{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:34Z","timestamp":1750220254377,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:00:00Z","timestamp":1645660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Youth Innovation Promotion Association CAS"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172407"],"award-info":[{"award-number":["62172407"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,24]]},"DOI":"10.1145\/3523181.3523207","type":"proceedings-article","created":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T23:57:42Z","timestamp":1650326262000},"page":"180-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["GRIN: Make Rewriting More Precise"],"prefix":"10.1145","author":[{"given":"Linan","family":"Tian","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences Beijing, China, China"}]},{"given":"Liwei","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences Beijing, China, China"}]},{"given":"Delin","family":"Kong","sequence":"additional","affiliation":[{"name":"Ruixin Academy of Classic Learning, Beijing Institute of Technology, Beijing, China, China"}]},{"given":"Gang","family":"Shi","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences Beijing, China, China"}]}],"member":"320","published-online":{"date-parts":[[2022,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465380"},{"key":"e_1_3_2_1_3_1","first-page":"600","volume-title":"Security Symposium ({USENIX} Security 16)","author":"Andriesse D.","year":"2016","unstructured":"D. Andriesse , X. Chen , V . V an Der V een, A. Slowinska , and H. Bos , \u201c An in-depth analysis of disassembly on full-scale x86\/x64 binaries,\u201d in 25th {USENIX} Security Symposium ({USENIX} Security 16) , 2016 , pp. 583\u2013 600 . D. Andriesse, X. Chen, V . V an Der V een, A. Slowinska, and H. Bos, \u201cAn in-depth analysis of disassembly on full-scale x86\/x64 binaries,\u201d in 25th {USENIX} Security Symposium ({USENIX} Security 16), 2016, pp. 583\u2013600."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2017.19"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23300"},{"key":"e_1_3_2_1_6_1","first-page":"46","volume-title":"USENIX Annual Technical Conference, FREENIX Track","volume":"41","author":"Bellard F.","year":"2005","unstructured":"F. Bellard , \u201c Qemu, a fast and portable dynamic translator .\u201d in USENIX Annual Technical Conference, FREENIX Track , vol. 41 , 2005 , p. 46 . F. Bellard, \u201cQemu, a fast and portable dynamic translator.\u201d in USENIX Annual Technical Conference, FREENIX Track, vol. 41, 2005, p. 46."},{"issue":"11","key":"e_1_3_2_1_7_1","first-page":"87","article-title":"Hp-3000 emulation on hp precision architecture computers","volume":"38","author":"Bergh A. B.","year":"1987","unstructured":"A. B. Bergh , K. Keilman , D. J. Magenheimer , and J. A. Miller , \u201c Hp-3000 emulation on hp precision architecture computers ,\u201d Hewlett-Packard Journal , vol. 38 , no. 11 , pp. 87 \u2013 89 , 1987 . A. B. Bergh, K. Keilman, D. J. Magenheimer, and J. A. Miller, \u201cHp-3000 emulation on hp precision architecture computers,\u201d Hewlett-Packard Journal, vol. 38, no. 11, pp. 87\u201389, 1987.","journal-title":"Hewlett-Packard Journal"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1087758"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896499"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPDRTS.1995.470488"},{"key":"e_1_3_2_1_11_1","first-page":"78","volume-title":"symposium","volume":"98","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , J. Walpole , P . Bakke , S. Beattie , A. Grier , P. Wagle , Q. Zhang , and H. Hinton , \u201c Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks.\u201d in USENIX security symposium , vol. 98 . San Antonio, TX , 1998 , pp. 63\u2013 78 . C. Cowan, C. Pu, D. Maier, J. Walpole, P . Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, \u201cStackguard: Automatic adaptive detection and prevention of buffer-overflow attacks.\u201d in USENIX security symposium, vol. 98. San Antonio, TX, 1998, pp. 63\u201378."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_12"},{"key":"e_1_3_2_1_15_1","unstructured":"D. Developers \u201cDyninst\u2014dynamic instrumentation framework.\u201d [Online]. Available: http:\/\/www.dyninst.org\/parse 2020  D. Developers \u201cDyninst\u2014dynamic instrumentation framework.\u201d [Online]. Available: http:\/\/www.dyninst.org\/parse 2020"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.27"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SHPCC.1994.296728"},{"key":"e_1_3_2_1_20_1","volume-title":"Honeywell series 200 operating systems","author":"Inc H.","year":"1966","unstructured":"H. Inc , \u201c Honeywell series 200 operating systems ,\u201d 1966 , http: \/\/s3data.computerhistory.org\/brochures\/honeywell.osorientationmgmt. 1966.102646090.pdf. H. Inc, \u201cHoneywell series 200 operating systems,\u201d 1966, http: \/\/s3data.computerhistory.org\/brochures\/honeywell.osorientationmgmt. 1966.102646090.pdf."},{"key":"e_1_3_2_1_21_1","first-page":"16","volume-title":"International Workshop on Languages and Compilers for Parallel Computing. Springer","author":"Lattner C.","year":"2004","unstructured":"C. Lattner and V . Adve , \u201cThe llvm compiler framework and infrastructure tutorial ,\u201d in International Workshop on Languages and Compilers for Parallel Computing. Springer , 2004 , pp. 15\u2013 16 . C. Lattner and V . Adve, \u201cThe llvm compiler framework and infrastructure tutorial,\u201d in International Workshop on Languages and Compilers for Parallel Computing. Springer, 2004, pp. 15\u201316."