{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:49Z","timestamp":1750220629582,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1908313"],"award-info":[{"award-number":["1908313"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416542","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"312-323","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Representing and reasoning about dynamic code"],"prefix":"10.1145","author":[{"given":"Jesse","family":"Bartels","sequence":"first","affiliation":[{"name":"The University Of Arizona"}]},{"given":"Jon","family":"Stephens","sequence":"additional","affiliation":[{"name":"University Of Texas"}]},{"given":"Saumya","family":"Debray","sequence":"additional","affiliation":[{"name":"The University Of Arizona"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Uni-poker Javascript source code. https:\/\/browserbench.org\/JetStream\/RexBench\/UniPoker\/poker.js"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"e_1_3_2_1_3_1","unstructured":"A. V. Aho R. Sethi and J. D. Ullman. 1985. Compilers - Principles Techniques and Tools. Addison-Wesley Reading Mass."},{"key":"e_1_3_2_1_4_1","first-page":"232","article-title":"A Model for Self-Modifying Code","volume":"4437","author":"Anckaert B.","year":"2006","unstructured":"B. Anckaert, M. Madou, and K. De Bosschere. 2006. A Model for Self-Modifying Code. LNCS 4437, 232--248.","journal-title":"LNCS"},{"key":"e_1_3_2_1_5_1","unstructured":"Saam Barati. 2019. Introducing the JetStream 2 Benchmark Suite. https:\/\/webkit.org\/blog\/8685\/introducing-the-jetstream-2-benchmark-suite\/"},{"volume-title":"Botnet Detection","author":"Brumley David","key":"e_1_3_2_1_6_1","unstructured":"David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, and Heng Yin. 2008. Automatically identifying trigger-based behavior in malware. In Botnet Detection. Springer, 65--88."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250743"},{"key":"e_1_3_2_1_8_1","unstructured":"Peter Cawley. 2015. Malicious LuaJIT bytecode. https:\/\/www.corsix.org\/content\/malicious-luajit-bytecode"},{"key":"e_1_3_2_1_9_1","unstructured":"Oliver Chang. 2017. Exploiting a V8 OOB write. https:\/\/halbecaf.com\/2017\/05\/24\/exploiting-a-v8-oob-write\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium. 321--336","author":"Chow Jim","year":"2004","unstructured":"Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum. 2004. Understanding data lifetime via whole system simulation. In USENIX Security Symposium. 321--336."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"M. Dalla Preda R. Giacobazzi and S. Debray. 2015. Unveiling metamorphism by abstract interpretation of code properties. Theoretical Computer Science 577 (April 2015) 74--97.","DOI":"10.1016\/j.tcs.2015.02.024"},{"key":"e_1_3_2_1_13_1","volume-title":"TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM TOCS 32, 2","author":"Enck William","year":"2014","unstructured":"William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth. 2014. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM TOCS 32, 2 (2014)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134037"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542528"},{"key":"e_1_3_2_1_16_1","unstructured":"Isaac Gouy. [n.d.]. nbody Javascript source code. https:\/\/browserbench.org\/JetStream\/SunSpider\/n-body.js"},{"key":"e_1_3_2_1_17_1","unstructured":"Loki Hardt. 2015. Issue 794825: Security: V8: Empty Bytecode Jump Table may lead to OOB read. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=794825"},{"key":"e_1_3_2_1_18_1","unstructured":"Loki Hardt. 2017. Issue 794822: Security: V8: JIT: Type confusion in GetSpecializationContext. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=794822"},{"key":"e_1_3_2_1_19_1","unstructured":"Loki Hardt. 2018. Issue 807096: Security: Arrow function scope fixing bug. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=807096"},{"volume-title":"Proc. 2013 IEEE International Conference on Communications (ICC). 1962--1967","author":"Hauser Christophe","key":"e_1_3_2_1_20_1","unstructured":"Christophe Hauser, Frederic Tronel, Ludovic M\u00e9, and Colin J. Fidge. 2013. Intrusion detection in distributed systems, an approach based on taint marking. In Proc. 2013 IEEE International Conference on Communications (ICC). 1962--1967."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610407"},{"volume-title":"Proc. 12th ACM SIGPLAN International Conference on Functional Programming (ICFP). 85--96","author":"Horn David Van","key":"e_1_3_2_1_22_1","unstructured":"David Van Horn and Harry G. Mairson. 2007. Relating complexity and precision in control flow analysis. In Proc. 12th ACM SIGPLAN International Conference on Functional Programming (ICFP). 85--96."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384630"},{"key":"e_1_3_2_1_24_1","unstructured":"Intel Corp. [n.d.]. Intel XED. https:\/\/intelxed.github.io."},{"key":"e_1_3_2_1_25_1","unstructured":"Bob Ippolito. [n.d.]. str-unpack Javascript source code. https:\/\/browserbench.org\/JetStream\/SunSpider\/string-unpack-code.js"},{"key":"e_1_3_2_1_26_1","unstructured":"Paul Johnston. [n.d.]. crypto-sha1 Javascript source code. https:\/\/browserbench.org\/JetStream\/SunSpider\/crypto-sha1.js"},{"key":"e_1_3_2_1_27_1","unstructured":"Min Gyung Kang Stephen McCamant Pongsin Poosankam and Dawn Song. 2011. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In NDSS."},{"key":"e_1_3_2_1_28_1","first-page":"38","article-title":"Information flow tracking meets just-in-time compilation","volume":"10","author":"Kerschbaumer Christoph","year":"2013","unstructured":"Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, and Michael Franz. 