{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:43:27Z","timestamp":1775123007242,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,18]]},"DOI":"10.1145\/3395363.3397377","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:44:18Z","timestamp":1594676658000},"page":"401-414","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["An empirical study on ARM disassembly tools"],"prefix":"10.1145","author":[{"given":"Muhui","family":"Jiang","sequence":"first","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Ruoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Arizona State University, USA"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore \/ Zhejiang University, China"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android Open Source Project. https:\/\/source.android.com\/.  Android Open Source Project. https:\/\/source.android.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"ARM Mapping Symbols. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com. arm.doc.dui0474f\/CHDGFCDI.html.  ARM Mapping Symbols. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com. arm.doc.dui0474f\/CHDGFCDI.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Arm Mbed OS. https:\/\/www.mbed.com\/en\/.  Arm Mbed OS. https:\/\/www.mbed.com\/en\/."},{"key":"e_1_3_2_1_4_1","unstructured":"B BL BX BLX and BXJ. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com. arm.doc.dui0489c\/Cihfddaf.html.  B BL BX BLX and BXJ. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com. arm.doc.dui0489c\/Cihfddaf.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Binary Ninja : A New Kind Of Reversing Platform. https:\/\/binary.ninja\/.  Binary Ninja : A New Kind Of Reversing Platform. https:\/\/binary.ninja\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Buildroot : Making Embedded Linux Easy. https:\/\/buildroot.org.  Buildroot : Making Embedded Linux Easy. https:\/\/buildroot.org."},{"key":"e_1_3_2_1_7_1","unstructured":"Capstone: The Ultimate Disassembly. http:\/\/www.capstone-engine.org\/.  Capstone: The Ultimate Disassembly. http:\/\/www.capstone-engine.org\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Clang : Documentation. https:\/\/clang.llvm.org\/docs\/CommandGuide\/clang.html.  Clang : Documentation. https:\/\/clang.llvm.org\/docs\/CommandGuide\/clang.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Debian Popularity Contest. https:\/\/popcon.debian.org\/by_inst.  Debian Popularity Contest. https:\/\/popcon.debian.org\/by_inst."},{"key":"e_1_3_2_1_10_1","unstructured":"GCC\n  : Options That Control Optimization. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/ Optimize-Options.html.  GCC: Options That Control Optimization. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/ Optimize-Options.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Ghidra : A Software Reverse Engineering(SRE) Suite of Tools Developed by NSA. https:\/\/ghidra-sre.org\/.  Ghidra : A Software Reverse Engineering(SRE) Suite of Tools Developed by NSA. https:\/\/ghidra-sre.org\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Hopper Disassembler. https:\/\/www.hopperapp.com\/.  Hopper Disassembler. https:\/\/www.hopperapp.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/.  IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Issues submitted to BAP. https:\/\/github.com\/BinaryAnalysisPlatform\/bap\/issues\/ 951.  Issues submitted to BAP. https:\/\/github.com\/BinaryAnalysisPlatform\/bap\/issues\/ 951."},{"key":"e_1_3_2_1_15_1","unstructured":"Issues submitted to Binary Ninja. https:\/\/github.com\/Vector35\/binaryninja-api\/ issues\/1359.  Issues submitted to Binary Ninja. https:\/\/github.com\/Vector35\/binaryninja-api\/ issues\/1359."},{"key":"e_1_3_2_1_16_1","unstructured":"Issues submitted to Ghidra. https:\/\/github.com\/NationalSecurityAgency\/ghidra\/ issues\/657.  Issues submitted to Ghidra. https:\/\/github.com\/NationalSecurityAgency\/ghidra\/ issues\/657."},{"key":"e_1_3_2_1_17_1","unstructured":"Issues submitted to Radare2. https:\/\/github.com\/radareorg\/radare2\/issues\/14223.  Issues submitted to Radare2. https:\/\/github.com\/radareorg\/radare2\/issues\/14223."},{"key":"e_1_3_2_1_18_1","unstructured":"Objdump-Display Information from Object Files. https:\/\/linux.die.net\/man\/1\/ objdump.  