{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:57:18Z","timestamp":1770274638725,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Idaho State Board of Education","award":["IGEM17-001"],"award-info":[{"award-number":["IGEM17-001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359825","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"84-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Function boundary detection in stripped binaries"],"prefix":"10.1145","author":[{"given":"Jim","family":"Alves-Foss","sequence":"first","affiliation":[{"name":"University of Idaho"}]},{"given":"Jia","family":"Song","sequence":"additional","affiliation":[{"name":"University of Idaho"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","unstructured":"National Security Agency. 2017. Ghidra Reverse Engineering Tool. (2017). https:\/\/www.nsa.gov\/resources\/everyone\/ghidra\/  National Security Agency. 2017. Ghidra Reverse Engineering Tool. (2017). https:\/\/www.nsa.gov\/resources\/everyone\/ghidra\/"},{"key":"e_1_3_2_1_3_1","volume-title":"Compiler-Agnostic Function Detection in Binaries. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). 177--189","author":"Andriesse Dennis","year":"2017","unstructured":"Dennis Andriesse , Asia Slowinska , and Herbert Bos . 2017 . Compiler-Agnostic Function Detection in Binaries. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). 177--189 . Dennis Andriesse, Asia Slowinska, and Herbert Bos. 2017. Compiler-Agnostic Function Detection in Binaries. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). 177--189."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870873"},{"key":"e_1_3_2_1_5_1","unstructured":"Tiffany Bao and David Brumley. 2014. ByteWeight: Recognizing Functions in Binary Code. (2014). http:\/\/security.ece.cmu.edu\/byteweight\/  Tiffany Bao and David Brumley. 2014. ByteWeight: Recognizing Functions in Binary Code. (2014). http:\/\/security.ece.cmu.edu\/byteweight\/"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. USENIX Security Symposium. 845--860","author":"Bao Tiffany","year":"2014","unstructured":"Tiffany Bao , Jonathan Burket , Maverick Woa , Rafael Turner , and David Brumley . 2014 . ByteWeight: Learning to Recognize Functions in Binary Code . In Proc. USENIX Security Symposium. 845--860 . Tiffany Bao, Jonathan Burket, Maverick Woa, Rafael Turner, and David Brumley. 2014. ByteWeight: Learning to Recognize Functions in Binary Code. In Proc. USENIX Security Symposium. 845--860."},{"key":"e_1_3_2_1_7_1","unstructured":"BAP 2019. BAP: Binary analysis platform. (2019). http:\/\/bap.ece.cmu.edu\/  BAP 2019. BAP: Binary analysis platform. (2019). http:\/\/bap.ece.cmu.edu\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Capstone 2019. Capstone: The Ultimate Disassembler. (2019). http:\/\/www.capstone-engine.org\/  Capstone 2019. Capstone: The Ultimate Disassembler. (2019). http:\/\/www.capstone-engine.org\/"},{"key":"e_1_3_2_1_9_1","unstructured":"SPEC Corp. 2017. SPEC Benchmarks. (2017). http:\/\/www.spec.org  SPEC Corp. 2017. SPEC Benchmarks. (2017). http:\/\/www.spec.org"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/www.hex-rays.com\/products\/ida\/","author":"IDA","year":"2019","unstructured":"IDA 2019. Hex-Rays IDA. ( 2019 ). https:\/\/www.hex-rays.com\/products\/ida\/ IDA 2019. Hex-Rays IDA. (2019). https:\/\/www.hex-rays.com\/products\/ida\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Nucleus 2018. Nucleus source code. (2018). https:\/\/www.vusec.net\/projects\/function-detection  Nucleus 2018. Nucleus source code. (2018). https:\/\/www.vusec.net\/projects\/function-detection"},{"key":"e_1_3_2_1_13_1","volume-title":"National Conference on Artificial Intelligence. 798--804","author":"Rosenblum N. E.","unstructured":"N. E. Rosenblum , X. Zhu , B. P. Miller , and K. Hunt . 2008. Learning to analyze binary computer code .. In National Conference on Artificial Intelligence. 798--804 . N. E. Rosenblum, X. Zhu, B. P. Miller, and K. Hunt. 2008. Learning to analyze binary computer code.. In National Conference on Artificial Intelligence. 798--804."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. USENIX Security Symposium. 611--626","author":"Richard Shin Eui Chul","year":"2015","unstructured":"Eui Chul Richard Shin , Dawn Song , and Reza Moazzezi . 2015 . Recognizing Functions in Binaries with Neural Networks . In Proc. USENIX Security Symposium. 611--626 . Eui Chul Richard Shin, Dawn Song, and Reza Moazzezi. 2015. Recognizing Functions in Binaries with Neural Networks. In Proc. USENIX Security Symposium. 611--626."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.132"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.14"},{"key":"e_1_3_2_1_17_1","volume-title":"22nd USENIX Security Symposium. 337--352","author":"Zhang M.","unstructured":"M. Zhang and R. Sekar . 2013. Control flow integrity for COTS binaries . In 22nd USENIX Security Symposium. 337--352 . M. Zhang and R. Sekar. 2013. Control flow integrity for COTS binaries. In 22nd USENIX Security Symposium. 337--352."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359825","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359825"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":17,"alternative-id":["10.1145\/3359789.3359825","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359825","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}