{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:50Z","timestamp":1772164010302,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:00:00Z","timestamp":1490400000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-09-1-0539"],"award-info":[{"award-number":["FA9550-09-1-0539"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-0831298, CNS- 1319137"],"award-info":[{"award-number":["CNS-0831298, CNS- 1319137"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,25]]},"DOI":"10.1145\/2872362.2872380","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T09:24:30Z","timestamp":1459157070000},"page":"311-324","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Lifting Assembly to Intermediate Representation"],"prefix":"10.1145","author":[{"given":"Niranjan","family":"Hasabnis","sequence":"first","affiliation":[{"name":"Intel, Santa Clara, CA, USA"}]},{"given":"R.","family":"Sekar","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bad rounding in cvtsi2ss instruction. https:\/\/bugs.kde.org\/show_bug.cgi?id=319393."},{"key":"e_1_3_2_1_2_1","unstructured":"Dagger. http:\/\/dagger.repzret.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Incorrect decoding of vpbroadcastb w reg reg forms. https:\/\/bugs.kde.org\/show_bug.cgi?id=340725."},{"key":"e_1_3_2_1_4_1","unstructured":"insn_basic test might crash because of setting and not clearing DF flag. https:\/\/bugs.kde.org\/show_bug.cgi?id=326983."},{"key":"e_1_3_2_1_5_1","unstructured":"Power lxvw4x instruction uses 4 32 byte loads. https:\/\/bugs.kde.org\/show_bug.cgi?id=339433."},{"key":"e_1_3_2_1_6_1","author":"Abadi Mart\u0131n","unstructured":"Mart\u0131n Abadi, Mihai Budiu, \u00dalfar Erlingsson, and Jay Ligatti. Control-flow Integrity Principles, Implementations, and Applications. ACM Trans. Inf. Syst. Secur.","journal-title":"Trans. Inf. Syst. Secur."},{"key":"e_1_3_2_1_7_1","volume-title":"Univ of Maryland","author":"Anand Kapil","year":"2010","unstructured":"Kapil Anand, Matthew Smithson, Aparna Kotha, Khaled Elwazeer, and Rajeev Barua. Decompilation to Compiler High IR in a Binary Rewriter. Technical report, Univ of Maryland, 2010."},{"key":"e_1_3_2_1_8_1","unstructured":"ARM. ARM Architecture Reference Manual ARMv7A and ARMV7-R edition. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.ddi0406c\/index.html 2014."},{"key":"e_1_3_2_1_9_1","volume-title":"Atmel AVR 8-bit Instruction Set. www.atmel.com\/images\/Atmel-0856-AVR-Instruction-Set-Manual.pdf","year":"2014","unstructured":"Atmel. Atmel AVR 8-bit Instruction Set. www.atmel.com\/images\/Atmel-0856-AVR-Instruction-Set-Manual.pdf, 2014."},{"key":"e_1_3_2_1_10_1","volume-title":"David Brumley. AEG: Automatic Exploit Generation. In Network and Distributed System Security Symposium","author":"Avgerinos Thanassis","year":"2011","unstructured":"Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley. AEG: Automatic Exploit Generation. In Network and Distributed System Security Symposium, 2011."},{"key":"e_1_3_2_1_11_1","volume-title":"Compiler Construction","author":"Balakrishnan Gogul","year":"2005","unstructured":"Gogul Balakrishnan, Radu Gruian, Thomas Reps, and Tim Teitelbaum. CodeSurfer\/x86 -- A Platform for Analyzing X86 Executables. In Compiler Construction, 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"Fast and Portable Dynamic Translator. In Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC '05","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard. QEMU, a Fast and Portable Dynamic Translator. In Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC '05, 2005."},{"key":"e_1_3_2_1_13_1","unstructured":"Derek L. Bruening. Efficient Transparent and Comprehensive Runtime Code Manipulation. PhD thesis Cambridge MA USA 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032342"},{"key":"e_1_3_2_1_15_1","unstructured":"Vitaly Chipounov and George Candea. Dynamically Translating x86 to LLVM using QEMU. Technical Report EPFL-TR-149975 2010."},{"key":"e_1_3_2_1_16_1","volume-title":"David Ung. Walkabout - A Retargetable Dynamic Binary Translation Framework. In Workshop on Binary Translation","author":"Cifuentes Cristina","year":"2002","unstructured":"Cristina Cifuentes, Brian Lewis, and David Ung. Walkabout - A Retargetable Dynamic Binary Translation Framework. In Workshop on Binary Translation, 2002."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806967"},{"key":"e_1_3_2_1_18_1","unstructured":"Christian S. Collberg. Reverse Interpretation"},{"key":"e_1_3_2_1_19_1","volume-title":"Automatic Retargeting. In Proceedings of the ACM SIGPLAN 1997 Conference on Programming Language Design and Implementation, PLDI '97","author":"Mutation Analysis","year":"1997","unstructured":"Mutation Analysis = Automatic Retargeting. In Proceedings of the ACM SIGPLAN 1997 Conference on Programming Language Design and Implementation, PLDI '97, 1997."