{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:11:49Z","timestamp":1775873509350,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,18]]},"DOI":"10.1145\/3395363.3397370","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:44:18Z","timestamp":1594676658000},"page":"475-487","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["How far we have come: testing decompilation correctness of C decompilers"],"prefix":"10.1145","author":[{"given":"Zhibo","family":"Liu","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology, China"}]},{"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Starcraft Reverse Engineered to run on ARM. https:\/\/news.ycombinator. com\/item?id= 7372414.  2014. Starcraft Reverse Engineered to run on ARM. https:\/\/news.ycombinator. com\/item?id= 7372414."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. radare2. http:\/\/www.radare.org\/r\/.  2016. radare2. http:\/\/www.radare.org\/r\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Diablo devolved-magic behind the 1996 computer game. https:\/\/github. com\/diasurgical\/devilution.  2018. Diablo devolved-magic behind the 1996 computer game. https:\/\/github. com\/diasurgical\/devilution."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. Firmware Mod Kit. https:\/\/github.com\/rampageX\/firmware-mod-kit.  2018. Firmware Mod Kit. https:\/\/github.com\/rampageX\/firmware-mod-kit."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Snowman decompiler. https:\/\/derevenets.com.  2018. Snowman decompiler. https:\/\/derevenets.com."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. Moss: A System for Detecting Software Similarity. https:\/\/theory.stanford. edu\/~aiken\/moss.  2019. Moss: A System for Detecting Software Similarity. https:\/\/theory.stanford. edu\/~aiken\/moss."},{"key":"e_1_3_2_1_7_1","unstructured":"2019. Output of nocode Invalid C++ Code. https:\/\/github.com\/yegord\/snowman\/ issues\/196.  2019. Output of nocode Invalid C++ Code. https:\/\/github.com\/yegord\/snowman\/ issues\/196."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. Decompiler Flaws and Root Cause Analysis. https:\/\/www.dropbox.com\/ sh\/kqw7e19snfeukai\/AADHZ45TAL9Kxi7v9nmdXfLCa?dl= 0.  2020. Decompiler Flaws and Root Cause Analysis. https:\/\/www.dropbox.com\/ sh\/kqw7e19snfeukai\/AADHZ45TAL9Kxi7v9nmdXfLCa?dl= 0."},{"key":"e_1_3_2_1_9_1","unstructured":"2020. Decompiler Fuzzing Test with EMI mutation. https:\/\/github.com\/monkbai\/ DecFuzzer.  2020. Decompiler Fuzzing Test with EMI mutation. https:\/\/github.com\/monkbai\/ DecFuzzer."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Kapil Anand Matthew Smithson Khaled Elwazeer Aparna Kotha Jim Gruen Nathan Giles and Rajeev Barua. 2013. A Compiler-level Intermediate Representation Based Binary Analysis and Rewriting System. In EuroSys ' 13.  Kapil Anand Matthew Smithson Khaled Elwazeer Aparna Kotha Jim Gruen Nathan Giles and Rajeev Barua. 2013. A Compiler-level Intermediate Representation Based Binary Analysis and Rewriting System. In EuroSys ' 13.","DOI":"10.1145\/2465351.2465380"},{"key":"e_1_3_2_1_11_1","unstructured":"Dennis Andriesse Xi Chen Victor van der Veen Asia Slowinska and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries. In USENIX Sec.  Dennis Andriesse Xi Chen Victor van der Veen Asia Slowinska and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries. In USENIX Sec."},{"key":"e_1_3_2_1_12_1","volume-title":"DIVINE: DIscovering Variables IN Executables. In VMCAI","author":"Balakrishnan Gogul","year":"2007","unstructured":"Gogul Balakrishnan and Thomas Reps . [n.d.]. DIVINE: DIscovering Variables IN Executables. In VMCAI 2007 . Gogul Balakrishnan and Thomas Reps. [n.d.]. DIVINE: DIscovering Variables IN Executables. In VMCAI 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium. USENIX Association.","author":"Bao Tifany","year":"2014","unstructured":"Tifany Bao , Jonathan Burket , Maverick Woo , Rafael Turner , and David Brumley . 