{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:17:58Z","timestamp":1774945078979,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507736","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"846-858","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM"],"prefix":"10.1145","author":[{"given":"Muhui","family":"Jiang","sequence":"first","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Tianyi","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Yufeng","family":"Hu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Ming","family":"Zhong","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Lei","family":"Wu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, China"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"64 Bit Juno r2 ARM\u00ae Development Platform. https:\/\/developer.arm.com\/-\/media\/Arm%20Developer%20Community\/PDF\/Juno%20r2%20datasheet.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"AFL QEMU Mode: high-performance binary-only instrumentation for afl-fuzz. https:\/\/github.com\/google\/afl\/tree\/master\/qemu_mode"},{"key":"e_1_3_2_1_3_1","unstructured":"Angr. https:\/\/angr.io\/"},{"key":"e_1_3_2_1_4_1","unstructured":"ARM Exploration tools. https:\/\/developer.arm.com\/architectures\/cpu-architecture\/a-profile\/exploration-tools"},{"key":"e_1_3_2_1_5_1","unstructured":"ARM SIMD Instructions. https:\/\/developer.arm.com\/documentation\/dht0002\/a\/Introducing-NEON\/What-is-SIMD-\/ARM-SIMD-instructions"},{"key":"e_1_3_2_1_6_1","unstructured":"ARM WFE Instruction. https:\/\/developer.arm.com\/documentation\/ddi0360\/e\/programmer-s-model\/additional-instructions\/wait-for-event-wfe"},{"key":"e_1_3_2_1_7_1","unstructured":"AttributeError Bug in Angr. https:\/\/github.com\/angr\/angr\/issues\/2803"},{"key":"e_1_3_2_1_8_1","unstructured":"BLX instruction bug in QEMU. https:\/\/bugs.launchpad.net\/qemu\/+bug\/1925512"},{"key":"e_1_3_2_1_9_1","unstructured":"Bugs in Unicorn. https:\/\/github.com\/unicorn-engine\/unicorn\/issues\/1424"},{"key":"e_1_3_2_1_10_1","unstructured":"Capstone. https:\/\/www.capstone-engine.org\/"},{"key":"e_1_3_2_1_11_1","unstructured":"PANDA.re. https:\/\/panda.re\/"},{"key":"e_1_3_2_1_12_1","unstructured":"QEMU. https:\/\/www.qemu.org\/"},{"key":"e_1_3_2_1_13_1","unstructured":"STR instruction bug in QEMU. https:\/\/bugs.launchpad.net\/qemu\/+bug\/1922887"},{"key":"e_1_3_2_1_14_1","unstructured":"Suterusu. https:\/\/github.com\/mncoppola\/suterusu"},{"key":"e_1_3_2_1_15_1","unstructured":"TriforceAFL. https:\/\/github.com\/nccgroup\/TriforceAFL"},{"key":"e_1_3_2_1_16_1","unstructured":"Unaligned data access bug in QEMU. https:\/\/bugs.launchpad.net\/qemu\/+bug\/1905356"},{"key":"e_1_3_2_1_17_1","unstructured":"Unicorn. https:\/\/www.unicorn-engine.org\/"},{"key":"e_1_3_2_1_18_1","unstructured":"VABS Bug in Angr. https:\/\/github.com\/angr\/angr\/issues\/2808"},{"key":"e_1_3_2_1_19_1","unstructured":"VCVT Bug in Angr. https:\/\/github.com\/angr\/angr\/issues\/2829"},{"key":"e_1_3_2_1_20_1","unstructured":"VMAX Bug in Angr. https:\/\/github.com\/angr\/angr\/issues\/2809"},{"key":"e_1_3_2_1_21_1","unstructured":"VMUL Bug in Angr. https:\/\/github.com\/angr\/angr\/issues\/2810"},{"key":"e_1_3_2_1_22_1","unstructured":"WFI instruction bug in QEMU. https:\/\/bugs.launchpad.net\/qemu\/+bug\/1926759"},{"key":"e_1_3_2_1_23_1","unstructured":"Z3Prover. https:\/\/github.com\/Z3Prover\/z3"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 7th Workshop on Cyber Security Experimentation and Test.","author":"Alwabel Abdulla","year":"2014","unstructured":"Abdulla Alwabel, Hao Shi, Genevieve Bartlett, and Jelena Mirkovic. 2014. Safe and automated live malware experimentation on public testbeds. In Proceedings of the 7th Workshop on Cyber Security Experimentation and Test."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.67"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23483"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Vitaly Chipounov Volodymyr Kuznetsov and George Candea. 2011. S2E: A platform for in-vivo multi-path analysis of software systems. Acm Sigplan Notices.","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 26th Annual Network and Distributed System Security Symposium.","author":"Chua Zheng Leong","year":"2019","unstructured":"Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, and Purui Su. 2019. One Engine To Serve\u2019em All: Inferring Taint Rules Without Architectural Semantics.. In Proceedings of the 26th Annual Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 29th USENIX Security Symposium.","author":"Clements Abraham A","year":"2020","unstructured":"Abraham A Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, and Mathias Payer. 2020. HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. In Proceedings of the 29th USENIX Security Symposium."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00054"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses.","author":"Davanian Ali","year":"2019","unstructured":"Ali Davanian, Zhenxiao Qi, Yu Qu, and Heng Yin. 2019. DECAF++: Elastic whole-system dynamic taint analysis. In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 29th USENIX Security Symposium.","author":"Feng Bo","year":"2019","unstructured":"Bo Feng, Alejandro Mera, and Long Lu. 2019. P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling. In Proceedings of the 29th USENIX Security Symposium."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664248"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 28th USENIX Security Symposium.","author":"G\u00fcler Emre","year":"2019","unstructured":"Emre G\u00fcler, Cornelius Aschermann, Ali Abbasi, and Thorsten Holz. 2019. Antifuzz: Impeding fuzzing audits of binary executables. In Proceedings of the 28th USENIX Security Symposium."