{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:58Z","timestamp":1750306858435,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2568225.2568296","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"1128-1139","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Reuse-oriented reverse engineering of functional components from x86 binaries"],"prefix":"10.1145","author":[{"given":"Dohyeong","family":"Kim","sequence":"first","affiliation":[{"name":"Purdue University, USA"}]},{"given":"William N.","family":"Sumner","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Canada"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Dongyan","family":"Xu","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Hira","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Applied Communications Sciences, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/mnin.blogspot. com\/2008\/04\/kraken-encryption-algorithm.html","author":"Algorithm Kraken Encryption","year":"2008","unstructured":"Kraken Encryption Algorithm . http:\/\/mnin.blogspot. com\/2008\/04\/kraken-encryption-algorithm.html , 2008 . Kraken Encryption Algorithm. http:\/\/mnin.blogspot. com\/2008\/04\/kraken-encryption-algorithm.html, 2008."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/mnin.blogspot.com\/ 2008\/04\/kraken-is-finally-cracked.html","author":"Kraken","year":"2008","unstructured":"Kraken is finally cracked. http:\/\/mnin.blogspot.com\/ 2008\/04\/kraken-is-finally-cracked.html , 2008 . Kraken is finally cracked. http:\/\/mnin.blogspot.com\/ 2008\/04\/kraken-is-finally-cracked.html, 2008."},{"key":"e_1_3_2_1_3_1","volume-title":"Binary executable transforms","author":"Research","year":"2011","unstructured":"Research announcement : Binary executable transforms . Defense Advanced Research Projects Agency , 2011 . Research announcement: Binary executable transforms. Defense Advanced Research Projects Agency, 2011."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/www.youtube.com\/watch?v=7GU4b68oWD4","author":"Demo","year":"2013","unstructured":"Demo of murofet domain flux extraction. https:\/\/www.youtube.com\/watch?v=7GU4b68oWD4 , 2013 . Demo of murofet domain flux extraction. https:\/\/www.youtube.com\/watch?v=7GU4b68oWD4, 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.48"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS)","author":"Caballero J.","year":"2010","unstructured":"J. Caballero , N. Johnson , S. McCamant , and D. Song . Binary code extraction and interface identification for security applications . In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS) , 2010 . J. Caballero, N. Johnson, S. McCamant, and D. Song. Binary code extraction and interface identification for security applications. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS), 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/580914.858213"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972736"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1993.263892"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_12"},{"key":"e_1_3_2_1_12_1","volume-title":"ReCon","author":"Desclaux F.","year":"2006","unstructured":"F. Desclaux and K. Kortchinsky . Vanilla Skype part 1 . ReCon , 2006 . F. Desclaux and K. Kortchinsky. Vanilla Skype part 1. ReCon, 2006."},{"key":"e_1_3_2_1_13_1","author":"Dit B.","year":"2013","unstructured":"B. Dit , M. Revelle , M. Gethers , and D. Poshyvanyk . Feature location in source code: a taxonomy and survey. Journal of Software: Evolution and Process , 2013 . B. Dit, M. Revelle, M. Gethers, and D. Poshyvanyk. Feature location in source code: a taxonomy and survey. Journal of Software: Evolution and Process, 2013.","journal-title":"Journal of Software: Evolution and Process"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.12.018"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1183929"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.42"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31057-7_31"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/976270.976283"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.85"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.71"},{"key":"e_1_3_2_1_21_1","volume-title":"SIGSOFT Symposium on the Foundations of Software Engineering (FSE)","author":"Jackson D.","year":"1994","unstructured":"D. Jackson and E. J. Rollins . Chopping: A generalization of slicing. Technical report , SIGSOFT Symposium on the Foundations of Software Engineering (FSE) , 1994 . D. Jackson and E. J. Rollins. Chopping: A generalization of slicing. Technical report, SIGSOFT Symposium on the Foundations of Software Engineering (FSE), 1994."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.10"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/851042.857023"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(98)00091-3"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588543"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS)","author":"Lanzi A.","year":"2009","unstructured":"A. Lanzi , M. I. Sharif , and W. Lee . K-tracer: A system for extracting kernel malware behavior . In Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS) , 2009 . A. Lanzi, M. I. Sharif, and W. Lee. K-tracer: A system for extracting kernel malware behavior. In Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), 2009."},{"key":"e_1_3_2_1_28_1","volume-title":"Doklady Akademii Nauk SSSR","author":"Levenshtein V. I.","year":"1966","unstructured":"V. I. Levenshtein . Binary codes capable of correcting deletions, insertions, and reversals . Doklady Akademii Nauk SSSR , 1966 . English translation in Soviet Physics Doklady, 10(8). V. I. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Doklady Akademii Nauk SSSR, 1966. English translation in Soviet Physics Doklady, 10(8)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544305"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/375212.375233"},{"key":"e_1_3_2_1_32_1","volume-title":"Software Engineering Concepts and Techniques","author":"Mcilroy D.","year":"1969","unstructured":"D. Mcilroy . Mass-produced Software Components . Software Engineering Concepts and Techniques , 1969 . D. Mcilroy. Mass-produced Software Components. Software Engineering Concepts and Techniques, 1969."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.09.013"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855676.1855683"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"e_1_3_2_1_36_1","volume-title":"Preserving legacy files with ECMA O\ufb03ce Open XML (MSOOXML)","author":"Puttick C.","year":"2007","unstructured":"C. Puttick . Preserving legacy files with ECMA O\ufb03ce Open XML (MSOOXML) . ODF Europe Action Group , 2007 . C. Puttick. Preserving legacy files with ECMA O\ufb03ce Open XML (MSOOXML). ODF Europe Action Group, 2007."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486888"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831740"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1992.242542"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.4360070105"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00029-7"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/786771.787112"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375611"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134002"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996855"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776855"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.27"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2568225.2568296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:31Z","timestamp":1750234231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":48,"alternative-id":["10.1145\/2568225.2568296","10.1145\/2568225"],"URL":"https:\/\/doi.org\/10.1145\/2568225.2568296","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}