2014 . ByteWeight: Learning to Recognize Functions in Binary Code . In Proceedings of the 23rd USENIX Conference on Security Symposium. USENIX Association. Tifany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. ByteWeight: Learning to Recognize Functions in Binary Code. In Proceedings of the 23rd USENIX Conference on Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_15_1","unstructured":"Ahmed Bougacha. 2016. Dagger. https:\/\/github.com\/repzret\/dagger.  Ahmed Bougacha. 2016. Dagger. https:\/\/github.com\/repzret\/dagger."},{"key":"e_1_3_2_1_16_1","volume-title":"BAP: A binary analysis platform (CAV).","author":"Brumley David","year":"2011","unstructured":"David Brumley , Ivan Jager , Thanassis Avgerinos , and Edward J Schwartz . 2011 . BAP: A binary analysis platform (CAV). David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J Schwartz. 2011. BAP: A binary analysis platform (CAV)."},{"key":"e_1_3_2_1_17_1","volume-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). 353-368.","author":"Brumley David","unstructured":"David Brumley , JongHyup Lee , Edward J. Schwartz , and Maverick Woo . 2013. Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring . In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). 353-368. David Brumley, JongHyup Lee, Edward J. Schwartz, and Maverick Woo. 2013. Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). 353-368."},{"key":"e_1_3_2_1_18_1","volume-title":"Chia Yuan Cho, and Hee Beng Kuan Tan","author":"Chandramohan Mahinthan","year":"2016","unstructured":"Mahinthan Chandramohan , Yinxing Xue , Zhengzi Xu , Yang Liu , Chia Yuan Cho, and Hee Beng Kuan Tan . 2016 . BinGo: Cross-architecture cross-OS Binary Search (FSE) . Mahinthan Chandramohan, Yinxing Xue, Zhengzi Xu, Yang Liu, Chia Yuan Cho, and Hee Beng Kuan Tan. 2016. BinGo: Cross-architecture cross-OS Binary Search (FSE)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Yuting Chen Ting Su Chengnian Sun Zhendong Su and Jianjun Zhao. 2016. Coverage-directed Diferential Testing of JVM Implementations. In PLDI.  Yuting Chen Ting Su Chengnian Sun Zhendong Su and Jianjun Zhao. 2016. Coverage-directed Diferential Testing of JVM Implementations. In PLDI.","DOI":"10.1145\/2908080.2908095"},{"key":"e_1_3_2_1_20_1","first-page":"99","volume-title":"Neural Nets Can Learn Function Type Signatures From Binaries. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Chua Zheng Leong","year":"2017","unstructured":"Zheng Leong Chua , Shiqi Shen , Prateek Saxena , and Zhenkai Liang . 2017 . Neural Nets Can Learn Function Type Signatures From Binaries. In 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association , 99 - 116 . Zheng Leong Chua, Shiqi Shen, Prateek Saxena, and Zhenkai Liang. 2017. Neural Nets Can Learn Function Type Signatures From Binaries. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, 99-116."},{"key":"e_1_3_2_1_21_1","volume-title":"Reverse compilation techniques","author":"Cifuentes Cristina","unstructured":"Cristina Cifuentes . 1994. Reverse compilation techniques . Queensland University of Technology , Brisbane . Cristina Cifuentes. 1994. Reverse compilation techniques. Queensland University of Technology, Brisbane."},{"key":"e_1_3_2_1_22_1","volume-title":"Inception: System-Wide Security Testing of Real-World Embedded Systems Software. In USENIX Sec.","author":"Corteggiani Nassim","year":"2018","unstructured":"Nassim Corteggiani , Giovanni Camurati , and Aur\u00e9lien Francillon . 2018 . Inception: System-Wide Security Testing of Real-World Embedded Systems Software. In USENIX Sec. Nassim Corteggiani, Giovanni Camurati, and Aur\u00e9lien Francillon. 2018. Inception: System-Wide Security Testing of Real-World Embedded Systems Software. In USENIX Sec."},{"key":"e_1_3_2_1_23_1","unstructured":"Al Danial. [n.d.]. CLOC. https:\/\/goo.gl\/3KFACB.  Al Danial. [n.d.]. CLOC. https:\/\/goo.gl\/3KFACB."