{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:07:15Z","timestamp":1765544835137,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471851","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"148-161","source":"Crossref","is-referenced-by-count":5,"title":["DisCo: Combining Disassemblers for Improved Performance"],"prefix":"10.1145","author":[{"given":"Sri","family":"Shaila","sequence":"first","affiliation":[{"name":"University of California, Riverside, US"}]},{"given":"Ahmad","family":"Darki","sequence":"additional","affiliation":[{"name":"University of California Riverside, US"}]},{"given":"Michalis","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"University of California Riverside, US"}]},{"given":"Nael","family":"Abu-Ghazaleh","sequence":"additional","affiliation":[{"name":"University of California, Riverside, US"}]},{"given":"Manu","family":"Sridharan","sequence":"additional","affiliation":[{"name":"University of California, Riverside, US"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2019.2954667"},{"key":"e_1_3_2_1_2_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Andriesse Dennis","year":"2016","unstructured":"Dennis Andriesse , Xi Chen , Victor van\u00a0der Veen , Asia Slowinska , and Herbert Bos . 2016 . An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 583\u2013600. Dennis Andriesse, Xi Chen, Victor van\u00a0der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 583\u2013600."},{"key":"e_1_3_2_1_3_1","volume-title":"Compiler-Agnostic Function Detection in Binaries. In 2017 IEEE European Symposium on Security and Privacy (EuroS P). 177\u2013189","author":"Andriesse D.","year":"2017","unstructured":"D. Andriesse , A. Slowinska , and H. Bos . 2017 . Compiler-Agnostic Function Detection in Binaries. In 2017 IEEE European Symposium on Security and Privacy (EuroS P). 177\u2013189 . https:\/\/doi.org\/10.1109\/EuroSP. 2017 .11 D. Andriesse, A. Slowinska, and H. Bos. 2017. Compiler-Agnostic Function Detection in Binaries. In 2017 IEEE European Symposium on Security and Privacy (EuroS P). 177\u2013189. https:\/\/doi.org\/10.1109\/EuroSP.2017.11"},{"key":"e_1_3_2_1_4_1","unstructured":"Anna-senpai. 2016. [FREE] world\u2019s largest net:Mirai botnet client echo loader CNC source code release. https:\/\/hackforums.net\/showthread.php?tid=5420472.(2016).  Anna-senpai. 2016. [FREE] world\u2019s largest net:Mirai botnet client echo loader CNC source code release. https:\/\/hackforums.net\/showthread.php?tid=5420472.(2016)."},{"key":"e_1_3_2_1_5_1","volume-title":"Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis , Tim April , Michael Bailey , Matt Bernhard , Elie Bursztein , Jaime Cochran , Zakir Durumeric , J.\u00a0 Alex Halderman , Luca Invernizzi , Michalis Kallitsis , Deepak Kumar , Chaz Lever , Zane Ma , Joshua Mason , Damian Menscher , Chad Seaman , Nick Sullivan , Kurt Thomas , and Yi Zhou . 2017 . Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J.\u00a0Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association."},{"key":"e_1_3_2_1_6_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Bao Tiffany","year":"2014","unstructured":"Tiffany Bao , Jonathan Burket , Maverick Woo , Rafael Turner , and David Brumley . 2014 . BYTEWEIGHT: Learning to Recognize Functions in Binary Code . In 23rd USENIX Security Symposium (USENIX Security 14) . USENIX Association, San Diego, CA, 845\u2013860. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/bao Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. BYTEWEIGHT: Learning to Recognize Functions in Binary Code. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 845\u2013860. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/bao"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23300"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968455.2968505"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2004.04.004"},{"key":"e_1_3_2_1_10_1","first-page":"463","article-title":"BAP: A binary analysis platform","volume":"6806","author":"Brumley David","year":"2011","unstructured":"David Brumley , Ivan Jager , Thanassis Avgerinos , and Edward Schwartz . 2011 . BAP: A binary analysis platform . LNCS 6806 , 463 \u2013 469 . https:\/\/doi.org\/10.1007\/978-3-642-22110-1_37 David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward Schwartz. 2011. BAP: A binary analysis platform. LNCS 6806, 463\u2013469. https:\/\/doi.org\/10.1007\/978-3-642-22110-1_37","journal-title":"LNCS"},{"key":"e_1_3_2_1_11_1","unstructured":"Avast Carly\u00a0Burdova. December 8 2020. What Is EternalBlue and Why Is the MS17-010 Exploit Still Relevant?https:\/\/www.avast.com\/c-eternalblue(December 8 2020).  Avast Carly\u00a0Burdova. December 8 2020. What Is EternalBlue and Why Is the MS17-010 Exploit Still Relevant?https:\/\/www.avast.com\/c-eternalblue(December 8 2020)."},{"key":"e_1_3_2_1_12_1","volume-title":"BinGo: Cross-Architecture Cross-OS Binary Search(FSE","author":"Chandramohan Mahinthan","year":"2016","unstructured":"Mahinthan Chandramohan , Yinxing Xue , Zhengzi Xu , Yang Liu , Chia\u00a0Yuan Cho , and Hee Beng\u00a0Kuan Tan . 2016. BinGo: Cross-Architecture Cross-OS Binary Search(FSE 2016 ). Association for Computing Machinery , New York, NY, USA , 678\u2013689. https:\/\/doi.org\/10.1145\/2950290.2950350 Mahinthan Chandramohan, Yinxing Xue, Zhengzi Xu, Yang Liu, Chia\u00a0Yuan Cho, and Hee Beng\u00a0Kuan Tan. 2016. BinGo: Cross-Architecture Cross-OS Binary Search(FSE 2016). Association for Computing Machinery, New York, NY, USA, 678\u2013689. https:\/\/doi.org\/10.1145\/2950290.2950350"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018896.3018898"},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Security Symposium.","author":"Costin Andrei","year":"2014","unstructured":"Andrei Costin , Jonas Zaddach , Aur\u00e9lien Francillon , and Davide Balzarotti . 2014 . A Large-Scale Analysis of the Security of Embedded Firmwares .. In USENIX Security Symposium. Andrei Costin, Jonas Zaddach, Aur\u00e9lien Francillon, and Davide Balzarotti. 2014. A Large-Scale Analysis of the Security of Embedded Firmwares.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_15_1","volume-title":"The Tangled Genealogy of IoT Malware. In Annual Computer Security Applications Conference","author":"Cozzi Emanuele","year":"2020","unstructured":"Emanuele Cozzi , Pierre-Antoine Vervier , Matteo Dell\u2019Amico , Yun Shen , Leyla Bilge , and Davide Balzarotti . 2020 . The Tangled Genealogy of IoT Malware. In Annual Computer Security Applications Conference ( Austin, USA) (ACSAC \u201920). Association for Computing Machinery, New York, NY, USA, 1\u201316. https:\/\/doi.org\/10.1145\/3427228.3427256 Emanuele Cozzi, Pierre-Antoine Vervier, Matteo Dell\u2019Amico, Yun Shen, Leyla Bilge, and Davide Balzarotti. 2020. The Tangled Genealogy of IoT Malware. In Annual Computer Security Applications Conference(Austin, USA) (ACSAC \u201920). Association for Computing Machinery, New York, NY, USA, 1\u201316. https:\/\/doi.org\/10.1145\/3427228.3427256"},{"key":"e_1_3_2_1_16_1","volume-title":"RARE: A Systematic Augmented Router Emulation for Malware Analysis. In International Conference on Passive and Active Network Measurement. Springer, 60\u201372","author":"Darki Ahmad","year":"2018","unstructured":"Ahmad Darki , Chun-Yu Chuang , Michalis Faloutsos , Zhiyun Qian , and Heng Yin . 2018 . RARE: A Systematic Augmented Router Emulation for Malware Analysis. In International Conference on Passive and Active Network Measurement. Springer, 60\u201372 . Ahmad Darki, Chun-Yu Chuang, Michalis Faloutsos, Zhiyun Qian, and Heng Yin. 2018. RARE: A Systematic Augmented Router Emulation for Malware Analysis. In International Conference on Passive and Active Network Measurement. Springer, 60\u201372."