{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:33Z","timestamp":1750220913337,"version":"3.41.0"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T00:00:00Z","timestamp":1584662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2020,3,20]]},"DOI":"10.1145\/3378424","type":"journal-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T15:06:50Z","timestamp":1584716810000},"page":"86-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Asia's surging interest in binary analysis"],"prefix":"10.1145","volume":"63","author":[{"given":"Sang Kil","family":"Cha","sequence":"first","affiliation":[{"name":"KAIST"}]},{"given":"Zhenkai","family":"Liang","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the Network and Distributed System Security Symp.","author":"Avgerinos T.","year":"2011","unstructured":"Avgerinos , T. , Cha , S.K. , Hao , B.L.T. and Brumley , D . AEG: Automatic exploit generation . In Proceedings of the Network and Distributed System Security Symp. , 2011 . Avgerinos, T., Cha, S.K., Hao, B.L.T. and Brumley, D. AEG: Automatic exploit generation. In Proceedings of the Network and Distributed System Security Symp., 2011."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the ACM Conf. Computer and Communications Security","author":"Bohme M.","year":"2016","unstructured":"Bohme , M. , Pham , V.-T. and Roychoudhury , A . Coverage-based grey-box fuzzing as Markov chain . In Proceedings of the ACM Conf. Computer and Communications Security , 2016 . Bohme, M., Pham, V.-T. and Roychoudhury, A. Coverage-based grey-box fuzzing as Markov chain. In Proceedings of the ACM Conf. Computer and Communications Security, 2016."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00082"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the Network and Distributed System Security Symp.","author":"Chua Z.","year":"2019","unstructured":"Chua , Z. , Wang , Y. , B\u0103lut\u0103 , T. , Saxena , P. , Liang , Z. and Su , P . One engine to serve'em all: Inferring taint rules without architectural semantics . In Proceedings of the Network and Distributed System Security Symp. , 2019 . Chua, Z., Wang, Y., B\u0103lut\u0103, T., Saxena, P., Liang, Z. and Su, P. One engine to serve'em all: Inferring taint rules without architectural semantics. In Proceedings of the Network and Distributed System Security Symp., 2019."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the IEEE Symp. Security and Privacy","author":"Gan S.","year":"2018","unstructured":"Gan , S. et al. CollAFL: Coverage sensitive fuzzing . In Proceedings of the IEEE Symp. Security and Privacy , 2018 . Gan, S. et al. CollAFL: Coverage sensitive fuzzing. In Proceedings of the IEEE Symp. Security and Privacy, 2018."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610407"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the USENIX Security Symp.","author":"Hu H.","year":"2015","unstructured":"Hu , H. , Chua , Z. , Adrian , S. , Saxena , P. and Liang , Z . Automatic generation of data-oriented exploits . In Proceedings of the USENIX Security Symp. , 2015 . Hu, H., Chua, Z., Adrian, S., Saxena, P. and Liang, Z. Automatic generation of data-oriented exploits. In Proceedings of the USENIX Security Symp., 2015."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23051"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115648"},{"key":"e_1_2_1_12_1","author":"Man\u00e8s V.J.","year":"2019","unstructured":"Man\u00e8s , V.J. The art, science, and engineering of fuzzing: A survey. IEEE Trans. Software Engineering , 2019 . Man\u00e8s, V.J. et al. The art, science, and engineering of fuzzing: A survey. IEEE Trans. Software Engineering, 2019.","journal-title":"Trans. Software Engineering"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the IEEE Symp. Security and Privacy","author":"Shoshitaishvili Y.","year":"2016","unstructured":"Shoshitaishvili , Y. et al. (State of) the art of war: Offensive techniques in binary analysis . In Proceedings of the IEEE Symp. Security and Privacy , 2016 . Shoshitaishvili, Y. et al. (State of) the art of war: Offensive techniques in binary analysis. In Proceedings of the IEEE Symp. Security and Privacy, 2016."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the ACM Conf. Computer and Communications Security","author":"Wang Y","year":"2018","unstructured":"Wang , Y , Zhang , C. , Xiang , X. , Zhao , Z. , Li , W. , Gong , X. , Liu , B. , Chen , K. , Zou , W. Revery : From proof-of-concept to exploitable (one step towards automatic exploit generation) . In Proceedings of the ACM Conf. Computer and Communications Security , 2018 . Wang, Y, Zhang, C., Xiang, X., Zhao, Z., Li, W., Gong, X., Liu, B., Chen, K., Zou, W. Revery: From proof-of-concept to exploitable (one step towards automatic exploit generation). In Proceedings of the ACM Conf. Computer and Communications Security, 2018."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,20]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,3,20]]}},"alternative-id":["10.1145\/3378424"],"URL":"https:\/\/doi.org\/10.1145\/3378424","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2020,3,20]]},"assertion":[{"value":"2020-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}