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Sandeep Dasgupta Sushant Dinesh Deepan Venkatesh Vikram S Adve and Christopher W Fletcher. 2020. Scalable Validation for Binary Lifters.  Sandeep Dasgupta Sushant Dinesh Deepan Venkatesh Vikram S Adve and Christopher W Fletcher. 2020. Scalable Validation for Binary Lifters.","DOI":"10.1145\/3385412.3385964"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Yaniv David Nimrod Partush and Eran Yahav. 2018. FirmUp: Precise Static Detection of Common Vulnerabilities in Firmware. In ASPLOS.  Yaniv David Nimrod Partush and Eran Yahav. 2018. FirmUp: Precise Static Detection of Common Vulnerabilities in Firmware. In ASPLOS.","DOI":"10.1145\/3173162.3177157"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Yaniv David and Eran Yahav. 2014. Tracelet-based Code Search in Executables. In PLDI.  Yaniv David and Eran Yahav. 2014. Tracelet-based Code Search in Executables. In PLDI.","DOI":"10.1145\/2594291.2594343"},{"key":"e_1_3_2_1_27_1","volume-title":"BISTRO: Binary Component Extraction and Embedding for Software Security Applications.","author":"Deng Zhui","year":"2013","unstructured":"Zhui Deng , Xiangyu Zhang , and Dongyan Xu . 2013 . BISTRO: Binary Component Extraction and Embedding for Software Security Applications. Zhui Deng, Xiangyu Zhang, and Dongyan Xu. 2013. BISTRO: Binary Component Extraction and Embedding for Software Security Applications."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Alessandro Di Federico Pietro Fezzardi and Giovanni Agosta. 2018. rev.ng: A Multi-Architecture Framework for Reverse Engineering and Vulnerability Discovery. In ICCST.  Alessandro Di Federico Pietro Fezzardi and Giovanni Agosta. 2018. rev.ng: A Multi-Architecture Framework for Reverse Engineering and Vulnerability Discovery. In ICCST.","DOI":"10.1109\/CCST.2018.8585654"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Alessandro Di Federico Mathias Payer and Giovanni Agosta. 2017. Rev.Ng: A Unified Binary Analysis Framework to Recover CFGs and Function Boundaries. In CC.  Alessandro Di Federico Mathias Payer and Giovanni Agosta. 2017. Rev.Ng: A Unified Binary Analysis Framework to Recover CFGs and Function Boundaries. In CC.","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Khaled ElWazeer Kapil Anand Aparna Kotha Matthew Smithson and Rajeev Barua. 2013. Scalable Variable and Data Type Detection in a Binary Rewriter. In PLDI.  Khaled ElWazeer Kapil Anand Aparna Kotha Matthew Smithson and Rajeev Barua. 2013. Scalable Variable and Data Type Detection in a Binary Rewriter. In PLDI.","DOI":"10.1145\/2491956.2462165"},{"key":"e_1_3_2_1_31_1","volume-title":"Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. In NDSS.","author":"Erick Bauman","year":"2018","unstructured":"Bauman Erick , Lin Zhiqiang , and Hamlen Kevin W. 2018 . Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. In NDSS. Bauman Erick, Lin Zhiqiang, and Hamlen Kevin W. 2018. Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. In NDSS."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Ivan Gotovchits Rijnard van Tonder and David Brumley. 2018. Saluki: finding taint-style vulnerabilities with static property checking. In NDSS.  Ivan Gotovchits Rijnard van Tonder and David Brumley. 2018. Saluki: finding taint-style vulnerabilities with static property checking. In NDSS.","DOI":"10.14722\/bar.2018.23019"},{"key":"e_1_3_2_1_33_1","unstructured":"I. Guilfanov. 2001. A Simple Type System for Program Reengineering. In WCRE.  I. Guilfanov. 2001. A Simple Type System for Program Reengineering. In WCRE."},{"key":"e_1_3_2_1_34_1","unstructured":"SA Hex-Rays. 2014. IDA Pro: a cross-platform multi-processor disassembler and debugger.  SA Hex-Rays. 2014. IDA Pro: a cross-platform multi-processor disassembler and debugger."},{"key":"e_1_3_2_1_35_1","volume-title":"ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. In NDSS.","author":"Keliris Anastasis","year":"2019","unstructured":"Anastasis Keliris and Michail Maniatakos Yakdan . 