},{"issue":"4","key":"e_1_3_2_1_20_1","volume":"26","author":"Costa Manuel","year":"2008","unstructured":"Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham. Vigilante: End-to-end Containment of Internet Worm Epidemics. ACM Trans. Comput. Syst., 26(4), December 2008.","journal-title":"Paul Barham. Vigilante: End-to-end Containment of Internet Worm Epidemics. ACM Trans. Comput. Syst."},{"key":"e_1_3_2_1_21_1","author":"Davidson Jack W.","year":"1984","unstructured":"Jack W. Davidson and Christopher W. Fraser. Code Selection Through Object Code Optimization. ACM Trans. Program. Lang. Syst., 1984.","journal-title":"Trans. Program. Lang. Syst."},{"key":"e_1_3_2_1_22_1","volume-title":"REIL: A platform-independent intermediate representation of disassembled code for static code analysis","author":"Dullien Thomas","year":"2009","unstructured":"Thomas Dullien and Sebastian Porst. REIL: A platform-independent intermediate representation of disassembled code for static code analysis. 2009."},{"key":"e_1_3_2_1_23_1","volume-title":"Dawn Song. Dynamic Spyware Analysis. In 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, ATC'07","author":"Egele Manuel","year":"2007","unstructured":"Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, and Dawn Song. Dynamic Spyware Analysis. In 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, ATC'07, 2007."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06","author":"Erlingsson \u00dalfar","year":"2006","unstructured":"\u00dalfar Erlingsson, Mart\u0131n Abadi, Michael Vrable, Mihai Budiu, and George C. Necula. XFI: Software Guards for System Address Spaces. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06, 2006."},{"key":"e_1_3_2_1_25_1","unstructured":"LLVM Foundation. The LLVM Compiler Infrastructure Project. http:\/\/llvm.org."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1162\/coli.2008.07-051-R2-03-57"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2738600.2738622"},{"key":"e_1_3_2_1_28_1","unstructured":"Niranjan Hasabnis and R Sekar. LISC - Learning Instruction Semantics from Code Generator - software release. http:\/\/seclab.cs.sunysb.edu\/seclab\/lisc\/."},{"key":"e_1_3_2_1_29_1","volume-title":"Godmar Back. Reverse-Engineering Instruction Encodings. In Proceedings of the General Track: 2001 USENIX Annual Technical Conference","author":"Hsieh Wilson C.","year":"2001","unstructured":"Wilson C. Hsieh, Dawson R. Engler, and Godmar Back. Reverse-Engineering Instruction Encodings. In Proceedings of the General Track: 2001 USENIX Annual Technical Conference, 2001."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2011.57"},{"key":"e_1_3_2_1_31_1","volume":"7","author":"Hwang Yuan-Shin","year":"2010","unstructured":"Yuan-Shin Hwang, Tzong-Yen Lin, and Rong-Guey Chang. DisIRer: Converting a Retargetable Compiler into a Multiplatform Binary Translator. ACM Trans. Archit. Code Optim., 7, December 2010.","journal-title":"Multiplatform Binary Translator. ACM Trans. Archit. Code Optim."},{"key":"e_1_3_2_1_32_1","volume-title":"Kinder and Helmut Veith. Jakstab: A Static Analysis Platform for Binaries. In Proceedings of the 20th International Conference on Computer Aided Verification, CAV '08","author":"Johannes","year":"2008","unstructured":"Johannes Kinder and Helmut Veith. Jakstab: A Static Analysis Platform for Binaries. In Proceedings of the 20th International Conference on Computer Aided Verification, CAV '08, 2008."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720293"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03542-0_15"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_10"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the SIGPLAN 1995 Conference on Programming Language Design and Implementation","author":"James","year":"1995","unstructured":"James R. Larus and Eric Schnarr. EEL: Machine-independent Executable Editing. In Proceedings of the SIGPLAN 1995 Conference on Programming Language Design and Implementation, June 1995."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_39_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Newsome James","year":"2005","unstructured":"James Newsome and Dawn Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Network and Distributed System Security Symposium (NDSS), 2005."