{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:55:34Z","timestamp":1774374934013,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100004316","name":"International Business Machines Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004316","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3429880.3430098","type":"proceedings-article","created":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T14:39:33Z","timestamp":1609771173000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["ACE"],"prefix":"10.1145","author":[{"given":"Anthony","family":"Byrne","sequence":"first","affiliation":[{"name":"Boston University"}]},{"given":"Shripad","family":"Nadgowda","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}]},{"given":"Ayse K.","family":"Coskun","sequence":"additional","affiliation":[{"name":"Boston University"}]}],"member":"320","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.11"},{"key":"e_1_3_2_1_2_1","unstructured":"M. S. Day and C. A. Jennings. 2018. 22 Thompson's Hack. 263--272. https:\/\/ieeexplore.ieee.org\/abstract\/document\/8555305  M. S. Day and C. A. Jennings. 2018. 22 Thompson's Hack. 263--272. https:\/\/ieeexplore.ieee.org\/abstract\/document\/8555305"},{"key":"e_1_3_2_1_3_1","unstructured":"Debian Project. 2019. Binaries. https:\/\/perma.cc\/22DT-ZDZV  Debian Project. 2019. Binaries. https:\/\/perma.cc\/22DT-ZDZV"},{"key":"e_1_3_2_1_4_1","unstructured":"DWARF Committee. 2017. The DWARF Standard. http:\/\/dwarfstd.org  DWARF Committee. 2017. The DWARF Standard. http:\/\/dwarfstd.org"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of the 23rd USENIX Sec. Symposium. 303--307","author":"Egele Manuel","year":"2014","unstructured":"Manuel Egele , Maverick Woo , Peter Chapman , and David Brumley . 2014 . Blanket execution: Dynamic similarity testing for program binaries and components . In Proc. of the 23rd USENIX Sec. Symposium. 303--307 . Manuel Egele, Maverick Woo, Peter Chapman, and David Brumley. 2014. Blanket execution: Dynamic similarity testing for program binaries and components. In Proc. of the 23rd USENIX Sec. Symposium. 303--307."},{"key":"e_1_3_2_1_6_1","unstructured":"Free Software Foundation. 2020. Freqently Asked Questions about the GNU Licenses. https:\/\/www.gnu.org\/licenses\/gpl-faq.html  Free Software Foundation. 2020. Freqently Asked Questions about the GNU Licenses. https:\/\/www.gnu.org\/licenses\/gpl-faq.html"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304013"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127577.1127590"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243866"},{"key":"e_1_3_2_1_10_1","unstructured":"Hex-Rays SA. 2020. IDA F.L.I.R.T. https:\/\/perma.cc\/JVC8-E3A9  Hex-Rays SA. 2020. IDA F.L.I.R.T. https:\/\/perma.cc\/JVC8-E3A9"},{"key":"e_1_3_2_1_11_1","unstructured":"Thomas Hofer. 2010. Evaluating Static Source Code Analysis Tools. (2010). http:\/\/infoscience.epfl.ch\/record\/153107  Thomas Hofer. 2010. Evaluating Static Source Code Analysis Tools. (2010). http:\/\/infoscience.epfl.ch\/record\/153107"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024569.2024571"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(18)30005-9"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(18)30032-1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9"},{"key":"e_1_3_2_1_16_1","volume-title":"RECap: Run-Escape Capsule for On-demand Managed Service Delivery in the Cloud. In 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18)","author":"Nadgowda Shripad","year":"2018","unstructured":"Shripad Nadgowda , Sahil Suneja , and Canturk Isci . 2018 . RECap: Run-Escape Capsule for On-demand Managed Service Delivery in the Cloud. In 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18) . USENIX Association, Boston, MA, USA. Shripad Nadgowda, Sahil Suneja, and Canturk Isci. 2018. RECap: Run-Escape Capsule for On-demand Managed Service Delivery in the Cloud. In 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18). USENIX Association, Boston, MA, USA."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 24th USENIX Security Symposium. USENIX Association, Washington, D.C., 611--626","author":"Shin E. C. R.","unstructured":"E. C. R. Shin , D. Song , and R. Moazzezi . 2015. Recognizing Functions in Binaries with Neural Networks . In Proceedings of the 24th USENIX Security Symposium. USENIX Association, Washington, D.C., 611--626 . E. C. R. Shin, D. Song, and R. Moazzezi. 2015. Recognizing Functions in Binaries with Neural Networks. In Proceedings of the 24th USENIX Security Symposium. USENIX Association, Washington, D.C., 611--626."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"e_1_3_2_1_21_1","unstructured":"Zynamics. 2011. REIL. https:\/\/perma.cc\/LW4F-ZSYW  Zynamics. 2011. REIL. https:\/\/perma.cc\/LW4F-ZSYW"}],"event":{"name":"Middleware '20: 21st International Middleware Conference","location":"Delft Netherlands","acronym":"Middleware '20","sponsor":["ACM Association for Computing Machinery","IFIP"]},"container-title":["Proceedings of the 2020 Sixth International Workshop on Serverless Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429880.3430098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3429880.3430098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:45Z","timestamp":1750195905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429880.3430098"}},"subtitle":["Just-in-time Serverless Software Component Discovery Through Approximate Concrete Execution"],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":21,"alternative-id":["10.1145\/3429880.3430098","10.1145\/3429880"],"URL":"https:\/\/doi.org\/10.1145\/3429880.3430098","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2021-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}