{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:43:44Z","timestamp":1770223424189,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375742","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"376-380","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["ISAdetect"],"prefix":"10.1145","author":[{"given":"Sami","family":"Kairaj\u00e4rvi","sequence":"first","affiliation":[{"name":"University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"}]},{"given":"Andrei","family":"Costin","sequence":"additional","affiliation":[{"name":"University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"}]},{"given":"Timo","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"additional","affiliation":[{"name":"University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Andr\u00e9s Blanco and Matias Eissler. 2012. One firmware to monitor 'em all."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755932"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_6_1","volume-title":"mbox","author":"Franccois Chollet","year":"2015","unstructured":"Franccois Chollet et almbox. 2015. Keras. https:\/\/keras.io ."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.05.007"},{"key":"e_1_3_2_1_8_1","unstructured":"Andrei Costin Jonas Zaddach Aur\u00e9lien Francillon Davide Balzarotti and Sophia Antipolis. 2014. A Large-Scale Analysis of the Security of Embedded Firmwares. In USENIX Security ."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Andrei Costin Apostolis Zarras and Aur\u00e9lien Francillon. 2016. Automated dynamic firmware analysis at scale: a case study on embedded web interfaces. In ASIACCS. ACM.","DOI":"10.1145\/2897845.2897900"},{"key":"e_1_3_2_1_10_1","unstructured":"Drew Davidson Benjamin Moench Thomas Ristenpart and Somesh Jha. 2013. FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. In USENIX Security ."},{"key":"e_1_3_2_1_11_1","volume-title":"ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 351--371","author":"Nicolao Pietro De","year":"2018","unstructured":"Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, and Stefano Zanero. 2018. ELISA: ELiciting ISA of Raw Binaries for Fine-Grained Code and Data Separation. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 351--371."},{"key":"e_1_3_2_1_12_1","volume-title":"Hack.Lu","volume":"10","author":"Delugr\u00e9 Guillaume","year":"2010","unstructured":"Guillaume Delugr\u00e9. 2010. Closer to metal: reverse-engineering the Broadcom NetExtreme's firmware. Hack.Lu , Vol. 10 (2010)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Lo\"ic Duflot Yves-Alexis Perez and Benjamin Morin. 2011. What if you can't trust your network card?. In Recent Advances in Intrusion Detection .","DOI":"10.1007\/978-3-642-23644-0_20"},{"key":"e_1_3_2_1_14_1","unstructured":"Chris Eagle. 2011. The IDA pro book. No Starch Press."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Sebastian Eschweiler Khaled Yakdan and Elmar Gerhards-Padilla. 2016. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code. In NDSS .","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_17_1","volume-title":"Reverse Engineering Exploits and Tool Coding for Security Professionals","author":"Foster James C","unstructured":"James C Foster. 2005. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals. Elsevier."},{"key":"e_1_3_2_1_18_1","volume-title":"Workshop on Learning from Imbalanced Data Sets II","volume":"1723","author":"Japkowicz Nathalie","year":"2003","unstructured":"Nathalie Japkowicz. 2003. Class imbalances: are we focusing on the right issue. In Workshop on Learning from Imbalanced Data Sets II, Vol. 1723. 63."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2189750.2150987"},{"key":"e_1_3_2_1_20_1","volume-title":"Automatic identification of architecture and endianness using binary file contents. Master's thesis","author":"Sami","year":"2019","unstructured":"Sami Kairaj\"arvi. 2019. Automatic identification of architecture and endianness using binary file contents. Master's thesis. University of Jyv\"askyl\"a, Jyv\"askyl\"a, Finland. http:\/\/urn.fi\/URN:NBN:fi:jyu-201904182217"},{"key":"e_1_3_2_1_21_1","volume-title":"Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences. arXiv preprint arXiv:1908.05459","author":"Sami","year":"2019","unstructured":"Sami Kairaj\"arvi, Andrei Costin, and Timo H\"am\"al\"ainen. 