{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:03:20Z","timestamp":1752984200861,"version":"3.37.3"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council (EPSRC)","doi-asserted-by":"publisher","award":["EP\/P020011\/1"],"award-info":[{"award-number":["EP\/P020011\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,27]]},"DOI":"10.1109\/cgo51591.2021.9370313","type":"proceedings-article","created":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T21:33:26Z","timestamp":1615498406000},"page":"103-114","source":"Crossref","is-referenced-by-count":3,"title":["Cinnamon: A Domain-Specific Language for Binary Profiling and Monitoring"],"prefix":"10.1109","author":[{"given":"Mahwish","family":"Arif","sequence":"first","affiliation":[{"name":"University of Cambridge,Cambridge,UK"}]},{"given":"Ruoyu","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Cambridge,Cambridge,UK"}]},{"given":"Hsi-Ming","family":"Ho","sequence":"additional","affiliation":[{"name":"University of Sussex,Brighton,UK"}]},{"given":"Timothy M.","family":"Jones","sequence":"additional","affiliation":[{"name":"University of Cambridge,Cambridge,UK"}]}],"member":"263","reference":[{"journal-title":"Callgrind A Call-Graph Generating Cache and Branch Prediction Profiler","article-title":"Valgrind Developers","year":"2010","key":"ref39"},{"key":"ref38","article-title":"SOK: (state of) the art of war: Offensive techniques in binary analysis","author":"shoshitaishvili","year":"2016","journal-title":"Security and Privacy"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21424-0_13"},{"key":"ref32","article-title":"Analyzing memory accesses in xS6 executables","author":"balakrishnan","year":"2004","journal-title":"Compiler Construction"},{"journal-title":"GrammaTech","year":"2020","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465380"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/1097-024X(200101)31:1<67::AID-SPE357>3.0.CO;2-A"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577061"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/384197.384204"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23248"},{"journal-title":"The ERESI reverse engineering software interface","year":"2009","author":"vanegue","key":"ref60"},{"journal-title":"REIL A Platform-independent Intermediate Representation of Disassembled Code for Static Code Analysis","year":"2009","author":"dullien","key":"ref62"},{"journal-title":"Static binary analysis with a domain specific language","year":"2008","author":"vanegue","key":"ref61"},{"key":"ref63","article-title":"BARF: a multiplatform open source binary analysis and reverse engineering framework","author":"heitman","year":"2014","journal-title":"Congreso Argentino de Ciencias de la Computacion"},{"key":"ref28","article-title":"Binary translation using peephole superoptim-izers","author":"bansal","year":"2008","journal-title":"OSDI"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2784731.2784754"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1086642.1086645"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2185520.2185528"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661201"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931047"},{"journal-title":"Static analysis of xS6 executables","year":"2010","author":"kinder","key":"ref1"},{"key":"ref20","article-title":"Control flow integrity for COTS binaries","author":"zhang","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2011.5764689"},{"key":"ref21","article-title":"Secure execution via program shepherding","author":"kiriansky","year":"2002","journal-title":"USENIX Security Symposium"},{"key":"ref24","article-title":"A binary rewriting defense against stack based buffer overflow attacks","author":"prasad","year":"2003","journal-title":"USENIX Annual Technical Conference"},{"key":"ref23","article-title":"Secure execution environment via program shepherding","author":"amarasinghe","year":"2002","journal-title":"USENIX Security Symposium"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3313808.3313812"},{"key":"ref25","article-title":"Bounds-checking entire programs without recompiling","author":"nethercote","year":"2004","journal-title":"Space"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661203"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2009.28"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.1997.644016"},{"key":"ref58","article-title":"Reducing the overhead of direct application instrumentation using prior static analysis","author":"mubler","year":"2011","journal-title":"Euro-Par"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2162049.2162077"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/HiPC.2013.6799106"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/267959.267960"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173182"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737965"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3178372.3179515"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191551"},{"journal-title":"Cachegrind A Cache and Branch-prediction Profiler","article-title":"Valgrind Developers","year":"2009","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2024569.2024572"},{"key":"ref14","article-title":"ATOM: A flexible interface for building high performance program analysis tools","author":"eustace","year":"1995","journal-title":"USENIX Technical Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452024"},{"journal-title":"Efficient transparent and comprehensive runtime code manipulation","year":"2004","author":"bruening","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2006.302723"},{"key":"ref18","article-title":"Cross-architecture bug search in binary executables","author":"pewny","year":"2015","journal-title":"Security and Privacy"},{"key":"ref19","article-title":"Towards automatic generation of vulnerability-based signatures","author":"brumley","year":"2006","journal-title":"Security and Privacy"},{"journal-title":"Hex Rays IDA Pro","year":"0","key":"ref4"},{"key":"ref3","article-title":"Reassembleable disassembling","author":"wang","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref6","article-title":"Mcsema: Static translation of xS6 instructions to llvm","author":"dinaburg","year":"2014","journal-title":"ReCon"},{"key":"ref5","article-title":"Raising binaries to LLVM IR with MCTOLL","author":"yadavalli","year":"2019","journal-title":"LCTES"},{"key":"ref8","article-title":"QEMU, a fast and portable dynamic translator","author":"bellard","year":"2005","journal-title":"USENIX Annual Technical Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"ref49","article-title":"Loopprof: Dynamic techniques for loop detection and profiling","author":"moseley","year":"2006","journal-title":"WBIA"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1216374.1216380"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"journal-title":"Static Binary Instrumentation with Applications to COTS Software Security","year":"2015","author":"zhang","key":"ref48"},{"journal-title":"An event-based language for programmable debugging","year":"2018","author":"makarov","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74309-5_3"},{"key":"ref41","article-title":"Using valgrind to detect undefined value errors with bit-precision","author":"seward","year":"2005","journal-title":"USENIX Annual Technical Conference"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.158"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.60"}],"event":{"name":"2021 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","start":{"date-parts":[[2021,2,27]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2021,3,3]]}},"container-title":["2021 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9370300\/9370301\/09370313.pdf?arnumber=9370313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:50Z","timestamp":1652197370000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9370313\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,27]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/cgo51591.2021.9370313","relation":{},"subject":[],"published":{"date-parts":[[2021,2,27]]}}}