{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:58Z","timestamp":1772164078210,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,2]],"date-time":"2017-06-02T00:00:00Z","timestamp":1496361600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-12-C-0023_BBN"],"award-info":[{"award-number":["FA8750-12-C-0023_BBN"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,2]]},"DOI":"10.1145\/2908080.2908119","type":"proceedings-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T15:23:42Z","timestamp":1464881022000},"page":"27-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Polymorphic type inference for machine code"],"prefix":"10.1145","author":[{"given":"Matt","family":"Noonan","sequence":"first","affiliation":[{"name":"GrammaTech, USA"}]},{"given":"Alexey","family":"Loginov","sequence":"additional","affiliation":[{"name":"GrammaTech, USA"}]},{"given":"David","family":"Cok","sequence":"additional","affiliation":[{"name":"GrammaTech, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"TR 19768:2007: Technical report on C++ library extensions","year":"2007","unstructured":"ISO\/IEC TR 19768:2007: Technical report on C++ library extensions, 2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58485-4_34"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/155183.155231"},{"key":"e_1_3_2_1_4_1","unstructured":"L. O. Andersen. Program analysis and specialization for the C programming language. PhD thesis University of Cophenhagen 1994."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31985-6_19"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24723-4_2"},{"key":"e_1_3_2_1_7_1","first-page":"24","volume-title":"International Conference on Automata and Formal Languages","author":"Carayol A.","year":"2014","unstructured":"A. Carayol and M. Hague. Saturation algorithms for modelchecking pushdown systems. In International Conference on Automata and Formal Languages, pages 1\u201324, 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(92)90278-N"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/217838.217858"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462165"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186632.1186635"},{"key":"e_1_3_2_1_12_1","volume-title":"Workshop on Set Constraints","author":"F\u00e4hndrich M.","year":"1996","unstructured":"M. F\u00e4hndrich and A. Aiken. Making set-constraint program analyses scale. In Workshop on Set Constraints, 1996."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818775"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297051"},{"key":"e_1_3_2_1_15_1","volume-title":"http:\/\/www.hex-rays.com\/ products\/ida\/","author":"IdaPro Hex-Rays","year":"2015","unstructured":"Hex-Rays. Hex-Rays IdaPro. http:\/\/www.hex-rays.com\/ products\/ida\/, 2015."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129500000657"},{"key":"e_1_3_2_1_17_1","first-page":"268","volume-title":"Network and Distributed System Security Symposium","author":"Lee J.","year":"2011","unstructured":"J. Lee, T. Avgerinos, and D. Brumley. TIE: Principled reverse engineering of types in binary programs. In Network and Distributed System Security Symposium, pages 251\u2013268, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2450136.2450139"},{"key":"e_1_3_2_1_19_1","volume-title":"Network and Distributed System Security Symposium","author":"Lin Z.","year":"2010","unstructured":"Z. Lin, X. Zhang, and D. Xu. Automatic reverse engineering of data structures from binary execution. In Network and Distributed System Security Symposium, 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1291151.1291194"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31987-0_2"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"M. Noonan A. Loginov and D. Cok. Polymorphic type inference for machine code (extended version). URL http: \/\/arxiv.org\/abs\/1603.05495. 10.1145\/2908080.2908119","DOI":"10.1145\/2908080.2908119"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/210184.210187"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01212524"},{"key":"e_1_3_2_1_25_1","volume-title":"Advanced Topics in Types and Programming Languages","author":"Pottier F.","year":"2005","unstructured":"F. Pottier and D. R\u00e9my. The essence of ML type inference. In B. C. Pierce, editor, Advanced Topics in Types and Programming Languages, chapter 10. MIT Press, 2005."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360208"},{"issue":"3","key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/BF01969548","article-title":"Regular canonical systems","volume":"6","author":"B\u00fcchi J. Richard","year":"1964","unstructured":"J. Richard B\u00fcchi. Regular canonical systems. Archive for Mathematical Logic, 6(3):91\u2013111, 1964.","journal-title":"Archive for Mathematical Logic"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505879.2505901"},{"key":"e_1_3_2_1_29_1","unstructured":"M. Robertson. A Brief History of InvSqrt. PhD thesis University of New Brunswick 2012."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534797"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/318774.318942"},{"key":"e_1_3_2_1_32_1","volume-title":"Network and Distributed System Security Symposium","author":"Slowinska A.","year":"2011","unstructured":"A. Slowinska, T. Stancescu, and H. Bos. Howard: A dynamic excavator for reverse engineering data structures. In Network and Distributed System Security Symposium, 2011."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237727"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503292"}],"event":{"name":"PLDI '16: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Santa Barbara CA USA","acronym":"PLDI '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908080.2908119","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2908080.2908119","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2908080.2908119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:19:25Z","timestamp":1763457565000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908080.2908119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,2]]},"references-count":34,"alternative-id":["10.1145\/2908080.2908119","10.1145\/2908080"],"URL":"https:\/\/doi.org\/10.1145\/2908080.2908119","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2980983.2908119","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,6,2]]},"assertion":[{"value":"2016-06-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}