{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:26Z","timestamp":1750221266066,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T00:00:00Z","timestamp":1503619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Defense Acquisition Program Administration and Agency for Defense Development","award":["UD160035ED"],"award-info":[{"award-number":["UD160035ED"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,25]]},"DOI":"10.1145\/3133264.3133295","type":"proceedings-article","created":{"date-parts":[[2017,10,6]],"date-time":"2017-10-06T12:48:47Z","timestamp":1507294127000},"page":"129-134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The x86\/64 Binary Code to Smart Intermediate Language Translation for Software Weakness"],"prefix":"10.1145","author":[{"given":"Junho","family":"Jeong","sequence":"first","affiliation":[{"name":"Electronic Commerce Institute, Dongguk University, Dongdae-ro, Gyeongju, Gyeongbuk-do, Rep. of Korea"}]},{"given":"Yunsik","family":"Son","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Engineering, Dongguk University, Jung-gu, Seoul, Rep. of Korea"}]},{"given":"Seman","family":"Oh","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Engineering, Dongguk University, Jung-gu, Seoul, Rep. of Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"GrammaTech. 2017. GrammaTech: Binary Static Analysis. Retrieved from https:\/\/www.grammatech.com\/products\/binary-analysis  GrammaTech. 2017. GrammaTech: Binary Static Analysis. Retrieved from https:\/\/www.grammatech.com\/products\/binary-analysis"},{"key":"e_1_3_2_1_2_1","unstructured":"SecurityWeek. 2017. SecurityWeek: Less Than Fifty Percent of Third Party Code Is Tested for Quality and Security in Development Study Shows. Retrieved from http:\/\/www.securityweek.com\/less-fifty-percent-third-party-code-tested-quality-and-security-development-study-shows  SecurityWeek. 2017. SecurityWeek: Less Than Fifty Percent of Third Party Code Is Tested for Quality and Security in Development Study Shows. Retrieved from http:\/\/www.securityweek.com\/less-fifty-percent-third-party-code-tested-quality-and-security-development-study-shows"},{"key":"e_1_3_2_1_3_1","volume-title":"HeartBleed: The Heartbleed Bug. (April","author":"Codenomicon","year":"2014","unstructured":"Codenomicon . 2014. HeartBleed: The Heartbleed Bug. (April 2014 ). Retrieved from http:\/\/heartbleed.com\/ Codenomicon. 2014. HeartBleed: The Heartbleed Bug. (April 2014). Retrieved from http:\/\/heartbleed.com\/"},{"key":"e_1_3_2_1_4_1","unstructured":"US-CERT. United States Computer Emergency Readiness Team: GNU Bourne-Again Shell 'ShellShock' Vulnerability. Retrieved from https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-268A  US-CERT. United States Computer Emergency Readiness Team: GNU Bourne-Again Shell 'ShellShock' Vulnerability. Retrieved from https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-268A"},{"key":"e_1_3_2_1_5_1","volume-title":"This POODLE Bites: Exploiting the SSL 3.0 FallBack (September","author":"Bodo M\u00f6ller","year":"2014","unstructured":"Bodo M\u00f6ller , Thai Duong, and Krzysztof Kotowicz . 2014. This POODLE Bites: Exploiting the SSL 3.0 FallBack (September 2014 ). Retrieved from https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf Bodo M\u00f6ller, Thai Duong, and Krzysztof Kotowicz. 2014. This POODLE Bites: Exploiting the SSL 3.0 FallBack (September 2014). Retrieved from https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf"},{"key":"e_1_3_2_1_6_1","volume-title":"DROWN: Breaking TLS using SSL v2.","author":"Aviram N.","year":"2016","unstructured":"Aviram , N. , Schinzel , S. , Somorovsky , J. , Heninger , N. , Dankel , M. , Steube , J. , Valenta , L. , Adrian , D. , Halderman , A. J. , Dukhovni , V. , K\u00e4sper , E. , Cohney , S. , Engels , S. , Paar , C. , and Shavitt , Y . 2016 . DROWN: Breaking TLS using SSL v2. Retrieved from https:\/\/drownattack.com\/drown-attack-paper.pdf Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., Valenta, L., Adrian, D., Halderman, A. J., Dukhovni, V., K\u00e4sper, E., Cohney, S., Engels, S., Paar, C., and Shavitt, Y. 2016. DROWN: Breaking TLS using SSL v2. Retrieved from https:\/\/drownattack.com\/drown-attack-paper.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"GrammaTech. 