2019. Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences. arXiv preprint arXiv:1908.05459 (2019)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"e_1_3_2_1_23_1","volume-title":"Hee Beng Kuan Tan, and Xu Chen","author":"Liu Kaiping","year":"2013","unstructured":"Kaiping Liu, Hee Beng Kuan Tan, and Xu Chen. 2013. Binary code analysis. Computer , Vol. 46, 8 (2013)."},{"key":"e_1_3_2_1_24_1","first-page":"832","article-title":"Network-based binary file extraction and analysis for malware detection","volume":"8","author":"Manni Jayaraman","year":"2014","unstructured":"Jayaraman Manni, Ashar Aziz, Fengmin Gong, Upendran Loganathan, and Muhammad Amin. 2014. Network-based binary file extraction and analysis for malware detection. US Patent 8,832,829.","journal-title":"US Patent"},{"key":"e_1_3_2_1_25_1","volume-title":"Battery firmware hacking. Black Hat USA","author":"Miller Charlie","year":"2011","unstructured":"Charlie Miller. 2011. Battery firmware hacking. Black Hat USA (2011), 3--4."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Marius Muench Jan Stijohann Frank Kargl Aur\u00e9lien Francillon and Davide Balzarotti. 2018. What you corrupt is not what you crash: Challenges in fuzzing embedded devices. In NDSS .","DOI":"10.14722\/ndss.2018.23166"},{"key":"e_1_3_2_1_27_1","volume-title":"BadUSB - On accessories that turn evil . Black Hat USA","author":"Nohl Karsten","year":"2014","unstructured":"Karsten Nohl and Jakob Lell. 2014. BadUSB - On accessories that turn evil . Black Hat USA (2014)."},{"key":"e_1_3_2_1_28_1","volume-title":"UNIX System V: understanding ELF object files and debugging tools","author":"Nohr Mary Lou","unstructured":"Mary Lou Nohr. 1993. UNIX System V: understanding ELF object files and debugging tools. Prentice Hall PTR."},{"key":"e_1_3_2_1_29_1","unstructured":"Sergi \"pancake\" Alvarez and core contributors. [n. d.]. radare2 -- unix-like reverse engineering framework and commandline tools. https:\/\/www.radare.org\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920305"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2015. Firmalice-Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. In NDSS .","DOI":"10.14722\/ndss.2015.23294"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_36_1","first-page":"137","article-title":"Binary translation","volume":"4","author":"Sites Richard L","year":"1993","unstructured":"Richard L Sites, Anton Chernoff, Matthew B Kirk, Maurice P Marks, and Scott G Robinson. 1993. Binary translation. Digital Technical Journal , Vol. 4 (1993), 137--137.","journal-title":"Digital Technical Journal"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Iain Sutherland George E Kalb Andrew Blyth and Gaius Mulley. 2006. An empirical examination of the reverse engineering process for binary files. (2006).","DOI":"10.1016\/j.cose.2005.11.002"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818040"},{"key":"e_1_3_2_1_40_1","first-page":"914","article-title":"Detecting exploit code in network flows","volume":"11","author":"Den Berg Eric Van","year":"2009","unstructured":"Eric Van Den Berg and Ramkumar Chinchani. 2009. Detecting exploit code in network flows. US Patent App. 11\/260,914.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_41_1","volume-title":"Angr-the next generation of binary analysis. In 2017 IEEE Cybersecurity Development (SecDev)","author":"Wang Fish","unstructured":"Fish Wang and Yan Shoshitaishvili. 2017. Angr-the next generation of binary analysis. In 2017 IEEE Cybersecurity Development (SecDev) . IEEE, 8--9."},{"key":"e_1_3_2_1_42_1","unstructured":"Tielei Wang Tao Wei Zhiqiang Lin and Wei Zou. 2009. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. In NDSS ."}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","location":"New Orleans LA USA","acronym":"CODASPY '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375742"}},"subtitle":["Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":42,"alternative-id":["10.1145\/3374664.3375742","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375742","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}