2019 . ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. In NDSS. Anastasis Keliris and Michail Maniatakos Yakdan. 2019. ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. In NDSS."},{"key":"e_1_3_2_1_36_1","unstructured":"Soomin Kim Markus Faerevaag Minkyu Jung SeungIl Jung DongYeop Oh JongHyup Lee and Sang Kil Cha. 2017. Testing Intermediate Representations for Binary Analysis. In ASE.  Soomin Kim Markus Faerevaag Minkyu Jung SeungIl Jung DongYeop Oh JongHyup Lee and Sang Kil Cha. 2017. Testing Intermediate Representations for Binary Analysis. In ASE."},{"key":"e_1_3_2_1_37_1","volume-title":"Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu.","author":"Kim Taegyu","year":"2017","unstructured":"Taegyu Kim , Chung Hwan Kim , Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu. 2017 . RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. In ACSAC. Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu. 2017. RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. In ACSAC."},{"key":"e_1_3_2_1_38_1","volume-title":"Retdec: An open-source machine-code decompiler. ( 2017 ).","author":"K\u0159oustek Jakub","year":"2017","unstructured":"Jakub K\u0159oustek and Peter Matula . 2017 . Retdec: An open-source machine-code decompiler. ( 2017 ). Jakub K\u0159oustek and Peter Matula. 2017. Retdec: An open-source machine-code decompiler. ( 2017 )."},{"key":"e_1_3_2_1_39_1","unstructured":"Christopher Kruegel William Robertson Fredrik Valeur and Giovanni Vigna. 2004. Static Disassembly of Obfuscated Binaries. In USENIX Sec.  Christopher Kruegel William Robertson Fredrik Valeur and Giovanni Vigna. 2004. Static Disassembly of Obfuscated Binaries. In USENIX Sec."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Vu Le Mehrdad Afshari and Zhendong Su. 2014. Compiler Validation via Equivalence Modulo Inputs. In PLDI.  Vu Le Mehrdad Afshari and Zhendong Su. 2014. Compiler Validation via Equivalence Modulo Inputs. In PLDI.","DOI":"10.1145\/2594291.2594334"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Vu Le Chengnian Sun and Zhendong Su. 2015. Finding Deep Compiler Bugs via Guided Stochastic Program Mutation. In OOPSLA.  Vu Le Chengnian Sun and Zhendong Su. 2015. Finding Deep Compiler Bugs via Guided Stochastic Program Mutation. In OOPSLA.","DOI":"10.1145\/2814270.2814319"},{"key":"e_1_3_2_1_42_1","volume-title":"TIE: Principled Reverse Engineering of Types in Binary Programs. In NDSS.","author":"Lee JongHyup","year":"2011","unstructured":"JongHyup Lee , Thanassis Avgerinos , and David Brumley . 2011 . TIE: Principled Reverse Engineering of Types in Binary Programs. In NDSS. JongHyup Lee, Thanassis Avgerinos, and David Brumley. 2011. TIE: Principled Reverse Engineering of Types in Binary Programs. In NDSS."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151012"},{"key":"e_1_3_2_1_44_1","volume-title":"Giampaolo Fresi Roglia, and Danilo Bruschi","author":"Martignoni Lorenzo","year":"2010","unstructured":"Lorenzo Martignoni , Roberto Paleari , Giampaolo Fresi Roglia, and Danilo Bruschi . 2010 . Testing System Virtual Machines. In ISSTA. Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, and Danilo Bruschi. 2010. Testing System Virtual Machines. In ISSTA."},{"key":"e_1_3_2_1_45_1","volume-title":"Giampaolo Fresi Roglia, and Danilo Bruschi","author":"Martignoni Lorenzo","year":"2009","unstructured":"Lorenzo Martignoni , Roberto Paleari , Giampaolo Fresi Roglia, and Danilo Bruschi . 2009 . Testing CPU Emulators. In ISSTA. Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, and Danilo Bruschi. 2009. Testing CPU Emulators. In ISSTA."},{"key":"e_1_3_2_1_46_1","unstructured":"Microsoft. 2018. llvm-mctoll. https:\/\/github.com\/Microsoft\/llvm-mctoll.  Microsoft. 2018. llvm-mctoll. https:\/\/github.com\/Microsoft\/llvm-mctoll."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Kenneth Miller Yonghwi Kwon Yi Sun Zhuo Zhang Xiangyu Zhang and Zhiqiang Lin. 2019. Probabilistic Disassembly. In ICSE.  