{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T03:35:33Z","timestamp":1775014533710,"version":"3.50.1"},"reference-count":28,"publisher":"Pleiades Publishing Ltd","issue":"5","license":[{"start":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T00:00:00Z","timestamp":1409529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T00:00:00Z","timestamp":1409529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1134\/s0361768814050077","type":"journal-article","created":{"date-parts":[[2014,9,20]],"date-time":"2014-09-20T17:09:49Z","timestamp":1411232989000},"page":"276-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Methods and software tools to support combined binary code analysis"],"prefix":"10.1134","volume":"40","author":[{"given":"V. A.","family":"Padaryan","sequence":"first","affiliation":[]},{"given":"A. I.","family":"Getman","sequence":"additional","affiliation":[]},{"given":"M. A.","family":"Solovyev","sequence":"additional","affiliation":[]},{"given":"M. G.","family":"Bakulin","sequence":"additional","affiliation":[]},{"given":"A. I.","family":"Borzilov","sequence":"additional","affiliation":[]},{"given":"V. V.","family":"Kaushan","sequence":"additional","affiliation":[]},{"given":"I. N.","family":"Ledovskikh","sequence":"additional","affiliation":[]},{"given":"Yu. V.","family":"Markin","sequence":"additional","affiliation":[]},{"given":"S. S.","family":"Panasenko","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2014,9,21]]},"reference":[{"key":"6228_CR1","first-page":"66","volume-title":"Komp\u2019yuternye systemy","author":"A Tikhonov","year":"2008","unstructured":"Tikhonov, A., Avetisyan, A., Padaryan, V., Methodology of exploring of an algorithm from binary code by dynamic analysis Problemy inphormatsionnoi bezopasnosti. Komp\u2019yuternye systemy, 2008, no. 3, pp.66\u201371."},{"key":"6228_CR2","first-page":"97","volume-title":"Proc. of the 19th All-Russian Scientific and Technical Conference \u201cMethods and Technical Tools for Information Security\u201d","author":"AI Avetisyan","year":"2010","unstructured":"Avetisyan, A.I., Padaryan, V.A., Getman, A.I., and Solovyev, M.A., On some methods of improving the representation level when analyzing the protected binary code, Proc. of the 19th All-Russian Scientific and Technical Conference \u201cMethods and Technical Tools for Information Security\u201d, 2010, pp.97\u201398."},{"key":"6228_CR3","first-page":"131","volume":"22","author":"AYu Tikhonov","year":"2012","unstructured":"Tikhonov, A.Yu. and Avetisyan, A.I., Combined (static and dynamic) analysis of binary code, Trudy Instituta Sistemnogo Programmirovaniya Ross. Akad. Nauk, 2012, vol. 22, pp. 131\u2013152.","journal-title":"Trudy Instituta Sistemnogo Programmirovaniya Ross. Akad. Nauk"},{"key":"6228_CR4","doi-asserted-by":"crossref","unstructured":"Getman, A., Padaryan, V., and Solovyev, M., Combined approach to solving problems in binary code analysis, Proc. of the 9th Int. Conf. on Computer Science and Information Technologies (CSIT\u20192013), pp. 295\u2013297.","DOI":"10.1109\/CSITechnol.2013.6710361"},{"key":"6228_CR5","first-page":"77","volume":"22","author":"K Batuzov","year":"2012","unstructured":"Batuzov, K., Dovgalyuk, P., Koshelev, V., and Padaryan, V., Two approaches to full-system deterministic replay in QEMU, Trudy Instituta Sistemnogo Programmirovaniya Ross. Akad. Nauk, 2012, vol. 22, pp. 77\u201394.","journal-title":"Trudy Instituta Sistemnogo Programmirovaniya Ross. Akad. Nauk"},{"key":"6228_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Int. Conf. on Information Systems Security","author":"D Song","year":"2008","unstructured":"Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Gyung Kang, M., Liang, Z., Newsome, J., Poosankam, P., and Saxena, P., BitBlaze: a new approach to computer security via binary analysis, Int. Conf. on Information Systems Security, 2008, LNCS 5352, pp. 1\u201325."},{"key":"6228_CR7","unstructured":"Kwong Yan, L., and Yin, H., DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis, Proc. of the 21st USENIX conference on Security symposium (Security\u201912). USENIX Association, Berkeley, CA, USA, pp. 29\u201329."