{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:11:51Z","timestamp":1775873511591,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T00:00:00Z","timestamp":1527465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,28]]},"DOI":"10.1145\/3196321.3196330","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"20-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Meaningful variable names for decompiled code"],"prefix":"10.1145","author":[{"given":"Alan","family":"Jaffe","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Jeremy","family":"Lacomis","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Edward J.","family":"Schwartz","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Claire","family":"Le Goues","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Bogdan","family":"Vasilescu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2018,5,28]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.51"},{"key":"e_1_3_2_1_3_1","volume-title":"NDSS '15","author":"Yakdan K.","year":"2015","unstructured":"K. Yakdan, S. Eschweiler, E. Gerhards-Padilla, and M. Smith, \"No more gotos: Decompilation using pattern-independent control-flow structuring and semantics-preserving transformations,\" in Network and Distributed System Security Symposium, ser. NDSS '15, 2015."},{"key":"e_1_3_2_1_4_1","first-page":"158","volume-title":"SP '16","author":"Yakdan K.","year":"2016","unstructured":"K. Yakdan, S. Dechand, E. Gerhards-Padilla, and M. Smith, \"Helping Johnny to analyze malware: A usability-optimized decompiler and malware analysis user study,\" in IEEE Symposium on Security and Privacy, ser. SP '16, 2016, pp. 158--177."},{"key":"e_1_3_2_1_5_1","first-page":"449","volume-title":"WCRE '13","author":"Durfina L.","year":"2013","unstructured":"L. Durfina, J. Kroustek, and P. Zemek, \"PsybOt malware: A step-by-step decompilation case study,\" in Working Conference on Reverse Engineering, ser. WCRE '13, 2013, pp. 449--456."},{"key":"e_1_3_2_1_6_1","volume-title":"dissertation","author":"van Emmerik M. J.","year":"2007","unstructured":"M. J. van Emmerik, \"Static single assignment for decompilation,\" Ph.D. dissertation, University of Queensland, 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534797"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"B. Vasilescu C. Casalnuovo and P. Devanbu \"Recovering clear natural identifiers from obfuscated JavaScript names \" in Joint Meeting of the European Software Engineering Conference and the Symposium on the Foundations of Software Engineering ser. ESEC\/FSE '17 2017 pp. 683--693. 10.1145\/3106237.3106289","DOI":"10.1145\/3106237.3106289"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978422"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337322"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1557769.1557821"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3115\/1073445.1073462"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661136.2661148"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2494584"},{"key":"e_1_3_2_1_18_1","first-page":"574","volume-title":"ASE '15","author":"Oda Y.","year":"2015","unstructured":"Y. Oda, H. Fudaba, G. Neubig, H. Hata, S. Sakti, T. Toda, and S. Nakamura, \"Learning to generate pseudo-code from source code using statistical machine translation,\" in International Conference on Automated Software Engineering, ser. ASE '15, 2015, pp. 574--584."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594321"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3115\/1118693.1118711"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/nav.3800020109"},{"key":"e_1_3_2_1_22_1","volume-title":"Introduction to Computational Molecular Biology","author":"Setubal C.","year":"1997","unstructured":"C. Setubal and J. Meidanis, Introduction to Computational Molecular Biology, 1997."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487132"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.70"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3104029"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635875"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106290"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-0-387-21579-2_9","volume-title":"An overview,\" in Nonlinear Estimation and Classification","author":"Schapire R. E.","year":"2003","unstructured":"R. E. Schapire, \"The boosting approach to machine learning: An overview,\" in Nonlinear Estimation and Classification. Springer New York, 2003, pp. 149--171."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3110856"},{"key":"e_1_3_2_1_31_1","volume-title":"dissertation","author":"Cifuentes C.","year":"1994","unstructured":"C. Cifuentes, \"Reverse compilation techniques,\" Ph.D. dissertation, Queensland University of Technology, 1994."},{"key":"e_1_3_2_1_32_1","volume-title":"NDSS '11","author":"Lee J.","year":"2011","unstructured":"J. Lee, T. Avgerinos, and D. Brumley, \"TIE: Principled reverse engineering of types in binary programs,\" in Proceedings of the Network and Distributed System Security Symposium, ser. NDSS '11, 2011."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462165"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908119"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882315"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045118.3045344"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984041"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045699"},{"key":"e_1_3_2_1_39_1","unstructured":"J. Dorn \"A general software readability model \" Master's thesis 2012."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985454"},{"key":"e_1_3_2_1_41_1","volume-title":"PPIG '06","author":"Liblit B.","year":"2006","unstructured":"B. Liblit, A. Begel, and E. Sweeser, \"Cognitive perspectives on the role of naming in computer programs,\" in Annual Psychology of Programming Workshop, ser. PPIG '06, 2006."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970342"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092727"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","location":"Gothenburg Sweden","acronym":"ICSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 26th Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196321.3196330","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196321.3196330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:41Z","timestamp":1750212461000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196321.3196330"}},"subtitle":["a machine translation approach"],"short-title":[],"issued":{"date-parts":[[2018,5,28]]},"references-count":42,"alternative-id":["10.1145\/3196321.3196330","10.1145\/3196321"],"URL":"https:\/\/doi.org\/10.1145\/3196321.3196330","relation":{},"subject":[],"published":{"date-parts":[[2018,5,28]]},"assertion":[{"value":"2018-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}