{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:56:47Z","timestamp":1755838607229,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,10]]},"DOI":"10.1145\/3092703.3092707","type":"proceedings-article","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T20:17:18Z","timestamp":1499804238000},"page":"158-169","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["CPR: cross platform binary code reuse via platform independent trace program"],"prefix":"10.1145","author":[{"given":"Yonghwi","family":"Kwon","sequence":"first","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Weihang","family":"Wang","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Yunhui","family":"Zheng","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Dongyan","family":"Xu","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1\n    hour software by skrommel - donationcoder.com. http:\/\/www.donationcoder. com\/Software\/Skrommel\/.  1 hour software by skrommel - donationcoder.com. http:\/\/www.donationcoder. com\/Software\/Skrommel\/."},{"key":"e_1_3_2_1_2_1","unstructured":"10\n    enterprise internet of things deployments with actual results. http:\/\/www.networkworld.com\/article\/2848714\/cisco-subnet\/ 10-enterprise-internet-of-things-deployments-with-actual-results.html.  10 enterprise internet of things deployments with actual results. http:\/\/www.networkworld.com\/article\/2848714\/cisco-subnet\/ 10-enterprise-internet-of-things-deployments-with-actual-results.html."},{"key":"e_1_3_2_1_3_1","unstructured":"11\n    amazing success stories to prove that internet of things (iot) is not just a verbal tic. https:\/\/www.linkedin.com\/pulse\/ 11-amazing-success-stories-prove-internet-things-iot-just-sambhani.  11 amazing success stories to prove that internet of things (iot) is not just a verbal tic. https:\/\/www.linkedin.com\/pulse\/ 11-amazing-success-stories-prove-internet-things-iot-just-sambhani."},{"key":"e_1_3_2_1_4_1","unstructured":"404\n    amazing success stories to prove that internet of things (iot) is not just a verbal tic. \n   http:\/\/www.altools.com\/al\/downloads\/egg_ module\/unegg_v0.5.tar.bz.  404 - file or directory not found. http:\/\/www.altools.com\/al\/downloads\/egg_ module\/unegg_v0.5.tar.bz."},{"key":"e_1_3_2_1_5_1","unstructured":"Alzip - cute &amp; easy file compression program - altools. http:\/\/www.altools.com\/ altools\/alzip.aspx.  Alzip - cute &amp; easy file compression program - altools. http:\/\/www.altools.com\/ altools\/alzip.aspx."},{"key":"e_1_3_2_1_6_1","unstructured":"Arduino. https:\/\/www.arduino.cc\/.  Arduino. https:\/\/www.arduino.cc\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Autohotkey script showcase. https:\/\/autohotkey.com\/docs\/scripts\/.  Autohotkey script showcase. https:\/\/autohotkey.com\/docs\/scripts\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Binary executable transforms (bet). https:\/\/opencatalog.darpa.mil\/BET.html.  Binary executable transforms (bet). https:\/\/opencatalog.darpa.mil\/BET.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Bypassing malware defenses. https:\/\/www.sans.org\/reading-room\/whitepapers\/ testing\/bypassing-malware-defenses-33378.  Bypassing malware defenses. https:\/\/www.sans.org\/reading-room\/whitepapers\/ testing\/bypassing-malware-defenses-33378."},{"key":"e_1_3_2_1_10_1","unstructured":"Cisco ios technologies. http:\/\/www.cisco.com\/c\/en\/us\/products\/ ios-nx-os-software\/ios-technologies\/index.html.  Cisco ios technologies. http:\/\/www.cisco.com\/c\/en\/us\/products\/ ios-nx-os-software\/ios-technologies\/index.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Dagger. http:\/\/dagger.repzret.org\/.  Dagger. http:\/\/dagger.repzret.org\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Dronecode. https:\/\/www.dronecode.org\/.  Dronecode. https:\/\/www.dronecode.org\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Findfirstfile behaves differently on vista. http:\/\/www.yqcomputer.com\/1147_ 3324_1.htm.  Findfirstfile behaves differently on vista. http:\/\/www.yqcomputer.com\/1147_ 3324_1.htm."