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431317"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062387"},{"key":"e_1_3_2_1_19_1","unstructured":"Code de\u00a0la Propri\u00e9t\u00e9\u00a0Intellectuelle. 2012. HopperV4. https:\/\/www.hopperapp.com\/(2012).  Code de\u00a0la Propri\u00e9t\u00e9\u00a0Intellectuelle. 2012. HopperV4. https:\/\/www.hopperapp.com\/(2012)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Alessandro Federico Mathias Payer and Giovanni Agosta. 2017. rev.ng: a unified binary analysis framework to recover CFGs and function boundaries. 131\u2013141. https:\/\/doi.org\/10.1145\/3033019.3033028  Alessandro Federico Mathias Payer and Giovanni Agosta. 2017. rev.ng: a unified binary analysis framework to recover CFGs and function boundaries. 131\u2013141. https:\/\/doi.org\/10.1145\/3033019.3033028","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_21_1","volume-title":"12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19)","author":"Sri\u00a0Shaila","year":"2019","unstructured":"Sri\u00a0Shaila G, Ahmad Darki , Michalis Faloutsos , Nael Abu-Ghazaleh , and Manu Sridharan . 2019 . IDAPro for IoT Malware analysis? . In 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19) . USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/cset19\/presentation\/g Sri\u00a0Shaila G, Ahmad Darki, Michalis Faloutsos, Nael Abu-Ghazaleh, and Manu Sridharan. 2019. IDAPro for IoT Malware analysis?. In 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/cset19\/presentation\/g"},{"key":"e_1_3_2_1_22_1","unstructured":"Claudio Guarnieri Allessandro Tanasi Jurriaan Bremer and Mark Schloesser. 2012. The cuckoo sandbox.  Claudio Guarnieri Allessandro Tanasi Jurriaan Bremer and Mark Schloesser. 2012. The cuckoo sandbox."},{"key":"e_1_3_2_1_23_1","unstructured":"SA Hex-Rays. 2008. IDA pro disassembler.  SA Hex-Rays. 2008. IDA pro disassembler."},{"key":"e_1_3_2_1_24_1","unstructured":"Vector\u00a035 Inc. 2020. Binary Ninja. https:\/\/docs.binary.ninja\/index.html(2020).  Vector\u00a035 Inc. 2020. Binary Ninja. https:\/\/docs.binary.ninja\/index.html(2020)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397377"},{"key":"e_1_3_2_1_26_1","unstructured":"Nikos Karampatziakis. 2010. Static Analysis of Binary Executables Using Structural SVMs. In NIPS.  Nikos Karampatziakis. 2010. Static Analysis of Binary Executables Using Structural SVMs. In NIPS."},{"key":"e_1_3_2_1_27_1","unstructured":"Johannes Kinder. 2010. Jakstab. http:\/\/www.jakstab.org\/(2010).  Johannes Kinder. 2010. Jakstab. http:\/\/www.jakstab.org\/(2010)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2998687.2998716"},{"key":"e_1_3_2_1_29_1","volume-title":"Static Disassembly of Obfuscated Binaries. In 13th USENIX Security Symposium (USENIX Security 04)","author":"Kruegel Christopher","year":"2004","unstructured":"Christopher Kruegel , William Robertson , Fredrik Valeur , and Giovanni Vigna . 2004 . Static Disassembly of Obfuscated Binaries. In 13th USENIX Security Symposium (USENIX Security 04) . USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/13th-usenix-security-symposium\/static-disassembly-obfuscated-binaries Christopher Kruegel, William Robertson, Fredrik Valeur, and Giovanni Vigna. 2004. Static Disassembly of Obfuscated Binaries. In 13th USENIX Security Symposium (USENIX Security 04). USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/13th-usenix-security-symposium\/static-disassembly-obfuscated-binaries"},{"volume-title":"Static Disassembly of Obfuscated Binaries. In USENIX Security Symposium.","author":"Kr\u00fcgel C.","key":"e_1_3_2_1_30_1","unstructured":"C. Kr\u00fcgel , William\u00a0 K. Robertson , Fredrik Valeur , and G. Vigna . 2004 . Static Disassembly of Obfuscated Binaries. In USENIX Security Symposium. C. Kr\u00fcgel, William\u00a0K. Robertson, Fredrik Valeur, and G. Vigna. 