Kenneth Miller Yonghwi Kwon Yi Sun Zhuo Zhang Xiangyu Zhang and Zhiqiang Lin. 2019. Probabilistic Disassembly. In ICSE.","DOI":"10.1109\/ICSE.2019.00121"},{"key":"e_1_3_2_1_48_1","unstructured":"Lily Hay Newman. 2019. The NSA makes Ghidra a powerful cybersecurity tool open source. https:\/\/www.wired.com\/story\/nsa-ghidra-open-source-tool\/.  Lily Hay Newman. 2019. The NSA makes Ghidra a powerful cybersecurity tool open source. https:\/\/www.wired.com\/story\/nsa-ghidra-open-source-tool\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Matt Noonan Alexey Loginov and David Cok. 2016. Polymorphic Type Inference for Machine Code. In PLDI.  Matt Noonan Alexey Loginov and David Cok. 2016. Polymorphic Type Inference for Machine Code. In PLDI.","DOI":"10.1145\/2908080.2908119"},{"key":"e_1_3_2_1_50_1","unstructured":"National Security Agency (NSA). 2018. Ghidra. https:\/\/www.nsa.gov\/resources\/ everyone\/ghidra\/.  National Security Agency (NSA). 2018. Ghidra. https:\/\/www.nsa.gov\/resources\/ everyone\/ghidra\/."},{"key":"e_1_3_2_1_51_1","volume-title":"Giampaolo Fresi Roglia, and Danilo Bruschi","author":"Paleari Roberto","year":"2010","unstructured":"Roberto Paleari , Lorenzo Martignoni , Giampaolo Fresi Roglia, and Danilo Bruschi . 2010 . N-version Disassembly : Diferential Testing of x86 Disassemblers. In ISSTA. Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, and Danilo Bruschi. 2010. N-version Disassembly: Diferential Testing of x86 Disassemblers. In ISSTA."},{"key":"e_1_3_2_1_52_1","unstructured":"PNF. 2018. JEB Decompiler. https:\/\/www.pnfsoftware.com\/.  PNF. 2018. JEB Decompiler. https:\/\/www.pnfsoftware.com\/."},{"key":"e_1_3_2_1_53_1","unstructured":"PNF. 2018. Type Library. https:\/\/www.pnfsoftware.com\/blog\/native-types-andtypelibs-with-jeb\/.  PNF. 2018. Type Library. https:\/\/www.pnfsoftware.com\/blog\/native-types-andtypelibs-with-jeb\/."},{"key":"e_1_3_2_1_54_1","unstructured":"Thomas Reps and Gogul Balakrishnan. 2008. Improved Memory-Access Analysis for x86 Executables. In CC.  Thomas Reps and Gogul Balakrishnan. 2008. Improved Memory-Access Analysis for x86 Executables. In CC."},{"key":"e_1_3_2_1_55_1","unstructured":"rev.ng Srls. 2018. Rev.ng. https:\/\/rev.ng\/.  rev.ng Srls. 2018. Rev.ng. https:\/\/rev.ng\/."},{"key":"e_1_3_2_1_56_1","first-page":"426","article-title":"Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables (CCS '18)","author":"Schwartz Edward J.","year":"2018","unstructured":"Edward J. Schwartz , Cory F. Cohen , Michael Duggan , Jefrey Gennari , Jefrey S. Havrilla , and Charles Hines . 2018 . Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables (CCS '18) . Association for Computing Machinery , 426 - 441 . Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jefrey Gennari, Jefrey S. Havrilla, and Charles Hines. 2018. Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables (CCS '18). Association for Computing Machinery, 426-441.","journal-title":"Association for Computing Machinery"},{"key":"e_1_3_2_1_57_1","unstructured":"Hao Shi Abdulla Alwabel and Jelena Mirkovic. 2014. Cardinal Pill Testing of System Virtual Machines. In USENIX Sec.  Hao Shi Abdulla Alwabel and Jelena Mirkovic. 2014. Cardinal Pill Testing of System Virtual Machines. In USENIX Sec."},{"key":"e_1_3_2_1_58_1","unstructured":"Eui Chul Richard Shin Dawn Song and Reza Moazzezi. 2015. Recognizing Functions in Binaries with Neural Networks. In USENIX Sec.  Eui Chul Richard Shin Dawn Song and Reza Moazzezi. 2015. Recognizing Functions in Binaries with Neural Networks. In USENIX Sec."},{"key":"e_1_3_2_1_59_1","volume-title":"Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek Saxena.","author":"Song Dawn","year":"2008","unstructured":"Dawn Song , David Brumley , Heng Yin , Juan Caballero , Ivan Jager , Min Gyung Kang , Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek Saxena. 