:\u00a0Rastello F. and Bouchez Tichadou F, Inria, Grenoble, France, Fabrice Rastello (Eds) SSA-based compiler design. Cham, Springer International Publishing, pp 95\u2013106.\u00a0"},{"key":"6191_CR38","unstructured":"Developers TV, Valgrind Release Archive. https:\/\/sourceware.org\/pub\/valgrind\/. Last Accessed 10 June 2025"},{"key":"6191_CR39","first-page":"123","volume":"1","author":"J Tan","year":"2018","unstructured":"Tan J, Pang J-m, Lu S-b (2018) Using local library function in binary translation. Curr Trends Comput Sci Mech Autom 1:123\u2013132","journal-title":"Curr Trends Comput Sci Mech Autom"},{"issue":"9","key":"6191_CR40","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.3390\/electronics13091608","volume":"13","author":"W Xie","year":"2024","unstructured":"Xie W, Luo Q, Tian X, Huang J, Qi F (2024) Performance improvements via peephole optimization in dynamic binary translation. Electronics 13(9):1608","journal-title":"Electronics"},{"key":"6191_CR41","unstructured":"Stream benchmark https:\/\/www.cs.virginia.edu\/stream\/ref.html. Last Accessed 9 Jun 2025"},{"issue":"5\u20137","key":"6191_CR42","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1002\/stvr.1509","volume":"25","author":"M Papadakis","year":"2015","unstructured":"Papadakis M, Traon YL (2015) Metallaxis-FL: mutation-based fault localization. Softw Test Verif Reliab 25(5\u20137):605\u2013628","journal-title":"Softw Test Verif Reliab"},{"key":"6191_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.103050","volume":"146","author":"Y Lu","year":"2024","unstructured":"Lu Y, Shao K, Zhao J, Sun W, Sun M (2024) Mutation testing of unsupervised learning systems. Journal of Systems Architecture: the EUROMICRO Journal 146(C):103050","journal-title":"J Syst Archit"},{"key":"6191_CR44","first-page":"1","volume-title":"Automatic generation of assembly to IR translators using compilers","author":"N Hasabnis","year":"2015","unstructured":"Hasabnis N, Sekar RC (2015) Automatic generation of assembly to IR translators using compilers. In: Stony Brook University, NY, USA, pp 1\u20137"},{"issue":"8","key":"6191_CR45","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1007\/s00607-023-01172-y","volume":"105","author":"VH Sahin","year":"2023","unstructured":"Sahin VH (2023) Turna: a control flow graph reconstruction tool for RISC-V architecture. Computing 105(8):1821\u20131845","journal-title":"Computing"},{"key":"6191_CR46","doi-asserted-by":"crossref","unstructured":"Vlahovi\u0107 T, Mi\u0161i\u0107 M, Toma\u0161evi\u0107 M, Karad\u017ei\u0107 A, Rikalo A (2017) Extending valgrind framework with the MIPS MSA support. In: 2017 Zooming Innovation in Consumer Electronics International Conference (ZINC). pp 47\u201351","DOI":"10.1109\/ZINC.2017.7968660"},{"key":"6191_CR47","doi-asserted-by":"crossref","unstructured":"Anwar Z, Sharf M, Khan E, Mustafa M (2013) VG-MIPS: A dynamic binary instrumentation framework for multi-core MIPS processors. In:INMIC, Lahore, Pakistan, 166\u2013171","DOI":"10.1109\/INMIC.2013.6731344"},{"key":"6191_CR48","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-030-02744-5_27","volume-title":"Network and system security","author":"T Chen","year":"2018","unstructured":"Chen T, Feng Y, Lin X, Li Z, Zhang X (2018) DBAF: dynamic binary analysis framework and its applications. Network and System Security. NSS 2018. Lecture Notes in Computer Science, vol 11058. Springer, Cham pp 361\u2013375"},{"key":"6191_CR49","first-page":"574","volume":"41","author":"Y Fu","year":"2018","unstructured":"Fu Y, Deng Y, Xiaoshan S (2018) Finding full pointer dereference in binaries.\u00a0Chinese J Comput\u00a041:574\u2013587","journal-title":"Chinese J Comput"},{"key":"6191_CR50","doi-asserted-by":"crossref","unstructured":"Wang X, Ma H, Yang K (2015) A Method of Handling Control Dependence in Dynamic Taint Analysis. 