2013. Information flow tracking meets just-in-time compilation. ACM Transactions on Architecture and Code Optimization (TACO) 10, 4 (2013), 38.","journal-title":"ACM Transactions on Architecture and Code Optimization (TACO)"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134099"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.581327"},{"key":"e_1_3_2_1_31_1","first-page":"190","article-title":"Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In Proc. ACM Conference on Programming Language Design and Implementation (PLDI)","author":"Luk C.-K.","year":"2005","unstructured":"C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. 2005. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In Proc. ACM Conference on Programming Language Design and Implementation (PLDI). Chicago, IL, 190--200.","journal-title":"Chicago"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-49051-7_5"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706313"},{"volume-title":"Proc. ACM Conference on Programming Language Design and Implementation (PLDI). 89--100","author":"Nethercote N.","key":"e_1_3_2_1_34_1","unstructured":"N. Nethercote and J. Seward. 2007. Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation. In Proc. ACM Conference on Programming Language Design and Implementation (PLDI). 89--100."},{"key":"e_1_3_2_1_35_1","unstructured":"James Newsome and Dawn Song. 2005. Dynamic Taint Analysis for Automatic Detection Analysis and Signature Generation of Exploits on Commodity Software. In NDSS."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772958"},{"key":"e_1_3_2_1_37_1","unstructured":"Martijn Pieters and Samuel Sieb. [n.d.]. base64 Javascript source code. https:\/\/browserbench.org\/JetStream\/SunSpider\/base64.js"},{"key":"e_1_3_2_1_38_1","unstructured":"Jordan Rabet. 2017. Browser security beyond sandboxing. Microsoft Windows Defender Research. https:cloudblogs.microsoft.com\/microsoftsecure\/2017\/10\/18\/browser-security-beyond-sandboxing."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1275497.1275502"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594316"},{"key":"e_1_3_2_1_42_1","volume-title":"Triton: A Dynamic Symbolic Execution Framework. In Symposium sur la s\u00e9curit\u00e9 des technologies de l'information et des communications, SSTIC, France, Rennes, June 3--5","author":"Saudel Florent","year":"2015","unstructured":"Florent Saudel and Jonathan Salwan. 2015. Triton: A Dynamic Symbolic Execution Framework. In Symposium sur la s\u00e9curit\u00e9 des technologies de l'information et des communications, SSTIC, France, Rennes, June 3--5 2015. SSTIC, 31--54."},{"key":"e_1_3_2_1_43_1","unstructured":"M. Sharir and A. Pnueli. 1981. Two Approaches to Interprocedural Data Flow Analysis. In Program Flow Analysis: Theory and Applications S. S. Muchnick and N. D. Jones (Eds.). Prentice-Hall 189--233."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christopher Salls Nick Stephens Mario Polino Audrey Dutcher John Grosen Siji Feng Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. (2016).","DOI":"10.1109\/SP.2016.17"},{"volume-title":"Virtual machines: versatile platforms for systems and processes","author":"Smith Jim","key":"e_1_3_2_1_45_1","unstructured":"Jim Smith and Ravi Nair. 2005. Virtual machines: versatile platforms for systems and processes. Elsevier."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250748"},{"key":"e_1_3_2_1_47_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution.","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Audrey Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. (2016)."},{"key":"e_1_3_2_1_48_1","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"Tip F.","year":"1995","unstructured":"F. Tip. 1995. A survey of program slicing techniques. Journal of Programming Languages 3 (1995), 121--189.","journal-title":"Journal of Programming Languages"},{"key":"e_1_3_2_1_49_1","unstructured":"Svend Tofte. [n.d.]. date-format Javascript source code. https:\/\/browserbench.org\/JetStream\/SunSpider\/date-format-tofte.js"},{"key":"e_1_3_2_1_50_1","first-page":"4","article-title":"Program slicing","volume":"10","author":"Weiser Mark","year":"1984","unstructured":"Mark Weiser. 1984. Program slicing. IEEE Transactions on Software Engineering 10, 4 (July 1984), 352\u00e2\u0102\u015e--357.","journal-title":"IEEE Transactions on Software Engineering"},{"volume-title":"Proc. SIGPLAN 1995 Conference on Programming Language Design and Implementation (PLDI '95)","author":"Robert","key":"e_1_3_2_1_51_1","unstructured":"Robert P. Wilson and Monica S. Lam. 1995. Efficient Context-sensitive Pointer Analysis for C Programs. In Proc. SIGPLAN 1995 Conference on Programming Language Design and Implementation (PLDI '95). 1--12."},{"key":"e_1_3_2_1_52_1","volume-title":"Control Dependencies in Interpretive Systems. In International Conference on Runtime Verification. Springer, 312--329","author":"Yadegari Babak","year":"2017","unstructured":"Babak Yadegari and Saumya Debray. 2017. Control Dependencies in Interpretive Systems. In International Conference on Runtime Verification. Springer, 312--329."},{"key":"e_1_3_2_1_53_1","volume-title":"Temu: Binary code analysis via whole-system layered annotative execution. EECS Department","author":"Yin Heng","year":"2010","unstructured":"Heng Yin and Dawn Song. 2010. Temu: Binary code analysis via whole-system layered annotative execution. EECS Department, University of California, Berkeley, Tech. Rep. UCB\/EECS-2010-3 (2010)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999454"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416542","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416542","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:37Z","timestamp":1750197697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":55,"alternative-id":["10.1145\/3324884.3416542","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416542","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}