Objdump-Display Information from Object Files. https:\/\/linux.die.net\/man\/1\/ objdump."},{"key":"e_1_3_2_1_19_1","unstructured":"OpenWRT. https:\/\/openwrt.org\/.  OpenWRT. https:\/\/openwrt.org\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Paradyn Project. Dyninst: Putting the Performance in High Performance Computing. https:\/\/www.dyninst.org\/.  Paradyn Project. Dyninst: Putting the Performance in High Performance Computing. https:\/\/www.dyninst.org\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Psutil. https:\/\/psutil.readthedocs.io.  Psutil. https:\/\/psutil.readthedocs.io."},{"key":"e_1_3_2_1_22_1","unstructured":"Radare2. https:\/\/rada.re\/r\/.  Radare2. https:\/\/rada.re\/r\/."},{"key":"e_1_3_2_1_23_1","unstructured":"The FreeRTOS Kernel. https:\/\/www.freertos.org\/.  The FreeRTOS Kernel. https:\/\/www.freertos.org\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 25th USENIX Security Symposium.","author":"Andriesse Dennis","unstructured":"Dennis Andriesse , Xi Chen , Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-depth Analysis of Disassembly on Full-scale x86\/x64 Binaries . In Proceedings of the 25th USENIX Security Symposium. Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-depth Analysis of Disassembly on Full-scale x86\/x64 Binaries. In Proceedings of the 25th USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 23th USENIX Conference on Security Symposium.","author":"Bao Tifany","year":"2014","unstructured":"Tifany Bao , Johnathon Burket , Maverick Woo , Rafael Turner , and David Brumley . 2014 . Byteweight: Learning to Recognize Functions in Binary Code . In Proceedings of the 23th USENIX Conference on Security Symposium. Tifany Bao, Johnathon Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. Byteweight: Learning to Recognize Functions in Binary Code. In Proceedings of the 23th USENIX Conference on Security Symposium."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23300"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968455.2968505"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 23rd International Conference on Computer Aided Verification.","author":"Brumley David","unstructured":"David Brumley , Ivan Jager , Thanassis Avgerinos , and Edward J. Schwartz . 2011. BAP: A Binary Analysis Platform . In Proceedings of the 23rd International Conference on Computer Aided Verification. David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J. Schwartz. 2011. BAP: A Binary Analysis Platform. In Proceedings of the 23rd International Conference on Computer Aided Verification."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(01)00014-4"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium.","author":"Costin Andrei","year":"2014","unstructured":"Andrei Costin , Jonas Zaddach , Aurelien Francillon , and Davide Balzarotti . 2014 . A Large-Scale Analysis of the Security of Embedded Firmwares . In Proceedings of the 23rd USENIX Security Symposium. Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti. 2014. A Large-Scale Analysis of the Security of Embedded Firmwares. In Proceedings of the 23rd USENIX Security Symposium."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897900"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177157"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 2nd IEEE European Symposium on Security and Privacy.","author":"Dennis Andriesse","year":"2017","unstructured":"Andriesse Dennis , Asia Slowinska , and Bos Herbert . 2017 . Compiler-Agnostic Function Detection in Binaries . In Proceedings of the 2nd IEEE European Symposium on Security and Privacy. Andriesse Dennis, Asia Slowinska, and Bos Herbert. 2017. Compiler-Agnostic Function Detection in Binaries. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy."},{"key":"e_1_3_2_1_37_1","unstructured":"Michael J. Eager. Introduction to the DWARF Debugging Format. http:\/\/www. dwarfstd.org\/doc\/DebuggingusingDWARF-2012.pdf.  Michael J. Eager. Introduction to the DWARF Debugging Format. http:\/\/www. dwarfstd.org\/doc\/DebuggingusingDWARF-2012.pdf."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 29th USENIX Security Symposium.","author":"Feng Bo","year":"2020","unstructured":"Bo Feng , Alejandro Mera , and Long Lu . 