2004. Static Disassembly of Obfuscated Binaries. In USENIX Security Symposium."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Evangelos Ladakis Giorgos Vasiliadis M. Polychronakis S. Ioannidis and G. Portokalidis. 2015. GPU-Disasm: A GPU-Based X86 Disassembler. In ISC.  Evangelos Ladakis Giorgos Vasiliadis M. Polychronakis S. Ioannidis and G. Portokalidis. 2015. GPU-Disasm: A GPU-Based X86 Disassembler. In ISC.","DOI":"10.1007\/978-3-319-23318-5_26"},{"key":"e_1_3_2_1_32_1","unstructured":"Mcafee. 2021. What Is Petya and NotPetya Ransomware?https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/ransomware\/petya.html(2021).  Mcafee. 2021. What Is Petya and NotPetya Ransomware?https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/ransomware\/petya.html(2021)."},{"key":"e_1_3_2_1_33_1","unstructured":"Xiaozhu Meng. 2016. Dynist Disassembler. https:\/\/github.com\/dyninst\/dyninst\/releases\/tag\/v10.1.0(2016).  Xiaozhu Meng. 2016. Dynist Disassembler. https:\/\/github.com\/dyninst\/dyninst\/releases\/tag\/v10.1.0(2016)."},{"key":"e_1_3_2_1_34_1","unstructured":"Merrium-Webster. 2020. percentile. https:\/\/www.merriam-webster.com\/dictionary\/percentile(2020).  Merrium-Webster. 2020. percentile. https:\/\/www.merriam-webster.com\/dictionary\/percentile(2020)."},{"key":"e_1_3_2_1_35_1","volume-title":"Probabilistic Disassembly. In Proceedings of the 41st International Conference on Software Engineering (Montreal","author":"Miller Kenneth","year":"2019","unstructured":"Kenneth Miller , Yonghwi Kwon , Yi Sun , Zhuo Zhang , Xiangyu Zhang , and Zhiqiang Lin . 2019 . Probabilistic Disassembly. In Proceedings of the 41st International Conference on Software Engineering (Montreal , Quebec, Canada) (ICSE \u201919). IEEE Press, 1187\u20131198. https:\/\/doi.org\/10.1109\/ICSE. 2019.00121 Kenneth Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang, Xiangyu Zhang, and Zhiqiang Lin. 2019. Probabilistic Disassembly. In Proceedings of the 41st International Conference on Software Engineering (Montreal, Quebec, Canada) (ICSE \u201919). IEEE Press, 1187\u20131198. https:\/\/doi.org\/10.1109\/ICSE.2019.00121"},{"volume-title":"Probabilistic Disassembly. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 1187\u20131198","author":"Miller K.","key":"e_1_3_2_1_36_1","unstructured":"K. Miller , Y. Kwon , Y. Sun , Z. Zhang , X. Zhang , and Z. Lin . 2019 . Probabilistic Disassembly. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 1187\u20131198 . K. Miller, Y. Kwon, Y. Sun, Z. Zhang, X. Zhang, and Z. Lin. 2019. Probabilistic Disassembly. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 1187\u20131198."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.04.005"},{"key":"e_1_3_2_1_38_1","unstructured":"NSA. 2019. GhidraOrg. https:\/\/ghidra-sre.org\/(2019).  NSA. 2019. GhidraOrg. https:\/\/ghidra-sre.org\/(2019)."},{"key":"e_1_3_2_1_39_1","volume-title":"pancake and","author":"Nickname","year":"2020","unstructured":"Nickname : pancake and . 2020 . Radare 2. https:\/\/github.com\/radareorg(2020). Nickname: pancake and. 2020. Radare2. https:\/\/github.com\/radareorg(2020)."},{"key":"e_1_3_2_1_40_1","volume-title":"Probabilistic Naming of Functions in Stripped Binaries. In Annual Computer Security Applications Conference","author":"Patrick-Evans James","year":"2020","unstructured":"James Patrick-Evans , Lorenzo Cavallaro , and Johannes Kinder . 2020 . Probabilistic Naming of Functions in Stripped Binaries. In Annual Computer Security Applications Conference ( Austin, USA) (ACSAC \u201920). Association for Computing Machinery, New York, NY, USA, 373\u2013385. https:\/\/doi.org\/10.1145\/3427228.3427265 James Patrick-Evans, Lorenzo Cavallaro, and Johannes Kinder. 