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp 417\u2013422","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.59"},{"key":"6191_CR51","doi-asserted-by":"crossref","unstructured":"Hadrien Grasland Fran\u00e7ois, F\u00e9votte B, Lathuili\u00e8re, Chamont D (2019) Floating-point profiling of ACTS using Verrou. In: Proceedings of 23rd International Conference on Computing in High Energy and Nuclear Physics (CHEP 2018). Sofia, Bulgaria, pp 1\u20138","DOI":"10.1051\/epjconf\/201921405025"},{"key":"6191_CR52","doi-asserted-by":"crossref","unstructured":"Zhou L, Fu S, Guo T, Han L, Cui B (2016) Design and Implementation of a C\u2009+\u2009+\u2009Memory Leak Detection Tool Based on Dynamic Instrumentation. In: 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Fukuoka, Japan, pp 149\u2013153","DOI":"10.1109\/IMIS.2016.47"},{"key":"6191_CR53","doi-asserted-by":"crossref","unstructured":"Engelke A, Schulz M (2020) Instrew: leveraging LLVM for high performance dynamic binary instrumentation. In: Proceedings of the 16th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE '20). Association for Computing Machinery, New York, NY, USA, pp 172\u2013184","DOI":"10.1145\/3381052.3381319"},{"key":"6191_CR54","doi-asserted-by":"crossref","unstructured":"Obuchi H, Ootsu K, Ohkawa T, Yokota T (2015) Efficient Translation and Execution Method for Automated Parallel Processing System by Using Valgrind. In: 2015 Third International Symposium on Computing and Networking (CANDAR), Sapporo, Japan, pp 607\u2013609","DOI":"10.1109\/CANDAR.2015.109"},{"key":"6191_CR55","doi-asserted-by":"crossref","unstructured":"Hoshi T, Ootsu K, Ohkawa T, Yokota T (2013) Runtime Overhead Reduction in Automated Parallel Processing System Using Valgrind. In: 2013 First International Symposium on Computing and Networking, Matsuyama, Japan, pp 572\u2013576","DOI":"10.1109\/CANDAR.2013.102"},{"issue":"4","key":"6191_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3281664","volume":"15","author":"D-Y Hong","year":"2018","unstructured":"Hong D-Y, Wu J-J, Liu Y-P, Fu S-Y, Hsu W-C (2018) Processor-tracing guided region formation in dynamic binary translation. ACM Transactions on Architecture and Code Optimization (TACO), 15(4):1\u201325","journal-title":"ACM Trans Architect Code Optim"},{"issue":"3","key":"6191_CR57","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1007\/s11227-011-0636-y","volume":"61","author":"W Chen","year":"2012","unstructured":"Chen W, Chen D, Wang Z (2012) An approach to minimizing the interpretation overhead in dynamic binary translation. J Supercomput 61(3):804\u2013825","journal-title":"J Supercomput"},{"key":"6191_CR58","unstructured":"Cabecinhas F, Lopes N, Crisotomo R, Veiga L (2008) Optimizing binary code produced by Valgrind. Virtual Execution Environments Course"},{"key":"6191_CR59","doi-asserted-by":"crossref","unstructured":"David Y, Partush N, Yahav E (2017) Similarity of binaries through re-optimization. In: Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation. Barcelona, Spain, pp 79\u201394","DOI":"10.1145\/3062341.3062387"},{"key":"6191_CR60","doi-asserted-by":"crossref","unstructured":"Rocha RCO, Sprokholt D, Fink M, Gouicem R, Spink T, Chakraborty S, Bhatotia P (2022) Lasagne: a static binary translator for weak memory model architectures. In: Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation. San Diego, CA, USA, pp 888\u2013902","DOI":"10.1145\/3519939.3523719"},{"key":"6191_CR61","doi-asserted-by":"crossref","unstructured":"Dasgupta S, Dinesh S, Venkatesh D, Adve VS, Fletcher CW (2020) Scalable validation of binary lifters. In: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation. London, UK, pp 655\u2013671","DOI":"10.1145\/3385412.3385964"},{"issue":"8","key":"6191_CR62","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1134\/S0361768820080058","volume":"46","author":"DS Koltunov","year":"2020","unstructured":"Koltunov DS, Efimov VY, Padaryan VA (2020) Automated testing of a TCG frontend for Qemu. Program Comput Softw 46(8):737\u2013746","journal-title":"Program Comput Softw"},{"issue":"C","key":"6191_CR63","first-page":"96","volume":"43","author":"JY Chen","year":"2015","unstructured":"Chen JY, Yang W, Shen BY, Li YJ, Hsu WC (2015) Automatic validation for binary translation. Comput Lang Syst Struct 43(C):96\u2013115","journal-title":"Comput Lang Syst Struct"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06191-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-025-06191-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06191-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T02:38:50Z","timestamp":1761878330000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-025-06191-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":63,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["6191"],"URL":"https:\/\/doi.org\/10.1007\/s10836-025-06191-5","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"14 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2025","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This paper has been updated to remove the erroneous ESM file and correct grammatical errors in the article text.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}