2020 . P2IM: Scalable and Hardwareindependent Firmware Testing via Automatic Peripheral Interface Modeling . In Proceedings of the 29th USENIX Security Symposium. Bo Feng, Alejandro Mera, and Long Lu. 2020. P2IM: Scalable and Hardwareindependent Firmware Testing via Automatic Peripheral Interface Modeling. In Proceedings of the 29th USENIX Security Symposium."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134050"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024569.2024571"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 23rd Advances in Neural Information Processing Systems.","author":"Karampatziakis Nikos","year":"2010","unstructured":"Nikos Karampatziakis . 2010 . Static Analysis of Binary Executables Using Structural SVMs . In Proceedings of the 23rd Advances in Neural Information Processing Systems. Nikos Karampatziakis. 2010. Static Analysis of Binary Executables Using Structural SVMs. In Proceedings of the 23rd Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251393"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 12th USENIX Security Symposium.","author":"Kruegel Christopher","year":"2004","unstructured":"Christopher Kruegel , William Robertson , Fredrik Valeur , and Giovanni Vigna . 2004 . Static disassembly of obfuscated binaries . In Proceedings of the 12th USENIX Security Symposium. Christopher Kruegel, William Robertson, Fredrik Valeur, and Giovanni Vigna. 2004. Static disassembly of obfuscated binaries. In Proceedings of the 12th USENIX Security Symposium."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering.","author":"Mahinthan Chandramohan","year":"2016","unstructured":"Chandramohan Mahinthan , Xue Yinxing , Xu Zhengzi , Liu Yang , Cho Chia Yuan , and Tan Hee Beng Kuan . 2016 . Bingo: Cross-architecture cross-os binary search . In Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. Chandramohan Mahinthan, Xue Yinxing, Xu Zhengzi, Liu Yang, Cho Chia Yuan, and Tan Hee Beng Kuan. 2016. Bingo: Cross-architecture cross-os binary search. In Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00121"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_8"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the USENIX Annual Technical Conference.","author":"Prasad Manish","year":"2003","unstructured":"Manish Prasad and Tzi-cker Chiueh. 2003 . A Binary Rewriting Defense Against Stack based Bufer Overflow Attacks .. In Proceedings of the USENIX Annual Technical Conference. Manish Prasad and Tzi-cker Chiueh. 2003. A Binary Rewriting Defense Against Stack based Bufer Overflow Attacks.. In Proceedings of the USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.29"},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the 23rd AAAI Conference on Artificial Intelligence.","author":"Rosenblum Nathan E","year":"2008","unstructured":"Nathan E Rosenblum , Xiaojin Zhu , Barton P Miller , and Karen Hunt . 2008 . Learning to Analyze Binary Computer Code .. In Proceedings of the 23rd AAAI Conference on Artificial Intelligence. Nathan E Rosenblum, Xiaojin Zhu, Barton P Miller, and Karen Hunt. 2008. Learning to Analyze Binary Computer Code.. In Proceedings of the 23rd AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173063"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium.","author":"Richard Shin Eui Chul","year":"2015","unstructured":"Eui Chul Richard Shin , Dawn Song , and Reza Moazzezi . 2015 . Recognizing Functions in Binaries with Neural Networks .. In Proceedings of the 24th USENIX Conference on Security Symposium. Eui Chul Richard Shin, Dawn Song, and Reza Moazzezi. 2015. Recognizing Functions in Binaries with Neural Networks.. In Proceedings of the 24th USENIX Conference on Security Symposium."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 27th USENIX Security Symposium.","author":"Soltan Saleh","unstructured":"Saleh Soltan , Prateek Mittal , and H. Vincent Poor . 2018. BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid . In Proceedings of the 27th USENIX Security Symposium. Saleh Soltan, Prateek Mittal, and H. Vincent Poor. 2018. BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid. In Proceedings of the 27th USENIX Security Symposium."