{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:41Z","timestamp":1750220561445,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,28]]},"DOI":"10.1145\/3469213.3471355","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T04:06:20Z","timestamp":1629345980000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability Sample Analysis Based on Reverse Debugging"],"prefix":"10.1145","author":[{"given":"Xu","family":"Jianbo","sequence":"first","affiliation":[{"name":"Information Engineering University, China"}]},{"given":"Kang","family":"Fei","sequence":"additional","affiliation":[{"name":"Information Engineering University, China"}]},{"given":"Yang","family":"Ju","sequence":"additional","affiliation":[{"name":"Information Engineering University, China"}]},{"given":"Bu","family":"Wenjuan","sequence":"additional","affiliation":[{"name":"Information Engineering University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Automatic polymorphic exploit generation for software vulnerabilities[C]\/\/International Conference on Security and Privacy in Communication Systems","author":"Wang M","year":"2013","unstructured":"Wang M , Su P , Li Q , Automatic polymorphic exploit generation for software vulnerabilities[C]\/\/International Conference on Security and Privacy in Communication Systems . Springer , Cham , 2013 : 216-233. Wang M, Su P, Li Q, Automatic polymorphic exploit generation for software vulnerabilities[C]\/\/International Conference on Security and Privacy in Communication Systems. Springer, Cham, 2013: 216-233."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2299198"},{"key":"e_1_3_2_1_3_1","volume-title":"Your exploit is mine: Automatic shellcode transplant for remote exploits[C]\/\/2017 IEEE Symposium on Security and Privacy (SP)","author":"Bao T","year":"2017","unstructured":"Bao T , Wang R , Shoshitaishvili Y , Your exploit is mine: Automatic shellcode transplant for remote exploits[C]\/\/2017 IEEE Symposium on Security and Privacy (SP) . IEEE , 2017 : 824-839. Bao T, Wang R, Shoshitaishvili Y, Your exploit is mine: Automatic shellcode transplant for remote exploits[C]\/\/2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017: 824-839."},{"issue":"9","key":"e_1_3_2_1_4_1","first-page":"327","article-title":"Automatic exploit generation for buffer overflow based on symbolice execution[J]","volume":"36","author":"Li C","year":"2019","unstructured":"Li C , Hu J W , Cui Y P , Automatic exploit generation for buffer overflow based on symbolice execution[J] . Computer Applications and Software , 2019 , 36 ( 9 ): 327 - 333 . Li C, Hu J W, Cui Y P, Automatic exploit generation for buffer overflow based on symbolice execution[J]. Computer Applications and Software, 2019, 36(9):327-333.","journal-title":"Computer Applications and Software"},{"key":"e_1_3_2_1_5_1","volume-title":"Research and implementation of 0Day vulnerability detection technology in document types[D]","author":"Bai P.","year":"2015","unstructured":"Bai P. Research and implementation of 0Day vulnerability detection technology in document types[D] . Beijing University of Posts and Telecommunications , 2015 . Bai P. Research and implementation of 0Day vulnerability detection technology in document types[D]. Beijing University of Posts and Telecommunications, 2015."},{"key":"e_1_3_2_1_6_1","volume-title":"Encryption and decryption[M]","author":"Duan G.","year":"2018","unstructured":"Duan G. Encryption and decryption[M] . Publishing House of Electronics Industry , 2018 : 572-579. Duan G. Encryption and decryption[M]. Publishing House of Electronics Industry, 2018:572-579."},{"key":"e_1_3_2_1_7_1","unstructured":"DynamoRIO. The DynamoRIO API[EB\/OL]. [2020-08-26]. https:\/\/dynamorio.org\/dynamorio_docs\/.  DynamoRIO. The DynamoRIO API[EB\/OL]. [2020-08-26]. https:\/\/dynamorio.org\/dynamorio_docs\/."},{"volume-title":"SoC and Silicon Debug Conference. IEEE","author":"Engblom J.","key":"e_1_3_2_1_8_1","unstructured":"Engblom J. A review of reverse debugging[C]\/\/ Proceedings of the 2012 System, Software , SoC and Silicon Debug Conference. IEEE , 2012: 1-6. Engblom J. A review of reverse debugging[C]\/\/ Proceedings of the 2012 System, Software, SoC and Silicon Debug Conference. IEEE, 2012: 1-6."},{"key":"e_1_3_2_1_9_1","unstructured":"Process-Record-and-Replay. [EB\/OL]. [2020-8-20]. https:\/\/sourceware.org\/gdb\/onlinedocs\/gdb\/Process-Record-and-Replay.html.  Process-Record-and-Replay. [EB\/OL]. [2020-8-20]. https:\/\/sourceware.org\/gdb\/onlinedocs\/gdb\/Process-Record-and-Replay.html."},{"key":"e_1_3_2_1_10_1","volume-title":"A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs[J]. arXiv preprint arXiv:1309.5152","author":"Yi J.","year":"2013","unstructured":"Yi J. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs[J]. arXiv preprint arXiv:1309.5152 , 2013 . Yi J. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs[J]. arXiv preprint arXiv:1309.5152, 2013."},{"key":"e_1_3_2_1_11_1","unstructured":"Xu J Mu D Xing X Postmortem program analysis with hardware-enhanced post-crash artifacts[C]\/\/26th {USENIX} Security Symposium ({USENIX} Security 17). 2017: 17-32.  Xu J Mu D Xing X Postmortem program analysis with hardware-enhanced post-crash artifacts[C]\/\/26th {USENIX} Security Symposium ({USENIX} Security 17). 2017: 17-32."},{"key":"e_1_3_2_1_12_1","unstructured":"Cui W Ge X Kasikci B {REPT}: Reverse Debugging of Failures in Deployed Software[C]\/\/13th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). 2018: 17-32.  Cui W Ge X Kasikci B {REPT}: Reverse Debugging of Failures in Deployed Software[C]\/\/13th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). 2018: 17-32."},{"key":"e_1_3_2_1_13_1","unstructured":"Intel. Processor Tracing[EB\/OL]. (2013-09-18)[2021-02-28]. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/processor-tracing.htm.  Intel. Processor Tracing[EB\/OL]. (2013-09-18)[2021-02-28]. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/processor-tracing.htm."}],"event":{"name":"ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems","acronym":"ICAIIS 2021","location":"Chongqing China"},"container-title":["2021 2nd International Conference on Artificial Intelligence and Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3469213.3471355","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3469213.3471355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:32Z","timestamp":1750195712000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3469213.3471355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,28]]},"references-count":13,"alternative-id":["10.1145\/3469213.3471355","10.1145\/3469213"],"URL":"https:\/\/doi.org\/10.1145\/3469213.3471355","relation":{},"subject":[],"published":{"date-parts":[[2021,5,28]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}