},{"key":"6228_CR8","unstructured":"Yin, H., and Song, D., TEMU: binary code analysis via whole-system layered annotative execution, EECS Department University of California, Berkeley, Technical Report no. UCB\/EECS-2010-3, January 11, 2010, p. 14."},{"key":"6228_CR9","volume-title":"Second UK Workshop on Program Comprehension","author":"M Harman","year":"1996","unstructured":"Harman, M., Danicic, S., Sivagurunathan, Y., and Simpson, D., The next 700 slicing criteria, Second UK Workshop on Program Comprehension, 1996."},{"key":"6228_CR10","first-page":"51","volume":"16","author":"VA Padaryan","year":"2009","unstructured":"Padaryan, V.A., Getman, A.I., and Solovyev, M.A., Software environment for dynamic analysis of binary code, Trudy Instituta Sistemnogo Programmirovaniya Ross. Akad. Nauk, 2009, vol. 16, pp. 51\u201372.","journal-title":"Trudy Instituta Sistemnogo Programmirovaniya Ross. Akad. Nauk"},{"issue":"3","key":"6228_CR11","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1134\/S0361768811030030","volume":"37","author":"VA Padaryan","year":"2011","unstructured":"Padaryan, V.A., Solovyev, M.A., and Kononov, A.I., Simulation of operational semantics of machine instructions, Program. Comput. Software, 2011, vol. 37, no. 3, pp. 161\u2013170.","journal-title":"Program. Comput. Software"},{"key":"6228_CR12","doi-asserted-by":"crossref","unstructured":"Brumley, D., Jager, I., Avgerinos, Th., and Schwartz, E. J., BAP: a binary analysis platform, Proc. of the 23rd Int. Conf. on Computer Aided Verification (CAV\u201911), Gopalakrishnan., G, and Qadeer, Sh., Eds., Berlin: Springer, pp. 463\u2013469.","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"6228_CR13","first-page":"195","volume":"19","author":"AI Getman","year":"2010","unstructured":"Getman, A.I., Markin, Yu.V., Padaryan, V.A., and Schetinin, E.I., Data format recovery, Trudy Instituta Sistemnogo Programmirovaniya Ross. Akad. Nauk, 2010, vol. 19, pp. 195\u2013214.","journal-title":"Trudy Instituta Sistemnogo Programmirovaniya Ross. Akad. Nauk"},{"key":"6228_CR14","first-page":"95","volume":"22","author":"AI Avetisyan","year":"2012","unstructured":"Avetisyan, A.I., and Getman, A.I., Recovery the structure of binary data on the program traces, Trudy Instituta Sistemnogo Programmirovaniya Ross. Akad. Nauk, 2012, vol. 22, pp. 95\u2013118.","journal-title":"Trudy Instituta Sistemnogo Programmirovaniya Ross. Akad. Nauk"},{"key":"6228_CR15","volume-title":"Proc. of the Network and Distributed System Security Symposium (NDSS)","author":"J Newsome","year":"2005","unstructured":"Newsome, J. and Song, D., Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, Proc. of the Network and Distributed System Security Symposium (NDSS), 2005."},{"key":"6228_CR16","first-page":"621","volume-title":"Proc. of the 16th ACM Conf. on Computer and Communications Security (CCS)","author":"J Caballero","year":"2009","unstructured":"Caballero, J., Poosankam, P., Kreibich, C., and Song, D., Dispatcher: enabling active Botnet infiltration using automatic protocol reverse-engineering, Proc. of the 16th ACM Conf. on Computer and Communications Security (CCS), 2009, pp. 621\u2013634."},{"key":"6228_CR17","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1145\/1455770.1455820","volume-title":"CCS\u201908: Proc. of the 15th ACM Conf. on Computer and Communications Security","author":"W Cui","year":"2008","unstructured":"Cui, W., Peinado, M., Chen, K., Wang, H. J., and Irun-Briz, L., Tupni: automatic reverse engineering of input formats, CCS\u201908: Proc. of the 15th ACM Conf. on Computer and Communications Security, 2008, pp. 391\u2013402."},{"key":"6228_CR18","volume-title":"Proc. of the 17th Network and Distributed System Security Symposium","author":"Z Lin","year":"2010","unstructured":"Lin, Z., Zhang, X., and Xu, D., Automatic reverse engineering of data structures from binary execution, Proc. of the 17th Network and Distributed System Security Symposium, 2010."