{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:43:25Z","timestamp":1769751805281,"version":"3.49.0"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2017M3C4A7068177"],"award-info":[{"award-number":["2017M3C4A7068177"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2017R1A2B3012020"],"award-info":[{"award-number":["2017R1A2B3012020"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2022R1A2C200366011"],"award-info":[{"award-number":["2022R1A2C200366011"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2021R1A5A1021944"],"award-info":[{"award-number":["2021R1A5A1021944"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute for Information &amp; Communications Technology Promotion","award":["2022-0-00460"],"award-info":[{"award-number":["2022-0-00460"]}]},{"name":"Samsung Electronics Company, Ltd","award":["G01210570"],"award-info":[{"award-number":["G01210570"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/tse.2023.3241639","type":"journal-article","created":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T19:54:31Z","timestamp":1675367671000},"page":"3089-3105","source":"Crossref","is-referenced-by-count":15,"title":["Static Analysis of JNI Programs via Binary Decompilation"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6792-5161","authenticated-orcid":false,"given":"Jihee","family":"Park","sequence":"first","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7107-5590","authenticated-orcid":false,"given":"Sungho","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chungnam National University, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-7369","authenticated-orcid":false,"given":"Jaemin","family":"Hong","sequence":"additional","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0019-9772","authenticated-orcid":false,"given":"Sukyoung","family":"Ryu","sequence":"additional","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, South Korea"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Ghidra.","author":"agency","year":"2020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74061-2_11"},{"key":"ref12","article-title":"About IDA","year":"2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/321832.321835"},{"key":"ref15","year":"2018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950350"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58768-0_14"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/11693024_21"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.01.018"},{"key":"ref11","article-title":"Chapter 2: Design overview - compiling, loading and linking native methods","year":"2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738514"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397368"},{"key":"ref32","first-page":"353","article-title":"Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring","author":"brumley","year":"2013","journal-title":"Proc 22nd USENIX Secur Symp"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23384"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243835"},{"key":"ref17","article-title":"NativeFlowBench","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23019"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/978-3-642-20398-5_33","article-title":"Infer: An automatic program verifier for memory safety of C programs","author":"calcagno","year":"2011","journal-title":"Proc 3rd Int Symp NASA Formal Methods"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177157"},{"key":"ref19","article-title":"Best practices for using the Java native interface","year":"2009"},{"key":"ref18","article-title":"F-Droid - Free and open source Android app repository","year":"2019"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046739"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/948148.948149"},{"key":"ref26","first-page":"583","article-title":"An in-depth analysis of disassembly on full-scale x86\/x64 binaries","author":"andriesse","year":"2016","journal-title":"Proc 25th USENIX Conf Secur Symp"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.47"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397370"},{"key":"ref22","article-title":"Static disassembly of obfuscated binaries","author":"kruegel","year":"2004","journal-title":"Proc 13th Conf USENIX Secur Symp"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380250706"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26529-2_26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_11"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.69"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1145\/3324884.3416558","article-title":"Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program Analysis","author":"lee","year":"2020","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297031"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.011"},{"key":"ref4","article-title":"Misuse of JNI by libguestfs Java bindings","author":"obenour","year":"2018"},{"key":"ref3","article-title":"Chapter 2: Design overview - Java exceptions","year":"2020"},{"key":"ref6","first-page":"1347","article-title":"Too quiet in the library: An empirical study of security updates in Android apps&#x2019; native code","author":"almanee","year":"2021","journal-title":"Proc IEEE 43rd Int Conf Softw Eng"},{"key":"ref5","first-page":"274","article-title":"State of practices of Java native interface","author":"grichi","year":"2019","journal-title":"Proc 29th Annu Int Conf Comput Sci Softw Eng"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10124809\/10035436.pdf?arnumber=10035436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T18:08:31Z","timestamp":1686593311000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10035436\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":39,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3241639","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,1]]}}}