2020. Probabilistic Naming of Functions in Stripped Binaries. In Annual Computer Security Applications Conference (Austin, USA) (ACSAC \u201920). Association for Computing Machinery, New York, NY, USA, 373\u2013385. https:\/\/doi.org\/10.1145\/3427228.3427265"},{"key":"e_1_3_2_1_41_1","volume-title":"Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries. In 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 201\u2013212","author":"Qiao R.","year":"2017","unstructured":"R. Qiao and R. Sekar . 2017 . Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries. In 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 201\u2013212 . https:\/\/doi.org\/10.1109\/DSN. 2017 .29 R. Qiao and R. Sekar. 2017. Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries. In 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 201\u2013212. https:\/\/doi.org\/10.1109\/DSN.2017.29"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9124-7"},{"key":"e_1_3_2_1_43_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020","author":"Rokon Omar\u00a0Faruk","year":"2020","unstructured":"Md\u00a0 Omar\u00a0Faruk Rokon , Risul Islam , Ahmad Darki , Evangelos\u00a0 E. Papalexakis , and Michalis Faloutsos . 2020 . SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub . In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020 ). USENIX Association, San Sebastian, 149\u2013163. https:\/\/www.usenix.org\/conference\/raid 2020\/presentation\/omar Md\u00a0Omar\u00a0Faruk Rokon, Risul Islam, Ahmad Darki, Evangelos\u00a0E. Papalexakis, and Michalis Faloutsos. 2020. SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX Association, San Sebastian, 149\u2013163. https:\/\/www.usenix.org\/conference\/raid2020\/presentation\/omar"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 23rd National Conference on Artificial Intelligence -","volume":"2","author":"Rosenblum Nathan","year":"2008","unstructured":"Nathan Rosenblum , Xiaojin Zhu , Barton Miller , and Karen Hunt . 2008 . Learning to Analyze Binary Computer Code . In Proceedings of the 23rd National Conference on Artificial Intelligence - Volume 2 (Chicago, Illinois) (AAAI\u201908). AAAI Press, 798\u2013804. Nathan Rosenblum, Xiaojin Zhu, Barton Miller, and Karen Hunt. 2008. Learning to Analyze Binary Computer Code. In Proceedings of the 23rd National Conference on Artificial Intelligence - Volume 2 (Chicago, Illinois) (AAAI\u201908). AAAI Press, 798\u2013804."},{"key":"e_1_3_2_1_45_1","unstructured":"Unit\u00a042 Ruchna\u00a0Nigam. 2016. Unit 42 Finds New Mirai and Gafgyt IoT\/Linux Botnet Campaigns. https:\/\/unit42.paloaltonetworks.com\/unit42-finds-new-mirai-gafgyt-iotlinux-botnet-campaigns\/(2016).  Unit\u00a042 Ruchna\u00a0Nigam. 2016. Unit 42 Finds New Mirai and Gafgyt IoT\/Linux Botnet Campaigns. https:\/\/unit42.paloaltonetworks.com\/unit42-finds-new-mirai-gafgyt-iotlinux-botnet-campaigns\/(2016)."},{"key":"e_1_3_2_1_46_1","volume-title":"Principal Security\u00a0Researcher","author":"Ryan\u00a0Barnett Akamai","year":"2018","unstructured":"Akamai Ryan\u00a0Barnett , Principal Security\u00a0Researcher . September 11, 2018 . NEW TSUNAMI\/KAITEN VARIANT : PROPAGATION STATUS. https:\/\/blogs.akamai.com\/sitr\/2018\/09\/new-tsunamikaiten-variant-propagation-status.html(September 11, 2018). Akamai Ryan\u00a0Barnett, Principal Security\u00a0Researcher. September 11, 2018. NEW TSUNAMI\/KAITEN VARIANT: PROPAGATION STATUS. https:\/\/blogs.akamai.com\/sitr\/2018\/09\/new-tsunamikaiten-variant-propagation-status.html(September 11, 2018)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Omer Sagi and L. Rokach. 2018. Ensemble learning: A survey. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 8 (2018).  Omer Sagi and L. Rokach. 2018. Ensemble learning: A survey. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 8 (2018).","DOI":"10.1002\/widm.1249"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the Fourteenth International Conference on Machine Learning(ICML \u201997)","author":"Schapire E.","year":"1997","unstructured":"Robert\u00a0 E. Schapire , Yoav Freund , Peter Barlett , and Wee\u00a0Sun Lee . 