{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:40:39Z","timestamp":1775054439115,"version":"3.50.1"},"reference-count":28,"publisher":"Pleiades Publishing Ltd","issue":"7","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1134\/s0361768819070107","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T11:02:45Z","timestamp":1576494165000},"page":"424-437","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Next-Generation Intermediate Representations for Binary Code Analysis"],"prefix":"10.1134","volume":"45","author":[{"given":"M. A.","family":"Solovev","sequence":"first","affiliation":[]},{"given":"M. G.","family":"Bakulin","sequence":"additional","affiliation":[]},{"given":"M. S.","family":"Gorbachev","sequence":"additional","affiliation":[]},{"given":"D. V.","family":"Manushin","sequence":"additional","affiliation":[]},{"given":"V. A.","family":"Padaryan","sequence":"additional","affiliation":[]},{"given":"S. S.","family":"Panasenko","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2019,12,16]]},"reference":[{"issue":"1","key":"7088_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2699678","volume":"33","author":"Xi Wang","year":"2015","unstructured":"Wang, X., Zeldovich, N., Kaashoek, M.F., and Solar-Lezama, A., A differential approach to undefined behavior detection, ACM Trans. Comput. Syst., 2015, vol.\u00a033, no. 1.","journal-title":"ACM Transactions on Computer Systems"},{"key":"7088_CR2","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1273442.1250746","volume":"42","author":"N. Nethercote","year":"2007","unstructured":"Nethercote, N. and Seward, J., Valgrind: A framework for heavyweight dynamic binary instrumentation, ACM SIGPLAN Not., 2007, vol. 42, no. 6, pp. 89\u2013100.","journal-title":"ACM SIGPLAN Not."},{"key":"7088_CR3","doi-asserted-by":"crossref","unstructured":"Chipounov, V. and Candea, G., Enabling sophisticated analyses of x86 binaries with RevGen, Proc. IEEE\/IFIP 41st Int. Conf. Dependable Systems and Networks Workshops (DSN-W), 2011, pp. 211\u2013216.","DOI":"10.1109\/DSNW.2011.5958815"},{"key":"7088_CR4","doi-asserted-by":"crossref","unstructured":"Lattner, C. and Adve, V., LLVM: A compilation framework for lifelong program analysis and transformation. Proc. Int. Symp. Code Generation and Optimization: Feedback-Directed and Runtime Optimization, 2004, pp.\u00a075\u201386.","DOI":"10.1109\/CGO.2004.1281665"},{"key":"7088_CR5","doi-asserted-by":"crossref","unstructured":"Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., and Saxena, P., BitBlaze: A new approach to computer security via binary analysis, Inf. Syst. Secur., 2008, pp.\u00a01\u201325.","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"7088_CR6","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1134\/S0361768811030030","volume":"37","author":"V.A. Padaryan","year":"2011","unstructured":"Padaryan, V.A., Solov\u2019ev, M.A., and Kononov, A.I., Simulation of operational semantics of machine instructions, Program. Comput. Software, 2011, vol. 37, no. 3, pp. 161\u2013170.","journal-title":"Program. Comput. Software"},{"key":"7088_CR7","volume-title":"BAP: A binary analysis platform","author":"D. Brumley","year":"2011","unstructured":"Brumley, D., Jager, I., Avgerinos, T., and Schwartz, E.J., BAP: A binary analysis platform, Proc. Computer Aided Verification, 2011, pp. 463\u2013469."},{"key":"7088_CR8","unstructured":"Dullien, T. and Porst, S., REIL: A platform-independent intermediate representation of disassembled code for static code analysis, Proc. CanSecWest Conf., 2009."},{"key":"7088_CR9","unstructured":"Bellard, F., QEMU: A fast and portable dynamic translator, Proc. USENIX Annual Technical Conf., 2005."},{"key":"7088_CR10","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/1064978.1065034","volume":"40","author":"C.K. Luk","year":"2005","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., and Hazelwood, K., Pin: Building customized program analysis tools with dynamic instrumentation, ACM SIGPLAN Not., 2005, vol. 40, no. 6, pp. 190\u2013200.","journal-title":"ACM SIGPLAN Not."},{"key":"7088_CR11","unstructured":"Bruening, D. and Amarasinghe, S., Efficient, transparent, and comprehensive runtime code manipulation, PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 2004."},{"key":"7088_CR12","doi-asserted-by":"crossref","unstructured":"Chipounov, V. and Kuznetsov, V., S2E: A platform for in vivo multi-path analysis of software systems, Proc. 16th Int. Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2011.","DOI":"10.1145\/1950365.1950396"},{"key":"7088_CR13","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Avgerinos, T., Rebert, A., and Brumley, D., Unleashing mayhem on binary code, Proc. IEEE Symp. Security and Privacy (SP), 2012, pp. 380\u2013394.","DOI":"10.1109\/SP.2012.31"},{"key":"7088_CR14","first-page":"127","volume":"26","author":"V.A. Padaryan","year":"2014","unstructured":"Padaryan, V.A., Kaushan, V.V., and Fedotov, A.N., Automated exploit generation method for stack buffer overflow vulnerabilities, Tr. Inst. Sistemnogo Program. Ross. Akad. Nauk, 2014, vol. 26, no. 3, pp. 127\u2013144.","journal-title":"Tr. Inst. Sistemnogo Program. Ross. Akad. Nauk"},{"key":"7088_CR15","unstructured":"Kruegel, C., Valeur, F., Robertson, W., and Vigna, G., Static analysis of obfuscated binaries, Proc. 13th USENIX Security Symp., 2004, pp. 255\u2013270."},{"key":"7088_CR16","doi-asserted-by":"crossref","unstructured":"Ben Khadra, M.A., Stoffel, D., and Kunz, W., Speculative disassembly of binary code, Proc. Int. Conf. Compilers, Architectures, and Synthesis for Embedded Systems, 2016.","DOI":"10.1145\/2968455.2968505"},{"key":"7088_CR17","doi-asserted-by":"crossref","unstructured":"Balakrishnan, G. and Reps, T., Analyzing memory accesses in x86 executables, Proc. 13th Int. Conf. Compiler Construction, 2004, pp. 5\u201323.","DOI":"10.1007\/978-3-540-24723-4_2"},{"key":"7088_CR18","unstructured":"Aslanyan, H., Asryan, S., Hakobyan, J., Vardanyan, V., Sargsyan, S., and Kurmangaleev, S., Multiplatform static analysis framework for program defects detection. Proc. CSIT Conf., 2017."},{"key":"7088_CR19","doi-asserted-by":"crossref","unstructured":"Cousot, P. and Cousot, R., Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints, Proc. 4th ACM SIGACT-SIGPLAN Symp. Principles of Programming Languages, 1977, pp. 238\u2013252.","DOI":"10.1145\/512950.512973"},{"key":"7088_CR20","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1134\/S0361768814050077","volume":"40","author":"V.A. Padaryan","year":"2014","unstructured":"Padaryan, V.A., Getman, A.I., Solovyev, M.A., Bakulin, M.G., Borzilov, A.I., Kaushan, V.V., Ledovskikh, I.N., Markin, Yu.V., and Panasensko, S.S., Methods and software tools to support combined binary code analysis, Program. Comput. Software, 2014, vol. 40, no.\u00a05, pp. 276\u2013287.","journal-title":"Program. Comput. Software"},{"key":"7088_CR21","unstructured":"GNU Binutils. http:\/\/www.sourceware.org\/binutils. Accessed December 3, 2018."},{"key":"7088_CR22","unstructured":"Capstone. http:\/\/www.capstone-engine.org. Accessed December 3, 2018."},{"key":"7088_CR23","unstructured":"IDA Pro. http:\/\/www.hex-rays.com\/products\/ida\/index.shtml. Accessed December 3, 2018."},{"key":"7088_CR24","doi-asserted-by":"crossref","unstructured":"Fauth, A., Van Praet, J., and Freericks, M., Describing instruction set processors using nML, Proc. European Design and Test Conf., 1995, pp. 503\u2013507.","DOI":"10.1109\/EDTC.1995.470354"},{"key":"7088_CR25","doi-asserted-by":"crossref","unstructured":"Hadjiyiannis, G., Hanono, S., and Devadas, S., ISDL: An instruction set description language for retargetability, Proc. 34th Annual Design Automation Conf., 1997, pp. 299\u2013302.","DOI":"10.1145\/266021.266108"},{"key":"7088_CR26","doi-asserted-by":"crossref","unstructured":"Fox, A., Improved tool support for machine-code decompilation in HOL4, Proc. Int. Conf. Interactive Theorem Proving, 2015, pp. 187\u2013202.","DOI":"10.1007\/978-3-319-22102-1_12"},{"key":"7088_CR27","doi-asserted-by":"crossref","unstructured":"Gray, K.E., Kerneis, G., Mulligan, D., Pulte, C., Sarkar, S., and Sewell, P., An integrated concurrency and core-ISA architectural envelope definition, and test oracle, for IBM POWER multiprocessors, Proc. 48th Int. Symp. Microarchitecture, 2015, pp. 635\u2013646.","DOI":"10.1145\/2830772.2830775"},{"key":"7088_CR28","volume-title":"Advanced Compiler Design and Implementation","author":"S.S. Muchnick","year":"1997","unstructured":"Muchnick, S.S., Advanced Compiler Design and Implementation, Morgan Kaufmann, 1997."}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768819070107.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768819070107","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768819070107.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:43:15Z","timestamp":1775011395000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768819070107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":28,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7088"],"URL":"https:\/\/doi.org\/10.1134\/s0361768819070107","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"13 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}