},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 37th Annual Computer Security Applications Conference.","author":"Taegyu Kim","year":"2017","unstructured":"Kim Taegyu , Chung Hwan Kim , Choi Hongjun , Yonghwi Kwon , Brendan Saltaformaggio , Xiangyu Zhang , and Dongyan Xu less. 2017 . RevARM: A PlatformAgnostic ARM Binary Rewriter for Security Applications . In Proceedings of the 37th Annual Computer Security Applications Conference. Kim Taegyu, Chung Hwan Kim, Choi Hongjun, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu less. 2017. RevARM: A PlatformAgnostic ARM Binary Rewriter for Security Applications. In Proceedings of the 37th Annual Computer Security Applications Conference."},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the 37th IEEE Symposium on Security and Privacy.","author":"Victor Veen","year":"2016","unstructured":"Veen Victor , Goktas Enes , Contag Moritz , Pawlowski Andre , Chen Xi , Rawat Sanjay , Bos Herbert , Holz Thorsten , Athanasopoulos Elias , and Giufrida Cristiano . 2016 . A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level . In Proceedings of the 37th IEEE Symposium on Security and Privacy. Veen Victor, Goktas Enes, Contag Moritz, Pawlowski Andre, Chen Xi, Rawat Sanjay, Bos Herbert, Holz Thorsten, Athanasopoulos Elias, and Giufrida Cristiano. 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. In Proceedings of the 37th IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23225"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_63_1","article-title":"Accurate and scalable cross-architecture cross-os binary code search with emulation","volume":"45","author":"Yinxing Xue","year":"2018","unstructured":"Xue Yinxing , Xu Zhengzi , Chandramohan Mahinthan , and Liu Yang . 2018 . Accurate and scalable cross-architecture cross-os binary code search with emulation . IEEE Transactions on Software Engineering 45 , 11 ( 2018 ), 1125-1149. Xue Yinxing, Xu Zhengzi, Chandramohan Mahinthan, and Liu Yang. 2018. Accurate and scalable cross-architecture cross-os binary code search with emulation. IEEE Transactions on Software Engineering 45, 11 ( 2018 ), 1125-1149.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the 34th IEEE Symposium on Security and Privacy. IEEE.","author":"Zhang Chao","year":"2013","unstructured":"Chao Zhang , Tao Wei , Zhaofeng Chen , Lei Duan , Laszlo Szekeres , Stephen McCamant , Dawn Song , and Wei Zou . 2013 . Practical Control Flow Integrity and Randomization for Binary Executables . In Proceedings of the 34th IEEE Symposium on Security and Privacy. IEEE. Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. 2013. Practical Control Flow Integrity and Randomization for Binary Executables. In Proceedings of the 34th IEEE Symposium on Security and Privacy. IEEE."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium.","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R Sekar . 2013 . Control Flow Integrity for COTS Binaries . In Proceedings of the 22nd USENIX Security Symposium. Mingwei Zhang and R Sekar. 2013. Control Flow Integrity for COTS Binaries. In Proceedings of the 22nd USENIX Security Symposium."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818016"},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the 39th International Conference on Software Engineering.","author":"Zhengzi Xu","year":"2017","unstructured":"Xu Zhengzi , Chen Bihuan , Chandramohan Mahinthan , Liu Yang , and Song Fu . 2017 . Spain: security patch analysis for binaries towards understanding the pain and pills . In Proceedings of the 39th International Conference on Software Engineering. Xu Zhengzi, Chen Bihuan, Chandramohan Mahinthan, Liu Yang, and Song Fu. 2017. Spain: security patch analysis for binaries towards understanding the pain and pills. In Proceedings of the 39th International Conference on Software Engineering."}],"event":{"name":"ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Event USA","acronym":"ISSTA '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397377","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395363.3397377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:45Z","timestamp":1750199925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":69,"alternative-id":["10.1145\/3395363.3397377","10.1145\/3395363"],"URL":"https:\/\/doi.org\/10.1145\/3395363.3397377","relation":{},"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"2020-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}