2008 . BitBlaze: A new approach to computer security via binary analysis. In Information systems security. Springer , 1-25. Dawn Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek Saxena. 2008. BitBlaze: A new approach to computer security via binary analysis. In Information systems security. Springer, 1-25."},{"key":"e_1_3_2_1_60_1","unstructured":"Chengnian Sun Vu Le and Zhendong Su. 2016. Finding Compiler Bugs via Live Code Mutation. In OOPSLA.  Chengnian Sun Vu Le and Zhendong Su. 2016. Finding Compiler Bugs via Live Code Mutation. In OOPSLA."},{"key":"e_1_3_2_1_61_1","volume-title":"REIL: A platform-independent intermediate representation of disassembled code for static code analysis. In CanSecWest.","author":"Thomas Dullien","year":"2009","unstructured":"Dullien Thomas and Sebastian Porst . 2009 . REIL: A platform-independent intermediate representation of disassembled code for static code analysis. In CanSecWest. Dullien Thomas and Sebastian Porst. 2009. REIL: A platform-independent intermediate representation of disassembled code for static code analysis. In CanSecWest."},{"key":"e_1_3_2_1_62_1","unstructured":"trailofbits. 2018. McSema. https:\/\/github.com\/trailofbits\/mcsema.  trailofbits. 2018. McSema. https:\/\/github.com\/trailofbits\/mcsema."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Pei Wang Qinkun Bao Li Wang Shuai Wang Zhaofeng Chen Tao Wei and Dinghao Wu. 2018. Software Protection on the Go: A Large-scale Empirical Study on Mobile App Obfuscation. In ICSE.  Pei Wang Qinkun Bao Li Wang Shuai Wang Zhaofeng Chen Tao Wei and Dinghao Wu. 2018. Software Protection on the Go: A Large-scale Empirical Study on Mobile App Obfuscation. In ICSE.","DOI":"10.1145\/3180155.3180169"},{"key":"e_1_3_2_1_64_1","volume-title":"Ramblr: Making Reassembly Great Again. In NDSS.","author":"Wang Ruoyu","year":"2017","unstructured":"Ruoyu Wang , Yan Shoshitaishvili , Antonio Bianchi , Aravind Machiry , John Grosen , Paul Grosen , Christopher Kruegel , and Giovanni Vigna . 2017 . Ramblr: Making Reassembly Great Again. In NDSS. Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, and Giovanni Vigna. 2017. Ramblr: Making Reassembly Great Again. In NDSS."},{"key":"e_1_3_2_1_65_1","unstructured":"Shuai Wang Pei Wang and Dinghao Wu. 2015. Reassembleable Disassembling. In USENIX Sec.  Shuai Wang Pei Wang and Dinghao Wu. 2015. Reassembleable Disassembling. In USENIX Sec."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.106"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Khaled Yakdan Sebastian Eschweiler Elmar Gerhards-Padilla and Matthew Smith. 2015. No More Gotos: Decompilation Using Pattern-Independent ControlFlow Structuring and Semantic-Preserving Transformations.. In NDSS.  Khaled Yakdan Sebastian Eschweiler Elmar Gerhards-Padilla and Matthew Smith. 2015. No More Gotos: Decompilation Using Pattern-Independent ControlFlow Structuring and Semantic-Preserving Transformations.. In NDSS.","DOI":"10.14722\/ndss.2015.23185"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Xuejun Yang Yang Chen Eric Eide and John Regehr. 2011. Finding and Understanding Bugs in C Compilers. In PLDI.  Xuejun Yang Yang Chen Eric Eide and John Regehr. 2011. Finding and Understanding Bugs in C Compilers. In PLDI.","DOI":"10.1145\/1993498.1993532"}],"event":{"name":"ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Event USA","acronym":"ISSTA '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397370","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395363.3397370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:44Z","timestamp":1750199924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397370"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":68,"alternative-id":["10.1145\/3395363.3397370","10.1145\/3395363"],"URL":"https:\/\/doi.org\/10.1145\/3395363.3397370","relation":{},"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"2020-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}