2017. GrammaTech: Eliminating Vulnerabilities in Third-party Code with Binary Analysis. Retrieved from http:\/\/codesonar.grammatech.com\/eliminating-vulnerabilities-in-third-party-code-with-binary-analysis  GrammaTech. 2017. GrammaTech: Eliminating Vulnerabilities in Third-party Code with Binary Analysis. Retrieved from http:\/\/codesonar.grammatech.com\/eliminating-vulnerabilities-in-third-party-code-with-binary-analysis"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45937-5_16"},{"key":"e_1_3_2_1_10_1","volume-title":"REIL: A platform-independent intermediate representation of disassembled code for static code analysis. Proceeding of CanSecWest","author":"Dullien T.","year":"2009","unstructured":"Dullien , T. , and Porst , S . REIL: A platform-independent intermediate representation of disassembled code for static code analysis. Proceeding of CanSecWest ( 2009 ). Dullien, T., and Porst, S. REIL: A platform-independent intermediate representation of disassembled code for static code analysis. Proceeding of CanSecWest (2009)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.301"},{"key":"e_1_3_2_1_12_1","unstructured":"WinDbg. 2016. WinDbg: Multi-purpose Debugger. Retrieved from http:\/\/www.windbg.org\/  WinDbg. 2016. WinDbg: Multi-purpose Debugger. Retrieved from http:\/\/www.windbg.org\/"},{"key":"e_1_3_2_1_13_1","unstructured":"OllyDbg. 2014. OllyDbg: x86 Debugger. Retrieved from http:\/\/www.ollydbg.de\/  OllyDbg. 2014. OllyDbg: x86 Debugger. Retrieved from http:\/\/www.ollydbg.de\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Hex-Rays. 2016. Hex-Rays: IDA. Retrieved from https:\/\/www.hex-rays.com\/products\/ida\/  Hex-Rays. 2016. Hex-Rays: IDA. Retrieved from https:\/\/www.hex-rays.com\/products\/ida\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Microsoft Corporation. 2017. Microsoft Code Analysis Tool .NET (CAT.NET) v1 CTP. Retrieved from https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=19968  Microsoft Corporation. 2017. Microsoft Code Analysis Tool .NET (CAT.NET) v1 CTP. Retrieved from https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=19968"},{"key":"e_1_3_2_1_16_1","unstructured":"GrammaTech. 2017. GrammaTech N.p: CodeSurfer. Retrieved from http:\/\/www.grammatech.com\/products\/codesurfer  GrammaTech. 2017. GrammaTech N.p: CodeSurfer. Retrieved from http:\/\/www.grammatech.com\/products\/codesurfer"},{"key":"#cr-split#-e_1_3_2_1_17_1.1","doi-asserted-by":"crossref","unstructured":"Lee Y. Jeong J. & Son Y. 2016. Design and implementation of the secure compiler and virtual machine for developing secure IoT services. Future Generation Computer Systems. DOI=https:\/\/doi.org\/10.1016\/j.future.2016.03.014 10.1016\/j.future.2016.03.014","DOI":"10.1016\/j.future.2016.03.014"},{"key":"#cr-split#-e_1_3_2_1_17_1.2","doi-asserted-by":"crossref","unstructured":"Lee Y. Jeong J. & Son Y. 2016. Design and implementation of the secure compiler and virtual machine for developing secure IoT services. Future Generation Computer Systems. DOI=https:\/\/doi.org\/10.1016\/j.future.2016.03.014","DOI":"10.1016\/j.future.2016.03.014"},{"key":"e_1_3_2_1_18_1","volume-title":"Github: Dagre -- Graph layout for JavaScript.","author":"Github","year":"2017","unstructured":"Github . 2017 . Github: Dagre -- Graph layout for JavaScript. Retrieved from https:\/\/github.com\/cpettitt\/dagre Github. 2017. Github: Dagre -- Graph layout for JavaScript. Retrieved from https:\/\/github.com\/cpettitt\/dagre"}],"event":{"name":"ICAIP 2017: 2017 International Conference on Advances in Image Processing","sponsor":["Sultan Qaboos University Sultan Qaboos University","USM Universiti Sains Malaysia"],"location":"Bangkok Thailand","acronym":"ICAIP 2017"},"container-title":["Proceedings of the International Conference on Advances in Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133264.3133295","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133264.3133295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:59Z","timestamp":1750212659000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133264.3133295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,25]]},"references-count":19,"alternative-id":["10.1145\/3133264.3133295","10.1145\/3133264"],"URL":"https:\/\/doi.org\/10.1145\/3133264.3133295","relation":{},"subject":[],"published":{"date-parts":[[2017,8,25]]},"assertion":[{"value":"2017-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}