{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:44:23Z","timestamp":1750308263588,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,9,22]],"date-time":"2004-09-22T00:00:00Z","timestamp":1095811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,9,22]]},"DOI":"10.1145\/1023833.1023857","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"157-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Static program analysis of embedded executable assembly code"],"prefix":"10.1145","author":[{"given":"Ramakrishnan","family":"Venkitaraman","sequence":"first","affiliation":[{"name":"The University of Texas at Dallas, TX"}]},{"given":"Gopal","family":"Gupta","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas, TX"}]}],"member":"320","published-online":{"date-parts":[[2004,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"214","volume-title":"Calvin Lin. Client-Driven Pointer Analysis. Static Analysis Symposium.","author":"Guyer Samuel Z.","year":"2003","unstructured":"Samuel Z. Guyer , Calvin Lin. Client-Driven Pointer Analysis. Static Analysis Symposium. 2003 . Springer LNCS 2694. pp. 214 -- 236 .]] Samuel Z. Guyer, Calvin Lin. Client-Driven Pointer Analysis. Static Analysis Symposium. 2003. Springer LNCS 2694. pp. 214--236.]]"},{"key":"e_1_3_2_1_2_1","first-page":"230","volume-title":"Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis. SAS","author":"Adams S.","year":"2002","unstructured":"S. Adams , T. Ball , Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis. SAS 2002 . pp. 230 -- 246 .]] S. Adams, T. Ball, et al. Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis. SAS 2002. pp. 230--246.]]"},{"key":"e_1_3_2_1_3_1","first-page":"279","volume-title":"Mary Jean Harrold. Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses. SAS","author":"Liang Donglin","year":"2001","unstructured":"Donglin Liang , Mary Jean Harrold. Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses. SAS 2001 . Springer LNCS 2126. pp. 279 -- 229 .]] Donglin Liang, Mary Jean Harrold. Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses. SAS 2001. Springer LNCS 2126. pp. 279--29.]]"},{"key":"e_1_3_2_1_4_1","volume-title":"Static Checking of Interrupt-driven Software. International Conference on Software Engineering.","author":"Brylow D.","year":"2001","unstructured":"D. Brylow , N. Damgaard , J. Palsberg , Static Checking of Interrupt-driven Software. International Conference on Software Engineering. 2001 .]] D. Brylow, N. Damgaard, J. Palsberg, Static Checking of Interrupt-driven Software. International Conference on Software Engineering. 2001.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/522344.825715"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/645989.674312"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647067.757010"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268948"},{"key":"e_1_3_2_1_9_1","unstructured":"Texas Instruments Code Composer Studio Getting Started Guide Literature No: SPRU509C.]]  Texas Instruments Code Composer Studio Getting Started Guide Literature No: SPRU509C.]]"},{"key":"e_1_3_2_1_10_1","unstructured":"Texas Instruments TMS320C6000 Code Composer Studio Tutorial Literature No: SPRU301C.]]  Texas Instruments TMS320C6000 Code Composer Studio Tutorial Literature No: SPRU301C.]]"},{"key":"e_1_3_2_1_11_1","unstructured":"TI TMS320 DSP Algorithm Standard Rules and Guidelines Literature No: SPRU352D.]]  TI TMS320 DSP Algorithm Standard Rules and Guidelines Literature No: SPRU352D.]]"},{"key":"e_1_3_2_1_12_1","unstructured":"TI TMS320C6000 CPU and Instruction Set Reference Guide Literature No: SPRU189F.]]  TI TMS320C6000 CPU and Instruction Set Reference Guide Literature No: SPRU189F.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Ravi Sethi and Jeffrey D.Ullman Compilers: Principles, Techniques, and Tools","author":"Aho Alfred","year":"1988","unstructured":"Alfred V. Aho , Ravi Sethi and Jeffrey D.Ullman Compilers: Principles, Techniques, and Tools . Addison-Wesley , 1988 .]] Alfred V.Aho, Ravi Sethi and Jeffrey D.Ullman Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1988.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_15_1","volume-title":"Ellis Horwood","author":"Abramsky S.","year":"1987","unstructured":"S. Abramsky and C. Hankin Abstract Interpretation of Declarative Languages , Ellis Horwood , 1987 .]] S. Abramsky and C. Hankin Abstract Interpretation of Declarative Languages, Ellis Horwood, 1987.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. USENIX Windows NT Workshop","author":"Cohn R.","year":"1997","unstructured":"R. Cohn , D. Goodwin , P. G. Lowney , and N. Rubin , Spike: An Optimizer for Alpha\/NT Executables , Proc. USENIX Windows NT Workshop , Aug. 1997 .]] R. Cohn, D. Goodwin, P. G. Lowney, and N. Rubin, Spike: An Optimizer for Alpha\/NT Executables, Proc. USENIX Windows NT Workshop, Aug. 1997.]]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/258915.258927"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/207110.207112"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178248"},{"volume-title":"Holzmann. Static Source Code Checking for User-defined Properties. Conference on Integrated Design and Process Technology, IDPT-2002","author":"Gerard","key":"e_1_3_2_1_20_1","unstructured":"Gerard J. Holzmann. Static Source Code Checking for User-defined Properties. Conference on Integrated Design and Process Technology, IDPT-2002 .]] Gerard J. Holzmann. Static Source Code Checking for User-defined Properties. Conference on Integrated Design and Process Technology, IDPT-2002.]]