{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T19:20:17Z","timestamp":1759778417752,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DFG","award":["LU 1748\/4-1"],"award-info":[{"award-number":["LU 1748\/4-1"]}]},{"name":"Research Fund KU Leuven"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2989041","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1772-1774","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Rupprecht","sequence":"first","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]},{"given":"Xi","family":"Chen","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"David H.","family":"White","sequence":"additional","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]},{"given":"Jan Tobias","family":"M\u00fchlberg","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Gerald","family":"L\u00fcttgen","sequence":"additional","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879211.1879222"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896499"},{"key":"e_1_3_2_1_5_1","first-page":"255","volume-title":"Digging for Data Structures. In OSDI 2008","author":"Cozzie A.","year":"2008","unstructured":"A. Cozzie , F. Stratton , H. Xue , and S. King . Digging for Data Structures. In OSDI 2008 , pages 255 -- 266 . USENIX Association , 2008 . A. Cozzie, F. Stratton, H. Xue, and S. King. Digging for Data Structures. In OSDI 2008, pages 255--266. USENIX Association, 2008."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9363-y"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669122"},{"key":"e_1_3_2_1_8_1","volume-title":"TIE: Principled Reverse Engineering of Types in Binary Programs. In NDSS 2011","author":"Lee J.","year":"2011","unstructured":"J. Lee , T. Avgerinos , and D. Brumley . TIE: Principled Reverse Engineering of Types in Binary Programs. In NDSS 2011 . The Internet Society , 2011 . J. Lee, T. Avgerinos, and D. Brumley. TIE: Principled Reverse Engineering of Types in Binary Programs. In NDSS 2011. The Internet Society, 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02918-9_7"},{"key":"e_1_3_2_1_10_1","volume-title":"NDSS 2010","author":"Lin Z.","year":"2010","unstructured":"Z. Lin , X. Zhang , and D. Xu . Automatic Reverse Engineering of Data Structures from Binary Execution . In NDSS 2010 . The Internet Society , 2010 . Z. Lin, X. Zhang, and D. Xu. Automatic Reverse Engineering of Data Structures from Binary Execution. In NDSS 2010. The Internet Society, 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.69"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22969-0_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111583.1111585"},{"key":"e_1_3_2_1_14_1","volume-title":"Howard: A Dynamic Excavator for Reverse Engineering Data Structures. In NDSS 2011","author":"Slowinska A.","year":"2011","unstructured":"A. Slowinska , T. Stancescu , and H. Bos . Howard: A Dynamic Excavator for Reverse Engineering Data Structures. In NDSS 2011 . The Internet Society , 2011 . A. Slowinska, T. Stancescu, and H. Bos. Howard: A Dynamic Excavator for Reverse Engineering Data Structures. In NDSS 2011. The Internet Society, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931071"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989041","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2989041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:54Z","timestamp":1750218594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989041"}},"subtitle":["Identifying Dynamic Data Structures in Malware"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":14,"alternative-id":["10.1145\/2976749.2989041","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2989041","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}