},{"key":"e_1_3_2_1_14_1","unstructured":"Hex-rays. ida pro disassembler. https:\/\/www.hex-rays.com\/idapro.  Hex-rays. ida pro disassembler. https:\/\/www.hex-rays.com\/idapro."},{"key":"e_1_3_2_1_15_1","unstructured":"Intel(r)-based drone technology pushes boundaries. http:\/\/www.intel.com\/ content\/www\/us\/en\/technology-innovation\/aerial-technology-overview.html.  Intel(r)-based drone technology pushes boundaries. http:\/\/www.intel.com\/ content\/www\/us\/en\/technology-innovation\/aerial-technology-overview.html."},{"key":"e_1_3_2_1_16_1","unstructured":"Intel(r) galileo gen 2. http:\/\/www.intel.com\/content\/www\/us\/en\/embedded\/ products\/galileo\/galileo-overview.html.  Intel(r) galileo gen 2. http:\/\/www.intel.com\/content\/www\/us\/en\/embedded\/ products\/galileo\/galileo-overview.html."},{"key":"e_1_3_2_1_17_1","unstructured":"Intel(r) iot platform. http:\/\/www.intel.com\/content\/www\/us\/en\/ internet-of-things\/infographics\/iot-platform-infographic.html.  Intel(r) iot platform. http:\/\/www.intel.com\/content\/www\/us\/en\/ internet-of-things\/infographics\/iot-platform-infographic.html."},{"key":"e_1_3_2_1_18_1","unstructured":"Internet of things: Why iot is here to stay within the enterprise. http:\/\/blogs. air-watch.com\/2015\/11\/internet-things-iot-enterprise\/#.V79OzlsrJUQ.  Internet of things: Why iot is here to stay within the enterprise. http:\/\/blogs. air-watch.com\/2015\/11\/internet-things-iot-enterprise\/#.V79OzlsrJUQ."},{"key":"e_1_3_2_1_19_1","unstructured":"Lifehacker code: Texter (windows). http:\/\/lifehacker.com\/238306\/ lifehacker-code-texter-windows.  Lifehacker code: Texter (windows). http:\/\/lifehacker.com\/238306\/ lifehacker-code-texter-windows."},{"key":"e_1_3_2_1_20_1","unstructured":"Linux cross reference - inflate.c source code. http:\/\/lxr.free-electrons.com\/source\/ lib\/inflate.c.  Linux cross reference - inflate.c source code. http:\/\/lxr.free-electrons.com\/source\/ lib\/inflate.c."},{"key":"e_1_3_2_1_21_1","unstructured":"mbed iot device platform. https:\/\/www.arm.com\/products\/ internet-of-things-solutions\/mbed-IoT-device-platform.php.  mbed iot device platform. https:\/\/www.arm.com\/products\/ internet-of-things-solutions\/mbed-IoT-device-platform.php."},{"key":"e_1_3_2_1_22_1","unstructured":"Mc-semantics. .https:\/\/github.com\/trailofbits\/mcsema.  Mc-semantics. .https:\/\/github.com\/trailofbits\/mcsema."},{"key":"e_1_3_2_1_23_1","unstructured":"Onr baa announcement # n00014-17-s-b010. https:\/\/www.onr.navy.mil\/-\/media\/ Files\/Funding-Announcements\/BAA\/2017\/N00014-17-S-B010.ashx.  Onr baa announcement # n00014-17-s-b010. https:\/\/www.onr.navy.mil\/-\/media\/ Files\/Funding-Announcements\/BAA\/2017\/N00014-17-S-B010.ashx."},{"key":"e_1_3_2_1_24_1","unstructured":"Raspberry pi. https:\/\/www.raspberrypi.org\/.  Raspberry pi. https:\/\/www.raspberrypi.org\/."},{"key":"e_1_3_2_1_25_1","unstructured":"Scripts and functions - autohotkey community. https:\/\/autohotkey.com\/boards\/ viewforum.php?f=6.  Scripts and functions - autohotkey community. https:\/\/autohotkey.com\/boards\/ viewforum.php?f=6."},{"key":"e_1_3_2_1_26_1","unstructured":"Top 10 windows applications that should be on macs. http:\/\/lifehacker.com\/ 5567174\/top-10-windows-applications-that-should-be-on-macs.  Top 10 windows applications that should be on macs. http:\/\/lifehacker.com\/ 5567174\/top-10-windows-applications-that-should-be-on-macs."},{"key":"e_1_3_2_1_27_1","unstructured":"View \/ export the address book of ms-outlook. http:\/\/www.nirsoft.net\/utils\/ outlook_address_book_view.html.  View \/ export the address book of ms-outlook. http:\/\/www.nirsoft.net\/utils\/ outlook_address_book_view.html."},{"key":"e_1_3_2_1_28_1","unstructured":"Why does this code work on windows 7 but doesn\u2019t on windows xp? http:\/\/stackoverflow.com\/questions\/12638698\/ why-does-this-code-work-on-windows-7-but-doesnt-on-windows-xp.  