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610407"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134050"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-012-0165-0"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Daehee Jang Yunjong Jeong Sungman Lee Minjoon Park Kuenhwan Kwak Donguk Kim and Brent Byunghoon Kang. 2019. Rethinking anti-emulation techniques for large-scale software deployment. Computers & Security.","DOI":"10.1016\/j.cose.2019.02.005"},{"key":"e_1_3_2_1_40_1","volume-title":"\u201cout-of-the-box","author":"Jiang Xuxian","unstructured":"Xuxian Jiang, Xinyuan Wang, and Dongyan Xu. 2010. Stealthy malware detection and monitoring through VMM-based \u201cout-of-the-box\u201d semantic view reconstruction. ACM Transactions on Information and System Security."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 30th USENIX Security Symposium.","author":"Johnson Evan","year":"2021","unstructured":"Evan Johnson, Maxwell Bland, YiFei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, and Kirill Levchenko. 2021. Jetset: Targeted Firmware Rehosting for Embedded Systems. In Proceedings of the 30th USENIX Security Symposium."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14778\/3357377.3357382"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 28th USENIX Security Symposium.","author":"Jung Jinho","year":"2019","unstructured":"Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, and Taesoo Kim. 2019. Fuzzification: Anti-fuzzing techniques. In Proceedings of the 28th USENIX Security Symposium."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155636"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427294"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Tomasz Kuchta Thibaud Lutellier Edmund Wong Lin Tan and Cristian Cadar. 2018. On the correctness of electronic documents: studying finding and localizing inconsistency bugs in PDF readers and files. Empirical Software Engineering.","DOI":"10.1007\/s10664-018-9600-2"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Vu Le Mehrdad Afshari and Zhendong Su. 2014. Compiler validation via equivalence modulo inputs. ACM SIGPLAN Notices.","DOI":"10.1145\/2594291.2594334"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Christopher Lidbury Andrei Lascu Nathan Chong and Alastair F Donaldson. 2015. Many-core compiler fuzzing. ACM SIGPLAN Notices.","DOI":"10.1145\/2737924.2737986"},{"key":"e_1_3_2_1_49_1","article-title":"Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers","author":"Li\u0163\u0103 C\u0103t\u0103lin Valeriu","year":"2018","unstructured":"C\u0103t\u0103lin Valeriu Li\u0163\u0103, Doina Cosovan, and Drago\u015f Gavrilu\u0163. 2018. Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers. Journal of Computer Virology and Hacking Techniques.","journal-title":"Journal of Computer Virology and Hacking Techniques."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.56"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 13th USENIX Workshop on Offensive Technologies.","author":"Maier Dominik","year":"2019","unstructured":"Dominik Maier, Benedikt Radtke, and Bastian Harren. 2019. Unicorefuzz: On the viability of emulation for kernelspace fuzzing. In Proceedings of the 13th USENIX Workshop on Offensive Technologies."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151012"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831730"},{"key":"e_1_3_2_1_54_1","volume-title":"Giampaolo Fresi Roglia, and Danilo Bruschi","author":"Martignoni Lorenzo","year":"2013","unstructured":"Lorenzo Martignoni, Roberto Paleari, Alessandro Reina, Giampaolo Fresi Roglia, and Danilo Bruschi. 2013. A methodology for testing CPU emulators. ACM Transactions on Software Engineering and Methodology."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572303"},{"key":"e_1_3_2_1_56_1","unstructured":"William M McKeeman. 1998. Differential testing for software. Digital Technical Journal."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464842"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75496-1_1"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/3077629.3077658"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984038"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818022"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428261"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385985"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.11"},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the 38th IEEE International Conference on Dependable Systems and Networks.","author":"Chen Xu","unstructured":"Xu Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario. 2008. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In Proceedings of the 38th IEEE International Conference on Dependable Systems and Networks."},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of the 21st USENIX Security Symposium.","author":"Yan Lok Kwong","year":"2012","unstructured":"Lok Kwong Yan and Heng Yin. 2012. Droidscope: Seamlessly reconstructing the $OS$ and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX Security Symposium."},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the 28th USENIX Security Symposium.","author":"Zheng Yaowen","year":"2019","unstructured":"Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, and Limin Sun. 2019. FIRM-AFL: high-throughput greybox fuzzing of iot firmware via augmented process emulation. In Proceedings of the 28th USENIX Security Symposium."}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507736","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:40Z","timestamp":1750191100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507736"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":67,"alternative-id":["10.1145\/3503222.3507736","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507736","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}