},{"key":"e_1_3_2_1_40_1","author":"Oncina J.","year":"1993","unstructured":"J. Oncina, P. Garc\u00eda, and E. Vidal. Learning Subsequential Transducers for Pattern Recognition Interpretation Tasks. IEEE Trans. Pattern Anal. Mach. Intell., 1993.","journal-title":"Learning Subsequential Transducers for Pattern Recognition Interpretation Tasks. IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"e_1_3_2_1_41_1","unstructured":"GNU Project. The GNU Compiler Collection. http:\/\/gcc.gnu.org."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818021"},{"key":"e_1_3_2_1_43_1","first-page":"39","author":"Qin Feng","year":"2006","unstructured":"Feng Qin, Cheng Wang, Zhenmin Li, Ho-seop Kim, Yuanyuan Zhou, and Youfeng Wu. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In Proceedings of the 39th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 39, 2006.","journal-title":"MICRO"},{"key":"e_1_3_2_1_44_1","volume-title":"Mappings and grammars on trees. Mathematical systems theory, 4(3)","author":"Rounds William C.","year":"1970","unstructured":"William C. Rounds. Mappings and grammars on trees. Mathematical systems theory, 4(3), 1970."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1356058.1356069"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044450813-3\/50028-X"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/646246.684854"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793246252"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2012.11.006"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_51_1","author":"Tongaonkar A.","year":"2016","unstructured":"A. Tongaonkar and R. Sekar. Condition Factorization: A Technique for Building Fast and Compact Packet Matching Automata. IEEE Transactions on Information Forensics and Security, 2016.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_52_1","volume-title":"Sreenaath Vasudevan. Fast Packet Classification Using Condition Factorization. In Proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS '09","author":"Tongaonkar Alok","year":"2009","unstructured":"Alok Tongaonkar, R. Sekar, and Sreenaath Vasudevan. Fast Packet Classification Using Condition Factorization. In Proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS '09, 2009."},{"key":"e_1_3_2_1_53_1","volume-title":"Proceeding of the Network and Distributed System Security Symposium (NDSS)","author":"Vogt P.","year":"2007","unstructured":"P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proceeding of the Network and Distributed System Security Symposium (NDSS), 2007."},{"key":"e_1_3_2_1_54_1","volume-title":"Yamada and Kevin Knight. A Syntax-based Statistical Translation Model. In Proceedings of the 39th Annual Meeting on Association for Computational Linguistics, ACL'01","author":"Kenji","year":"2001","unstructured":"Kenji Yamada and Kevin Knight. A Syntax-based Statistical Translation Model. In Proceedings of the 39th Annual Meeting on Association for Computational Linguistics, ACL'01, 2001."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_56_1","volume-title":"Engin Kirda. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07","author":"Yin Heng","year":"2007","unstructured":"Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, 2007."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"e_1_3_2_1_58_1","volume-title":"Zhang and R. Sekar. Control Flow Integrity for COTS Binaries. In Proceedings of the 22nd USENIX Conference on Security, SEC'13","author":"Mingwei","year":"2013","unstructured":"Mingwei Zhang and R. Sekar. Control Flow Integrity for COTS Binaries. In Proceedings of the 22nd USENIX Conference on Security, SEC'13, 2013."}],"event":{"name":"ASPLOS '16: Architectural Support for Programming Languages and Operating Systems","location":"Atlanta Georgia USA","acronym":"ASPLOS '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872362.2872380","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2872362.2872380","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2872362.2872380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:42:10Z","timestamp":1763458930000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872362.2872380"}},"subtitle":["A Novel Approach Leveraging Compilers"],"short-title":[],"issued":{"date-parts":[[2016,3,25]]},"references-count":58,"alternative-id":["10.1145\/2872362.2872380","10.1145\/2872362"],"URL":"https:\/\/doi.org\/10.1145\/2872362.2872380","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2980024.2872380","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2954679.2872380","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,3,25]]},"assertion":[{"value":"2016-03-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}