{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:07Z","timestamp":1763507707142,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628001006"],"award-info":[{"award-number":["628001006"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["StG Rosetta"],"award-info":[{"award-number":["StG Rosetta"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Union Seventh Framework","award":["FP7-SEC-285477-CRISALIS"],"award-info":[{"award-number":["FP7-SEC-285477-CRISALIS"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818035","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T17:06:08Z","timestamp":1449853568000},"page":"251-260","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["PIE"],"prefix":"10.1145","author":[{"given":"Lucian","family":"Cojocar","sequence":"first","affiliation":[{"name":"VU University Amsterdam"}]},{"given":"Jonas","family":"Zaddach","sequence":"additional","affiliation":[{"name":"EURECOM"}]},{"given":"Roel","family":"Verdult","sequence":"additional","affiliation":[{"name":"Radboud University"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"VU University Amsterdam"}]},{"given":"Aur\u00e9lien","family":"Francillon","sequence":"additional","affiliation":[{"name":"EURECOM"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"EURECOM"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ata-6 protocol spec. http:\/\/t13.org\/Documents\/UploadedDocuments\/project\/d1410r3b-ATA-ATAPI-6.pdf.  Ata-6 protocol spec. http:\/\/t13.org\/Documents\/UploadedDocuments\/project\/d1410r3b-ATA-ATAPI-6.pdf."},{"volume-title":"February","year":"2015","key":"e_1_3_2_1_2_1","unstructured":"american fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/ , February 2015 . american fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/, February 2015."},{"key":"e_1_3_2_1_3_1","volume-title":"February","author":"The Clang","year":"2015","unstructured":"The Clang compiler. http:\/\/clang.llvm.org\/ , February 2015 . The Clang compiler. http:\/\/clang.llvm.org\/, February 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"February","author":"Python","year":"2015","unstructured":"LL Python website. http:\/\/www.llvmpy.org\/ , February 2015 . LLPython website. http:\/\/www.llvmpy.org\/, February 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"February","author":"Shodan","year":"2015","unstructured":"Shodan search engine. http:\/\/www.shodanhq.com\/ , February 2015 . Shodan search engine. http:\/\/www.shodanhq.com\/, February 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1177220"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465380"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"volume-title":"Fast and Portable Dynamic Translator. ATC '05","author":"Bellard F. QEMU","key":"e_1_3_2_1_9_1","unstructured":"Bellard , F. QEMU , a Fast and Portable Dynamic Translator. ATC '05 . Bellard, F. QEMU, a Fast and Portable Dynamic Translator. ATC '05."},{"key":"e_1_3_2_1_10_1","volume-title":"Dagger website","author":"Bougacha A.","year":"2013","unstructured":"Bougacha , A. , Aubey , G. , Collet , P. , Coudray , T. , Salwan , J. , and de la Vieuville , A. Dagger website , 2013 . http:\/\/dagger.repzret.org\/. Bougacha, A., Aubey, G., Collet, P., Coudray, T., Salwan, J., and de la Vieuville, A. Dagger website, 2013. http:\/\/dagger.repzret.org\/."},{"key":"e_1_3_2_1_11_1","first-page":"6","volume":"36","author":"Bratus S.","year":"2011","unstructured":"Bratus , S. , Locasto , M. , Patterson , M. L. , Sassaman , L. , and Shubina , A. Exploit Programming : From Buffer Overflows to \"Weird Machines\" and Theory of Computation. ;login : The USENIX Magazine 36 , 6 ( Dec. 2011 ), 13--21. Bratus, S., Locasto, M., Patterson, M. L., Sassaman, L., and Shubina, A. Exploit Programming: From Buffer Overflows to \"Weird Machines\" and Theory of Computation. ;login: The USENIX Magazine 36, 6 (Dec. 2011), 13--21.","journal-title":"The USENIX Magazine"},{"key":"e_1_3_2_1_12_1","first-page":"4","volume":"40","author":"Bratus S.","year":"2015","unstructured":"Bratus , S. , Patterson , M. , and Shubina , A. The Bugs We Have to Kill. ;login : The USENIX Magazine 40 , 4 ( Aug. 2015 ). Bratus, S., Patterson, M., and Shubina, A. The Bugs We Have to Kill. ;login: The USENIX Magazine 40, 4 (Aug. 2015).","journal-title":"The USENIX Magazine"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032342"},{"key":"e_1_3_2_1_14_1","unstructured":"Bunnie X. Exploration and exploitation of an SD memory card 30C3. http:\/\/www.bunniestudios.com\/blog\/?p=3554 2013.  Bunnie X. Exploration and exploitation of an SD memory card 30C3. http:\/\/www.bunniestudios.com\/blog\/?p=3554 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"e_1_3_2_1_16_1","volume-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. OSDI","author":"Cadar C.","year":"2008","unstructured":"Cadar , C. , Dunbar , D. , and Engler , D . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. OSDI 2008 . Cadar, C., Dunbar, D., and Engler, D. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. OSDI 2008."