{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:38:21Z","timestamp":1730209101402,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/coginfocom.2013.6719206","type":"proceedings-article","created":{"date-parts":[[2014,1,24]],"date-time":"2014-01-24T21:22:06Z","timestamp":1390598526000},"page":"785-790","source":"Crossref","is-referenced-by-count":3,"title":["A method of machine code translation to intermediate representation"],"prefix":"10.1109","author":[{"given":"Dmitriy","family":"Dunaev","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Charaf","sequence":"additional","affiliation":[]},{"given":"Laszlo","family":"Lengyel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1102546.1102560"},{"journal-title":"Programming of Drivers and Secure Systems","year":"2003","author":"sorokina","key":"2"},{"journal-title":"Argument Passing and Naming Conventions","year":"2013","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268948"},{"key":"6","first-page":"5","article-title":"Analyzing memory accesses in x86 executables","author":"balakrishnan","year":"2004","journal-title":"Proc of the 13th Int Conf on Compiler Construction (CC)"},{"key":"5","first-page":"71","article-title":"Alias analysis for intermediate code","author":"gupta","year":"2003","journal-title":"Proceedings of the GCC Developers Summit"},{"key":"4","first-page":"36","article-title":"Overview of an obfuscation algorithm","author":"dunaev","year":"2012","journal-title":"Proceedings of the International Conference on Computer Science and Information Technologies (CSIT'2012)"},{"key":"9","first-page":"330","article-title":"Computing interprocedurally valid relations in affine programs","author":"mu?ller-olm","year":"2004","journal-title":"ACM SIGPLAN Principles of Programming Languages (POPL)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-010-0157-y"},{"key":"11","article-title":"Calling conventions for different C++ compilers and operating systems","author":"fog","year":"2012","journal-title":"Copenhagen University College of Engineering Software Optimization Resources"},{"key":"12","first-page":"67","article-title":"Definition and synergies of cognitive infocommunications","volume":"9","author":"baranyi","year":"2012","journal-title":"Acta Polytechnica Hungarica"}],"event":{"name":"2013 IEEE 4th International Conference on Cognitive Infocommunications (CogInfoCom)","start":{"date-parts":[[2013,12,2]]},"location":"Budapest, Hungary","end":{"date-parts":[[2013,12,5]]}},"container-title":["2013 IEEE 4th International Conference on Cognitive Infocommunications (CogInfoCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6708578\/6719162\/06719206.pdf?arnumber=6719206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:05:23Z","timestamp":1490227523000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6719206\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/coginfocom.2013.6719206","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}