1997 . Boosting the Margin: A New Explanation for the Effectiveness of Voting Methods . In Proceedings of the Fourteenth International Conference on Machine Learning(ICML \u201997) . Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 322\u2013330. Robert\u00a0E. Schapire, Yoav Freund, Peter Barlett, and Wee\u00a0Sun Lee. 1997. Boosting the Margin: A New Explanation for the Effectiveness of Voting Methods. In Proceedings of the Fourteenth International Conference on Machine Learning(ICML \u201997). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 322\u2013330."},{"key":"e_1_3_2_1_49_1","volume-title":"Recognizing Functions in Binaries with Neural Networks. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Chul\u00a0Richard Shin Eui","year":"2015","unstructured":"Eui Chul\u00a0Richard Shin , Dawn Song , and Reza Moazzezi . 2015 . Recognizing Functions in Binaries with Neural Networks. In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 611\u2013626. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/shin Eui Chul\u00a0Richard Shin, Dawn Song, and Reza Moazzezi. 2015. Recognizing Functions in Binaries with Neural Networks. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 611\u2013626. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/shin"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.23919\/SOFTCOM.2017.8115504"},{"key":"e_1_3_2_1_52_1","volume-title":"Lightweight Classification of IoT Malware Based on Image Recognition. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Vol.\u00a002","author":"Su J.","year":"2018","unstructured":"J. Su , D.\u00a0 V. Vasconcellos , S. Prasad , D. Sgandurra , Y. Feng , and K. Sakurai . 2018 . Lightweight Classification of IoT Malware Based on Image Recognition. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Vol.\u00a002 . 664\u2013669. https:\/\/doi.org\/10.1109\/COMPSAC. 2018 .10315 J. Su, D.\u00a0V. Vasconcellos, S. Prasad, D. Sgandurra, Y. Feng, and K. Sakurai. 2018. Lightweight Classification of IoT Malware Based on Image Recognition. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Vol.\u00a002. 664\u2013669. https:\/\/doi.org\/10.1109\/COMPSAC.2018.10315"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409177"},{"key":"e_1_3_2_1_54_1","unstructured":"Gilbert Tanner. 2019. A guide to Ensemble Learning Increase your accuracy by combining model outputs.  Gilbert Tanner. 2019. A guide to Ensemble Learning Increase your accuracy by combining model outputs."},{"key":"e_1_3_2_1_55_1","unstructured":"UCSB. 2016. angr. https:\/\/docs.angr.io\/(2016).  UCSB. 2016. angr. https:\/\/docs.angr.io\/(2016)."},{"key":"e_1_3_2_1_56_1","unstructured":"US-CERT. [n.d.]. US Computer Emergency Readiness Team Heightened DDoS Threat Posed by Mirai and Other Botnets alert TA16-288A. Accessed: 2016-11-30.  US-CERT. [n.d.]. US Computer Emergency Readiness Team Heightened DDoS Threat Posed by Mirai and Other Botnets alert TA16-288A. Accessed: 2016-11-30."},{"key":"e_1_3_2_1_57_1","unstructured":"Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries(SEC\u201913). USENIX Association USA 337\u2013352.  Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries(SEC\u201913). USENIX Association USA 337\u2013352."}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '21","location":"San Sebastian Spain"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471851","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:49Z","timestamp":1750195489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471851"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":57,"alternative-id":["10.1145\/3471621.3471851","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471851","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}