{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:53:03Z","timestamp":1771951983147,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-SC0010474"],"award-info":[{"award-number":["DE-SC0010474"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["OCI-1032341,OCI-1127210, OCI-1234408"],"award-info":[{"award-number":["OCI-1032341,OCI-1127210, OCI-1234408"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["FA8750-12-2-0289"],"award-info":[{"award-number":["FA8750-12-2-0289"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,18]]},"DOI":"10.1145\/2931037.2931047","type":"proceedings-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T08:33:29Z","timestamp":1467880409000},"page":"24-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":98,"title":["Binary code is not easy"],"prefix":"10.1145","author":[{"given":"Xiaozhu","family":"Meng","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]},{"given":"Barton P.","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v22:6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370254"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31985-6_19"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671279"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1946284.1946290"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024569.2024572"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.11"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001432"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032342"},{"key":"e_1_3_2_1_12_1","volume-title":"17th Network and Distributed System Security Symposium (NDSS)","author":"Caballero J.","year":"2010","unstructured":"J. Caballero, N. M. Johnson, S. McCamant, and D. Song. Binary code extraction and interface identification for security applications. In 17th Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, Feb. 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/520033.858247"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/277650.277719"},{"key":"e_1_3_2_1_15_1","unstructured":"ACM Press."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/762761.762771"},{"key":"e_1_3_2_1_17_1","volume-title":"2000 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA)","author":"Sutter B. De","year":"2000","unstructured":"B. De Sutter, B. De Bus, K. De Bosschere, P. Keyngnaert, and B. Demoen. On the static analysis of indirect control transfers in binaries. In 2000 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, Nevada, USA, Jun. 2000."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of the Ottawa Linux Symposium","author":"Eigler F. C.","year":"2006","unstructured":"F. C. Eigler and Red Hat, Inc. Problem solving with SystemTap. In Proc. of the Ottawa Linux Symposium, Ottawa, Ontario, July 2006. Citeseer."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462165"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379692"},{"key":"e_1_3_2_1_21_1","unstructured":"GNU Project. GNU Binutils http:\/\/www.gnu.org\/software\/binutils."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127577.1127590"},{"key":"e_1_3_2_1_23_1","unstructured":"Hex-Rays. IDA https:\/\/www.hex-rays.com\/products\/ida\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04897-0_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024569.2024571"},{"key":"e_1_3_2_1_26_1","unstructured":"Jakstab. http:\/\/www.jakstab.org\/home."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/513829.513839"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487147"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27940-9_18"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_40"},{"key":"e_1_3_2_1_31_1","volume-title":"Extrae","author":"Llort G.","year":"2015","unstructured":"G. Llort and H. Servat. Extrae. Barcelona Supercomputer Center, 2015."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594337"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.471178"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033345.2033353"},{"key":"e_1_3_2_1_36_1","unstructured":"OllyDbg. http:\/\/www.ollydbg.de."},{"key":"e_1_3_2_1_37_1","first-page":"172","volume-title":"Retrofitting Security in COTS Software with Binary Rewriting. In 26th IFIP TC-11 International Information Security Conference (IFIP SEC)","author":"O\u2019Sullivan P.","year":"2011","unstructured":"P. O\u2019Sullivan, K. Anand, A. Kotha, M. Smithson, R. Barua, and A. D. Keromytis. Retrofitting Security in COTS Software with Binary Rewriting. In 26th IFIP TC-11 International Information Security Conference (IFIP SEC), pages 154\u2013172, Hamburg, Germany, June 2011."},{"key":"e_1_3_2_1_38_1","unstructured":"Paradyn Project. Dyninst: Putting the Performance in High Performance Computing http:\/\/www.dyninst.org."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671278"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2015.7225297"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038662"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001433"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041225.2041239"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1620163.1620196"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2522253"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/713705"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/882506.885138"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671280"},{"key":"e_1_3_2_1_49_1","first-page":"1019","volume-title":"International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA)","author":"Sutter B. D.","year":"2000","unstructured":"B. D. Sutter, B. D. Bus, K. D. Bosschere, P. Keyngnaert, and B. Demoen. On the static analysis of indirect control transfers in binaries. In International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), pages 1013\u20131019, Las Vegas, Nevada, USA, June 2000."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/580571.828823"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_52_1","unstructured":"L. Xu F. Sun and Z. Su. Constructing precise control flow graphs from binaries. Technical report Technical Report CSE-2009-27 Department of Computer Science UC Davis. 2009."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534796"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.17"}],"event":{"name":"ISSTA '16: International Symposium on Software Testing and Analysis","location":"Saarbr\u00fccken Germany","acronym":"ISSTA '16","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 25th International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2931037.2931047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2931037.2931047","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2931037.2931047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:30:15Z","timestamp":1763458215000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2931037.2931047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,18]]},"references-count":54,"alternative-id":["10.1145\/2931037.2931047","10.1145\/2931037"],"URL":"https:\/\/doi.org\/10.1145\/2931037.2931047","relation":{},"subject":[],"published":{"date-parts":[[2016,7,18]]},"assertion":[{"value":"2016-07-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}