{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:51:22Z","timestamp":1757310682536,"version":"3.28.0"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179370","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"3296-3313","source":"Crossref","is-referenced-by-count":2,"title":["Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation"],"prefix":"10.1109","author":[{"given":"Ali","family":"Ahad","sequence":"first","affiliation":[{"name":"University of Virginia,Department of Computer Science,Charlottesville,VA,USA"}]},{"given":"Chijung","family":"Jung","sequence":"additional","affiliation":[{"name":"University of Virginia,Department of Computer Science,Charlottesville,VA,USA"}]},{"given":"Ammar","family":"Askar","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology,School of Computer Science,Atlanta,GA,USA"}]},{"given":"Doowon","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Tennessee,Department of Electrical Engineering and Computer Science,Knoxville,TN,USA"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology,School of Computer Science,Atlanta,GA,USA"}]},{"given":"Yonghwi","family":"Kwon","sequence":"additional","affiliation":[{"name":"University of Virginia,Department of Computer Science,Charlottesville,VA,USA"}]}],"member":"263","reference":[{"year":"2020","key":"ref1","article-title":"Radare2"},{"year":"2022","key":"ref2","article-title":"cpython\/Lib"},{"year":"2022","key":"ref3","article-title":"Dropbox"},{"year":"2022","key":"ref4","article-title":"The Python Package Index"},{"article-title":"Protecting a Python codebase","year":"2015","author":"Aguirre","key":"ref5"},{"journal-title":"USENIX Security\u201916.","article-title":"An in-depth analysis of disassembly on full-scale x86\/x64 binaries","author":"Andriesse","key":"ref6"},{"year":"2022","key":"ref7","article-title":"Python Malware On The Rise, Cyborg Security"},{"year":"2015","key":"ref8","article-title":"REC Studio 4-Reverse Engineering Compiler"},{"year":"2022","key":"ref9","article-title":"Binary Ninja"},{"year":"2022","key":"ref10","article-title":"Boomerang Decompiler"},{"year":"2022","key":"ref11","article-title":"RetDec"},{"journal-title":"USENIX Security\u201913.","article-title":"Native x86 decompilation using Semantics-Preserving structural analysis and iterative Control-Flow structuring","author":"Brumley","key":"ref12"},{"journal-title":"USENIX Security\u201917","article-title":"Neural nets can learn function type signatures from binaries","author":"Chua","key":"ref13"},{"year":"2022","key":"ref14","article-title":"PyInstaller"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1086642.1086645"},{"year":"2022","key":"ref16","article-title":"Python decompiler for 3.7-3.8"},{"year":"2022","key":"ref17","article-title":"Decompyle++"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00009"},{"year":"2022","key":"ref19","article-title":"Druva inSync"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385972"},{"year":"2022","key":"ref21","article-title":"Ghidra"},{"key":"ref22","first-page":"46","article-title":"Decompilers and beyond","volume":"9","author":"Guilfanov","year":"2008","journal-title":"Black Hat USA"},{"year":"2022","key":"ref23","article-title":"Pin"},{"year":"2022","key":"ref24","article-title":"Hex Rays"},{"year":"2022","key":"ref25","article-title":"JEB Decompiler by PNF Software"},{"journal-title":"WOOT\u201913","article-title":"Looking inside the (drop) box","author":"Kholia","key":"ref26"},{"journal-title":"NDSS\u201911.","article-title":"TIE: principled reverse engineering of types in binary programs","author":"Lee","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397370"},{"year":"2022","key":"ref29","article-title":"Malware Makers Using \u2018Exotic\u2019 Programming Languages"},{"issue":"239","key":"ref30","first-page":"2","article-title":"Docker: lightweight linux containers for consistent development and deployment","volume":"2014","author":"Merkel","year":"2014","journal-title":"Linux journal"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00121"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908119"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427292"},{"year":"2022","key":"ref35","article-title":"PyFET Supplementary Material"},{"volume-title":"PyFET repository: Correctness and Impact of PyFET","year":"2022","key":"ref36"},{"year":"2022","key":"ref37","article-title":"PyFET Repository"},{"year":"2022","key":"ref38","article-title":"QEMU"},{"year":"2022","key":"ref39","article-title":"Explainable Threat Intelligence, Re-versingLabs"},{"article-title":"DisC-Decompiler for TurboC","year":"2001","author":"Sampath","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243793"},{"year":"2018","key":"ref42","article-title":"Snowman"},{"year":"2014","key":"ref43","article-title":"Project orion"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3022671.2984038"},{"journal-title":"ICSE\u201920.","article-title":"Tailoring programs for static analysis via program transformation","author":"Tonder","key":"ref45"},{"year":"2016","key":"ref46","article-title":"Uncompyle2: A Python 2.7 byte-code decompiler"},{"year":"2022","key":"ref47","article-title":"Uncompyle6"},{"year":"2022","key":"ref48","article-title":"Unpyc37: Decompiler for Python 3.7"},{"year":"2022","key":"ref49","article-title":"Valgrind"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420995"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378470"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993532"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2015.7054204"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2023,5,21]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179370.pdf?arnumber=10179370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:18:37Z","timestamp":1721452717000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179370\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179370","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}