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/567446.567455"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93585"},{"volume-title":"17th Annual ACM Conference on Object-Oriented Programming, Systems, Languages and Application Seattle, Washington Friday","author":"Gates Bill","key":"e_1_3_2_1_23_1","unstructured":"Bill Gates . The Future of Programming in a World of Web Services (keynote address) . 17th Annual ACM Conference on Object-Oriented Programming, Systems, Languages and Application Seattle, Washington Friday , November 8, 2002]] Bill Gates. The Future of Programming in a World of Web Services (keynote address). 17th Annual ACM Conference on Object-Oriented Programming, Systems, Languages and Application Seattle, Washington Friday, November 8, 2002]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/75277.75282"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/73141.74821"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/207110.207112"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/567446.567455"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/207110.207111"},{"key":"e_1_3_2_1_29_1","volume-title":"12th USENIX Security Symposium","author":"Christodorescu Mihai","year":"2003","unstructured":"Mihai Christodorescu and Somesh Jha . Static Analysis of Executables to Detect Malicious Patterns . 12th USENIX Security Symposium , August 2003 .]] Mihai Christodorescu and Somesh Jha. Static Analysis of Executables to Detect Malicious Patterns. 12th USENIX Security Symposium, August 2003.]]"},{"volume-title":"Static Detection of Malicious Code in Executable Programs. Symposium on Requirements Engineering for Information Security (SREIS'01)","author":"Bergeron J.","key":"e_1_3_2_1_30_1","unstructured":"J. Bergeron , M. Debbabi , J. Desharnais , M. M. Erhioui , Y. Lavoie and N. Tawbi . Static Detection of Malicious Code in Executable Programs. Symposium on Requirements Engineering for Information Security (SREIS'01) .]] J. Bergeron, M. Debbabi, J. Desharnais, M. M. Erhioui, Y. Lavoie and N. Tawbi. Static Detection of Malicious Code in Executable Programs. Symposium on Requirements Engineering for Information Security (SREIS'01).]]"},{"volume-title":"Proceedings of the IEEE 4th International Workshops on Enterprise Security (WETICE'99)","author":"Bergeron J.","key":"e_1_3_2_1_31_1","unstructured":"J. Bergeron , M. Debbabi , M. M. Erhioui and B. Ktari . Static Analysis of Binary Code to Isolate Malicious Behaviors . In Proceedings of the IEEE 4th International Workshops on Enterprise Security (WETICE'99) .]] J. Bergeron, M. Debbabi, M. M. Erhioui and B. Ktari. Static Analysis of Binary Code to Isolate Malicious Behaviors. In Proceedings of the IEEE 4th International Workshops on Enterprise Security (WETICE'99).]]"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830534"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"David A. Wagner. Static analysis and computer security: New techniques for Software Assurance. University of California at Berkley Phd Dissertation. Dec. 2000.]]   David A. Wagner. Static analysis and computer security: New techniques for Software Assurance. University of California at Berkley Phd Dissertation. Dec. 2000.]]","DOI":"10.1007\/3-540-47764-0_25"},{"key":"e_1_3_2_1_35_1","volume-title":"Barcelona","author":"Horst Licheter Improving","year":"1997","unstructured":"Improving software quality by static program analysis Horst Licheter and Gerhard Riedinger Proc . of SPI 97 software process improvement , Barcelona , 1997 ]] Improving software quality by static program analysis Horst Licheter and Gerhard Riedinger Proc. of SPI 97 software process improvement, Barcelona, 1997]]"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378802"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237727"},{"key":"e_1_3_2_1_38_1","volume-title":"Computers and Intractability","author":"Garey M. R.","year":"1979","unstructured":"M. R. Garey and D. S. Johnson . Computers and Intractability . W. H. Freeman and Company . New York. 1979 .]] M. R. Garey and D. S. Johnson. Computers and Intractability. W. H. Freeman and Company. New York. 1979.]]"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"}],"event":{"name":"CASES04: 2004 International Conference on Compilers, Architectures and Synthesis for Embedded Systems","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Washington DC USA","acronym":"CASES04"},"container-title":["Proceedings of the 2004 international conference on Compilers, architecture, and synthesis for embedded systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1023833.1023857","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1023833.1023857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:23:53Z","timestamp":1750267433000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1023833.1023857"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9,22]]},"references-count":38,"alternative-id":["10.1145\/1023833.1023857","10.1145\/1023833"],"URL":"https:\/\/doi.org\/10.1145\/1023833.1023857","relation":{},"subject":[],"published":{"date-parts":[[2004,9,22]]},"assertion":[{"value":"2004-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}