},{"key":"e_1_3_2_1_17_1","volume-title":"November","author":"Carback R. T.","year":"2013","unstructured":"Carback , R. T. Fracture: Inverting the Target Independent Code Generator. Poster at the LLVM developer's conference , November 2013 . https:\/\/github.com\/draperlaboratory\/fracture. Carback, R. T. Fracture: Inverting the Target Independent Code Generator. Poster at the LLVM developer's conference, November 2013. https:\/\/github.com\/draperlaboratory\/fracture."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500727.2500747"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755932"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958815"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248487.1950396"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"e_1_3_2_1_24_1","volume-title":"RECON","author":"Dinaburg A.","year":"2014","unstructured":"Dinaburg , A. , and Ruef , A . Static Translation of X86 Instruction Semantics to LLVM with McSema . RECON 2014 . Dinaburg, A., and Ruef, A. Static Translation of X86 Instruction Semantics to LLVM with McSema. RECON 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516697"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_1_28_1","volume-title":"October","author":"Heffner C.","year":"2013","unstructured":"Heffner , C. Reverse Engineering a D-Link Backdoor , October 2013 . http:\/\/www.devttys0.com\/2013\/10\/reverse-engineering-a-d-link-backdoor\/. Heffner, C. Reverse Engineering a D-Link Backdoor, October 2013. http:\/\/www.devttys0.com\/2013\/10\/reverse-engineering-a-d-link-backdoor\/."},{"key":"e_1_3_2_1_29_1","volume-title":"Yacc: Yet another compiler-compiler","author":"Johnson S. C.","year":"1975","unstructured":"Johnson , S. C. Yacc: Yet another compiler-compiler , vol. 32 . Bell Laboratories Murray Hill , NJ , 1975 . Johnson, S. C. Yacc: Yet another compiler-compiler, vol. 32. Bell Laboratories Murray Hill, NJ, 1975."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_33_1","volume-title":"Signedness-Agnostic Program Analysis: Precise Integer Bounds for Low-Level Code. TOPLAS","author":"Navas J.","year":"2012","unstructured":"Navas , J. , Schachte , P. , S\u00f8ndergaard , H. , and Stuckey , P . Signedness-Agnostic Program Analysis: Precise Integer Bounds for Low-Level Code. TOPLAS 2012 . Navas, J., Schachte, P., S\u00f8ndergaard, H., and Stuckey, P. Signedness-Agnostic Program Analysis: Precise Integer Bounds for Low-Level Code. TOPLAS 2012."},{"key":"e_1_3_2_1_34_1","unstructured":"Newsham T. Format string attacks. http:\/\/www.thenewsh.com\/~newsham\/format-string-attacks.pdf 2000.  Newsham T. Format string attacks. http:\/\/www.thenewsh.com\/~newsham\/format-string-attacks.pdf 2000."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2006.6"},{"volume-title":"OSDI '12","author":"Renzelmann M. J.","key":"e_1_3_2_1_36_1","unstructured":"Renzelmann , M. J. , Kadav , A. , and Swift , M. M . SymDrive: testing drivers without devices . OSDI '12 . Renzelmann, M. J., Kadav, A., and Swift, M. M. SymDrive: testing drivers without devices. OSDI '12."},{"key":"e_1_3_2_1_37_1","first-page":"6","volume":"36","author":"Sassaman L.","year":"2011","unstructured":"Sassaman , L. , Patterson , M. L. , Bratus , S. , and Shubina , A. The Halting Problems of Network Stack Insecurity. ;login : The USENIX Magazine 36 , 6 ( Dec. 2011 ), 22--32. Sassaman, L., Patterson, M. L., Bratus, S., and Shubina, A. The Halting Problems of Network Stack Insecurity. ;login: The USENIX Magazine 36, 6 (Dec. 2011), 22--32.","journal-title":"The USENIX Magazine"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081750"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456372"},{"key":"e_1_3_2_1_40_1","volume-title":"Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. NDSS","author":"Shoshitaishvili Y.","year":"2015","unstructured":"Shoshitaishvili , Y. , Wang , R. , Hauser , C. , Kruegel , C. , and Vigna , G . Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. NDSS 2015 . Shoshitaishvili, Y., Wang, R., Hauser, C., Kruegel, C., and Vigna, G. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. NDSS 2015."},{"key":"e_1_3_2_1_41_1","unstructured":"Slaby J. LLVMSlicer Feb. 2015. https:\/\/github.com\/jirislaby\/LLVMSlicer\/.  Slaby J. LLVMSlicer Feb. 2015. https:\/\/github.com\/jirislaby\/LLVMSlicer\/."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"volume-title":"M. Program Slicing. ICSE '81","author":"Weiser","key":"e_1_3_2_1_43_1","unstructured":"Weiser , M. Program Slicing. ICSE '81 . Weiser, M. Program Slicing. ICSE '81."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37051-9_8"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"}],"event":{"name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Los Angeles CA USA","acronym":"ACSAC 2015"},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:26Z","timestamp":1750225406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818035"}},"subtitle":["Parser Identification in Embedded Systems"],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":45,"alternative-id":["10.1145\/2818000.2818035","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818035","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}