},{"issue":"3","key":"6228_CR19","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","volume":"48","author":"SB Needleman","year":"1970","unstructured":"Needleman, S.B., and Wunsch, C.D., A general method applicable to the search for similarities in the amino acid sequence of two proteins, J. Mol. Biol., 1970, vol. 48, no. 3, pp. 443\u2013453.","journal-title":"J. Mol. Biol."},{"key":"6228_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-21554-4_1","volume-title":"Proc. of the 9th Int. Conf. on Applied Cryptography and Network Security (ACNS)","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Zhang, Z., Yao, D., Qu, B., and Guo, L., Inferring protocol state machine from network traces: a probabilistic approach, Proc. of the 9th Int. Conf. on Applied Cryptography and Network Security (ACNS), 2011, pp. 1\u201318."},{"key":"6228_CR21","first-page":"110","volume-title":"Proc. of the 30th IEEE Symposium on Security and Privacy","author":"PM Comparetti","year":"2009","unstructured":"Comparetti, P.M., Wondracek, G., Kruegel, C., and Kirda, E., Prospex: protocol specification extraction, Proc. of the 30th IEEE Symposium on Security and Privacy, 2009, pp. 110\u2013125."},{"key":"6228_CR22","doi-asserted-by":"crossref","unstructured":"Balakrishnan, G., Gruian, R., Reps, T., and Teitelbaum, T., CodeSurfer\/x86-a platform for analyzing x86 executables, Proc. of the 14th Int. Conf. on Compiler Construction (CC\u201905), Berlin: Springer, pp. 250\u2013254.","DOI":"10.1007\/978-3-540-31985-6_19"},{"key":"6228_CR23","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-540-24723-4_2","volume-title":"Proc. of Compiler Construction","author":"G Balakrishnan","year":"2004","unstructured":"Balakrishnan, G. and Reps, T., Analyzing memory accesses in x86 executables, Proc. of Compiler Construction, New York: Springer, 2004, pp. 5\u201323."},{"key":"6228_CR24","doi-asserted-by":"crossref","unstructured":"Babic, D., Martignoni, L., McCamant, S., and Song, D., Statically-directed dynamic automated test generation, Proc. of the 2011 Int. Symp. on Software Testing and Analysis (ISSTA\u2019 11). ACM, New York, pp. 12\u201322.","DOI":"10.1145\/2001420.2001423"},{"key":"6228_CR25","doi-asserted-by":"crossref","unstructured":"Caselden, D., Bazhanyuk, A., Payer, M., McCamant, S., and Song, D., HI-CFG: construction by binary analysis, and application to attack polymorphism, Proc. of 18th Europ. Symp. on Research in Computer Security, Egham, UK, 2013, LNCS 8134, pp. 164\u2013181.","DOI":"10.1007\/978-3-642-40203-6_10"},{"key":"6228_CR26","doi-asserted-by":"crossref","unstructured":"Saxena, P., Poosankam, P., McCamant, S., and Song, D., Loop-extended symbolic execution on binary programs, Proc. of the 18th Int. Symp. on Software Testing and Analysis (ISSTA\u2019 09), New York: ACM, pp. 225\u2013236.","DOI":"10.1145\/1572272.1572299"},{"key":"6228_CR27","doi-asserted-by":"crossref","unstructured":"Caballero, J., Poosankam, P., McCamant, S., Babic, D., and Song, D., Input generation via decomposition and re-stitching: finding bugs in malware, Proc. of the 17th ACM Conf. on Computer and Communications Security (CCS\u2019 10), New York: ACM, pp. 413\u2013425.","DOI":"10.1145\/1866307.1866354"},{"key":"6228_CR28","doi-asserted-by":"crossref","unstructured":"Kil Cha, S., Avgerinos, Th., Rebert, A., and Brumley, D., Unleashing mayhem on binary code, Proc. of the 2012 IEEE Symposium on Security and Privacy (SP\u2019 12), IEEE Computer Society, Washington, pp. 380\u2013394.","DOI":"10.1109\/SP.2012.31"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768814050077.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768814050077","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768814050077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768814050077.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:19:28Z","timestamp":1775009968000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768814050077"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["6228"],"URL":"https:\/\/doi.org\/10.1134\/s0361768814050077","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9]]},"assertion":[{"value":"16 March 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2014","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}