{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:30Z","timestamp":1750220250689,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511508","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"125-136","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Recovering Structure of Input of a Binary Program"],"prefix":"10.1145","author":[{"given":"Seshagiri Prabhu","family":"Narasimha","sequence":"first","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]},{"given":"Arun","family":"Lakhotia","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette, LA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1075382.1075387"},{"key":"e_1_3_2_2_2_1","volume-title":"NAUTILUS: Fishing for Deep Bugs with Grammars. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann , Tommaso Frassetto , Thorsten Holz , Patrick Jauernig , Ahmad-Reza Sadeghi , and Daniel Teuchert . 2019 . NAUTILUS: Fishing for Deep Bugs with Grammars. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019 , San Diego, California, USA, February 24--27 , 2019. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/nautilus-fishing-for-deep-bugs-with-grammars\/ Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, and Daniel Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24--27, 2019. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/nautilus-fishing-for-deep-bugs-with-grammars\/"},{"key":"e_1_3_2_2_3_1","unstructured":"Paul Bourke. 2011. BMP Parser . http:\/\/paulbourke.net\/dataformats\/bmp\/parse.c Retrieved 2022-02-01 from  Paul Bourke. 2011. BMP Parser . http:\/\/paulbourke.net\/dataformats\/bmp\/parse.c Retrieved 2022-02-01 from"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.08.003"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"e_1_3_2_2_7_1","volume-title":"FormatFuzzer: Effective Fuzzing of Binary File Formats. CoRR","author":"Dutra Rafael","year":"2021","unstructured":"Rafael Dutra , Rahul Gopinath , and Andreas Zeller . 2021. FormatFuzzer: Effective Fuzzing of Binary File Formats. CoRR , Vol. abs\/ 2109 .11277 ( 2021 ). showeprint[arXiv]2109.11277 https:\/\/arxiv.org\/abs\/2109.11277 Rafael Dutra, Rahul Gopinath, and Andreas Zeller. 2021. FormatFuzzer: Effective Fuzzing of Binary File Formats. CoRR , Vol. abs\/2109.11277 (2021). showeprint[arXiv]2109.11277 https:\/\/arxiv.org\/abs\/2109.11277"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409679"},{"key":"e_1_3_2_2_9_1","volume-title":"Proceedings of the 39th International Conference on Software Engineering, ICSE 2017","author":"Matthias","year":"2017","unstructured":"Matthias H\u00f6 schele and Andreas Zeller. 2017. Mining input grammars with AUTOGRAM . In Proceedings of the 39th International Conference on Software Engineering, ICSE 2017 , Buenos Aires, Argentina, May 20--28 , 2017 - Companion Volume, Sebasti\u00e1 n Uchitel, Alessandro Orso, and Martin P. Robillard (Eds.). IEEE Computer Society, 31--34. https:\/\/doi.org\/10.1109\/ICSE-C.2017.14 10.1109\/ICSE-C.2017.14 Matthias H\u00f6 schele and Andreas Zeller. 2017. Mining input grammars with AUTOGRAM. In Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20--28, 2017 - Companion Volume, Sebasti\u00e1 n Uchitel, Alessandro Orso, and Martin P. Robillard (Eds.). IEEE Computer Society, 31--34. https:\/\/doi.org\/10.1109\/ICSE-C.2017.14"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274746"},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2008","author":"Lin Zhiqiang","year":"2008","unstructured":"Zhiqiang Lin , Xuxian Jiang , Dongyan Xu , and Xiangyu Zhang . 2008 . Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2008 , San Diego, California, USA, 10th February - 13th February 2008. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2008\/automatic-protocol-format-reverse-engineering-through-context-aware-monitored-execution\/ Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, and Xiangyu Zhang. 2008. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, California, USA, 10th February - 13th February 2008. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2008\/automatic-protocol-format-reverse-engineering-through-context-aware-monitored-execution\/"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2010","author":"Lin Zhiqiang","year":"2010","unstructured":"Zhiqiang Lin , Xiangyu Zhang , and Dongyan Xu . 2010 . Automatic Reverse Engineering of Data Structures from Binary Execution . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2010 , San Diego, California, USA, 28th February - 3rd March 2010. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2010\/automatic-reverse-engineering-data-structures-binary-execution Zhiqiang Lin, Xiangyu Zhang, and Dongyan Xu. 2010. Automatic Reverse Engineering of Data Structures from Binary Execution. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2010\/automatic-reverse-engineering-data-structures-binary-execution"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_2_14_1","unstructured":"William Martin. 2021. DARPA SafeDocs. https:\/\/www.darpa.mil\/program\/safe-documents Retrieved 2022-02-01 from  William Martin. 2021. DARPA SafeDocs. https:\/\/www.darpa.mil\/program\/safe-documents Retrieved 2022-02-01 from"},{"key":"e_1_3_2_2_15_1","first-page":"1980","article-title":"Smart Greybox Fuzzing","volume":"47","author":"Pham Van-Thuan","year":"2021","unstructured":"Van-Thuan Pham , Marcel B\u00f6 hme, Andrew E. Santosa , Alexandru Razvan Caciulescu , and Abhik Roychoudhury . 2021 . Smart Greybox Fuzzing . IEEE Trans. Software Eng. , Vol. 47 , 9 (2021), 1980 -- 1997 . https:\/\/doi.org\/10.1109\/TSE.2019.2941681 10.1109\/TSE.2019.2941681 Van-Thuan Pham, Marcel B\u00f6 hme, Andrew E. Santosa, Alexandru Razvan Caciulescu, and Abhik Roychoudhury. 2021. Smart Greybox Fuzzing. IEEE Trans. Software Eng. , Vol. 47, 9 (2021), 1980--1997. https:\/\/doi.org\/10.1109\/TSE.2019.2941681","journal-title":"IEEE Trans. Software Eng."},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015","author":"Preda Mila Dalla","year":"2015","unstructured":"Mila Dalla Preda , Roberto Giacobazzi , Arun Lakhotia , and Isabella Mastroeni . 2015 . Abstract Symbolic Automata: Mixed syntactic\/semantic similarity analysis of executables . In Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015 , Mumbai, India, January 15--17 , 2015 , , Sriram K. Rajamani and David Walker (Eds.). ACM , 329--341. https:\/\/doi.org\/10.1145\/2676726.2676986 10.1145\/2676726.2676986 Mila Dalla Preda, Roberto Giacobazzi, Arun Lakhotia, and Isabella Mastroeni. 2015. Abstract Symbolic Automata: Mixed syntactic\/semantic similarity analysis of executables. In Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015, Mumbai, India, January 15--17, 2015 , , Sriram K. Rajamani and David Walker (Eds.). ACM , 329--341. https:\/\/doi.org\/10.1145\/2676726.2676986"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_2_18_1","unstructured":"Linux Torvalds. 2021. strlen: 32-bit implementation . https:\/\/github.com\/torvalds\/linux\/blob\/master\/arch\/x86\/lib\/string_32.c#L166-L176 Retrieved 2022-02-01 from  Linux Torvalds. 2021. strlen: 32-bit implementation . https:\/\/github.com\/torvalds\/linux\/blob\/master\/arch\/x86\/lib\/string_32.c#L166-L176 Retrieved 2022-02-01 from"},{"key":"e_1_3_2_2_19_1","unstructured":"Trailofbits. 2022. trailofbits\/polytracker . https:\/\/github.com\/trailofbits\/polytracker Retrieved 2022-02-01 from  Trailofbits. 2022. trailofbits\/polytracker . https:\/\/github.com\/trailofbits\/polytracker Retrieved 2022-02-01 from"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2008","author":"Wondracek Gilbert","year":"2008","unstructured":"Gilbert Wondracek , Paolo Milani Comparetti , Christopher Kr\u00fc gel, and Engin Kirda . 2008 . Automatic Network Protocol Analysis . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2008 , San Diego, California, USA, 10th February - 13th February 2008. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2008\/automatic-network-protocol-analysis\/ Gilbert Wondracek, Paolo Milani Comparetti, Christopher Kr\u00fc gel, and Engin Kirda. 2008. Automatic Network Protocol Analysis. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, California, USA, 10th February - 13th February 2008. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2008\/automatic-network-protocol-analysis\/"},{"key":"e_1_3_2_2_22_1","volume-title":"ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. In 2019 IEEE Symposium on Security and Privacy, SP 2019","author":"You Wei","year":"2019","unstructured":"Wei You , Xueqiang Wang , Shiqing Ma , Jianjun Huang , Xiangyu Zhang , XiaoFeng Wang , and Bin Liang . 2019 . ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. In 2019 IEEE Symposium on Security and Privacy, SP 2019 , San Francisco, CA, USA, May 19--23 , 2019. IEEE, 769--786. https:\/\/doi.org\/10.1109\/SP.2019.00057 10.1109\/SP.2019.00057 Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, and Bin Liang. 2019. ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19--23, 2019. IEEE, 769--786. https:\/\/doi.org\/10.1109\/SP.2019.00057"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":22,"alternative-id":["10.1145\/3508398.3511508","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511508","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}