Why does this code work on windows 7 but doesn\u2019t on windows xp? http:\/\/stackoverflow.com\/questions\/12638698\/ why-does-this-code-work-on-windows-7-but-doesnt-on-windows-xp."},{"key":"e_1_3_2_1_29_1","unstructured":"Winehq - run windows applications on linux bsd solaris and mac os x. https: \/\/www.winehq.org\/.  Winehq - run windows applications on linux bsd solaris and mac os x. https: \/\/www.winehq.org\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465380"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4630793"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945462"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771796"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247401"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1220164"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186093"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032342"},{"key":"e_1_3_2_1_40_1","first-page":"14","volume-title":"USENIX 2008 Annual Technical Conference, ATC\u201908","author":"Chow J.","year":"2008","unstructured":"J. Chow , T. Garfinkel , and P. M. Chen . Decoupling dynamic program analysis from execution in virtual environments . In USENIX 2008 Annual Technical Conference, ATC\u201908 , pages 1\u2013 14 , Berkeley, CA, USA , 2008 . USENIX Association. J. Chow, T. Garfinkel, and P. M. Chen. Decoupling dynamic program analysis from execution in virtual environments. In USENIX 2008 Annual Technical Conference, ATC\u201908, pages 1\u201314, Berkeley, CA, USA, 2008. USENIX Association."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/183019.183032"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.11"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844148"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346273"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9208-0"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351678"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671274"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.41"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694394"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568296"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.10"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693065"},{"key":"e_1_3_2_1_53_1","volume-title":"Optimising Existing Software with Genetic Programming","author":"Mark Harman W. B.","year":"2015","unstructured":"Langdon and W. B. Mark Harman . Optimising Existing Software with Genetic Programming . IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 19, NO. 1, FEBRUARY 2015 . Langdon and W. B. Mark Harman. Optimising Existing Software with Genetic Programming. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 19, NO. 1, FEBRUARY 2015."},{"issue":"239","key":"e_1_3_2_1_54_1","article-title":"Lightweight linux containers for consistent development and deployment","volume":"2014","author":"Merkel D.","year":"2014","unstructured":"D. Merkel . Docker : Lightweight linux containers for consistent development and deployment . Linux J. , 2014 ( 239 ), Mar. 2014 . D. Merkel. Docker: Lightweight linux containers for consistent development and deployment. Linux J., 2014(239), Mar. 2014.","journal-title":"Linux J."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080695.1069994"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44303-3_12"},{"key":"e_1_3_2_1_57_1","volume-title":"Atemu: A fine-grained sensor network simulator","author":"Polley J.","year":"2004","unstructured":"J. Polley , D. Blazakis , J. Mcgee , D. Rusk , and J. S. Baras . Atemu: A fine-grained sensor network simulator . In IEEE SECON \u201904, 2004 . J. Polley, D. Blazakis, J. Mcgee, D. Rusk, and J. S. Baras. Atemu: A fine-grained sensor network simulator. In IEEE SECON \u201904, 2004."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085139"},{"key":"e_1_3_2_1_59_1","first-page":"368","volume-title":"Proceedings of the 22Nd USENIX Conference on Security, SEC\u201913","author":"Schwartz E. J.","year":"2013","unstructured":"E. J. Schwartz , J. Lee , M. Woo , and D. Brumley . Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring . In Proceedings of the 22Nd USENIX Conference on Security, SEC\u201913 , pages 353\u2013 368 , Berkeley, CA, USA , 2013 . USENIX Association. E. J. Schwartz, J. Lee, M. Woo, and D. Brumley. Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring. In Proceedings of the 22Nd USENIX Conference on Security, SEC\u201913, pages 353\u2013368, Berkeley, CA, USA, 2013. USENIX Association."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508250"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380200205"},{"key":"e_1_3_2_1_62_1","unstructured":"ISSTA\u201917 July 2017 Santa Barbara CA USA Yonghwi Kwon Weihang Wang Yunhui Zheng Xiangyu Zhang and Dongyan Xu  ISSTA\u201917 July 2017 Santa Barbara CA USA Yonghwi Kwon Weihang Wang Yunhui Zheng Xiangyu Zhang and Dongyan Xu"},{"key":"e_1_3_2_1_63_1","first-page":"3","volume-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC \u201904","author":"Srinivasan S. M.","year":"2004","unstructured":"S. M. Srinivasan , S. Kandula , C. R. Andrews , and Y. Zhou . Flashback: A lightweight extension for rollback and deterministic replay for software debugging . In Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC \u201904 , pages 3\u2013 3 , Berkeley, CA, USA , 2004 . USENIX Association. S. M. Srinivasan, S. Kandula, C. R. Andrews, and Y. Zhou. Flashback: A lightweight extension for rollback and deterministic replay for software debugging. In Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC \u201904, pages 3\u20133, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"e_1_3_2_1_64_1","volume-title":"Geno-fix: An embeddable framework for dynamic adaptive genetic improvement programming","author":"Swan J.","year":"2014","unstructured":"J. Swan , M. G. Epitropakis , and J. R. Woodward . Geno-fix: An embeddable framework for dynamic adaptive genetic improvement programming . 2014 . J. Swan, M. G. Epitropakis, and J. R. Woodward. Geno-fix: An embeddable framework for dynamic adaptive genetic improvement programming. 2014."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147768"},{"key":"e_1_3_2_1_66_1","unstructured":"IEEE Press.  IEEE Press."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.5555\/1038267.1039035"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.500"},{"key":"e_1_3_2_1_69_1","volume-title":"Linux J.","author":"Walters B.","year":"1999","unstructured":"B. Walters . Vmware virtual platform . Linux J. , 1999(63es), July 1999 . B. Walters. Vmware virtual platform. Linux J., 1999(63es), July 1999."},{"key":"e_1_3_2_1_70_1","first-page":"642","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium, SEC\u201915","author":"Wang S.","year":"2015","unstructured":"S. Wang , P. Wang , and D. Wu . Reassembleable disassembling . In Proceedings of the 24th USENIX Conference on Security Symposium, SEC\u201915 , pages 627\u2013 642 , Berkeley, CA, USA , 2015 . USENIX Association. S. Wang, P. Wang, and D. Wu. Reassembleable disassembling. In Proceedings of the 24th USENIX Conference on Security Symposium, SEC\u201915, pages 627\u2013642, Berkeley, CA, USA, 2015. USENIX Association."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2083669"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287638"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/871656.859633"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516664"}],"event":{"name":"ISSTA '17: International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Santa Barbara CA USA","acronym":"ISSTA '17"},"container-title":["Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092707","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3092703.3092707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:26Z","timestamp":1750217846000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092707"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":75,"alternative-id":["10.1145\/3092703.3092707","10.1145\/3092703"],"URL":"https:\/\/doi.org\/10.1145\/3092703.3092707","relation":{},"subject":[],"published":{"date-parts":[[2017,7,10]]},"assertion":[{"value":"2017-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}