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452024"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.6"},{"key":"e_1_3_2_1_25_1","first-page":"100","volume-title":"Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation. New Y ork, NY , USA: Association for Computing Machinery","author":"Nethercote N.","year":"2007","unstructured":"N. Nethercote and J. Seward , \u201c V algrind: A framework for heavyweight dynamic binary instrumentation ,\u201d in Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation. New Y ork, NY , USA: Association for Computing Machinery , 2007 , p. 89\u2013 100 . N. Nethercote and J. Seward, \u201cV algrind: A framework for heavyweight dynamic binary instrumentation,\u201d in Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation. New Y ork, NY , USA: Association for Computing Machinery, 2007, p. 89\u2013100."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_12"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21424-0_13"},{"key":"e_1_3_2_1_28_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","first-page":"164","volume-title":"Fine-grained control-flow integrity through binary hardening","author":"Payer M.","year":"2015","unstructured":"M. Payer , A. Barresi , and T. R. Gross , \u201c Fine-grained control-flow integrity through binary hardening ,\u201d Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol. 9148 , no. i, pp. 144\u2013 164 , 2015 . M. Payer, A. Barresi, and T. R. Gross, \u201cFine-grained control-flow integrity through binary hardening,\u201d Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9148, no. i, pp. 144\u2013164, 2015."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2007477.1952703"},{"key":"e_1_3_2_1_30_1","first-page":"844","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Peng F.","year":"2014","unstructured":"F. Peng , Z. Deng , X. Zhang , D. Xu , Z. Lin , and Z. Su , \u201c X-force: Forceexecuting binary programs for security applications ,\u201d Proceedings of the 23rd USENIX Security Symposium , pp. 829\u2013 844 , 2014 . F. Peng, Z. Deng, X. Zhang, D. Xu, Z. Lin, and Z. Su, \u201cX-force: Forceexecuting binary programs for security applications,\u201d Proceedings of the 23rd USENIX Security Symposium, pp. 829\u2013844, 2014."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.29"},{"key":"e_1_3_2_1_32_1","first-page":"8","volume-title":"Proceedings of the USENIX Windows NT Workshop","volume":"1997","author":"Romer T.","year":"1997","unstructured":"T. Romer , G. V oelker, D. Lee , A. Wolman , W. Wong , H. Levy , B. Bershad , and B. Chen , \u201c Instrumentation and optimization of win32\/intel executables using etch ,\u201d in Proceedings of the USENIX Windows NT Workshop , vol. 1997 , 1997 , pp. 1\u2013 8 . T. Romer, G. V oelker, D. Lee, A. Wolman, W. Wong, H. Levy, B. Bershad, and B. Chen, \u201cInstrumentation and optimization of win32\/intel executables using etch,\u201d in Proceedings of the USENIX Windows NT Workshop, vol. 1997, 1997, pp. 1\u20138."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191531"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/151220.151227"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178260"},{"key":"e_1_3_2_1_37_1","volume-title":"Pax address space layout randomization (aslr)","author":"Team P","year":"2003","unstructured":"P . Team , \u201c Pax address space layout randomization (aslr) ,\u201d 2003 , https: \/\/pax.grsecurity.net\/docs\/aslr.txt. P . Team, \u201cPax address space layout randomization (aslr),\u201d 2003, https: \/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23225"},{"key":"e_1_3_2_1_39_1","first-page":"642","volume-title":"Security Symposium ({USENIX} Security 15)","author":"Wang S.","year":"2015","unstructured":"S. Wang , P . Wang , and D. Wu , \u201c Reassembleable disassembling,\u201d in 24th {USENIX} Security Symposium ({USENIX} Security 15) , 2015 , pp. 627\u2013 642 . S. Wang, P . Wang, and D. Wu, \u201cReassembleable disassembling,\u201d in 24th {USENIX} Security Symposium ({USENIX} Security 15), 2015, pp. 627\u2013642."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316415"},{"key":"e_1_3_2_1_42_1","volume-title":"Constructing precise control flow graphs from binaries","author":"Xu L.","year":"2009","unstructured":"L. Xu , F. Sun , and Z. Su , \u201c Constructing precise control flow graphs from binaries ,\u201d University of California , Davis, Tech . Rep, 2009 . L. Xu, F. Sun, and Z. Su, \u201cConstructing precise control flow graphs from binaries,\u201d University of California, Davis, Tech. Rep, 2009."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23099"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134634"},{"key":"e_1_3_2_1_46_1","first-page":"352","volume-title":"Security Symposium ({USENIX} Security 13)","author":"Zhang M.","year":"2013","unstructured":"M. Zhang and R. Sekar , \u201c Control flow integrity for {COTS} binaries,\u201d in Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13) , 2013 , pp. 337\u2013 352 . M. Zhang and R. Sekar, \u201cControl flow integrity for {COTS} binaries,\u201d in Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13), 2013, pp. 337\u2013352."}],"event":{"name":"ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference","acronym":"ASSE' 22","location":"Macau Macao"},"container-title":["2022 3rd Asia Service Sciences and Software Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3523181.3523207","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3523181.3523207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:44Z","timestamp":1750188644000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3523181.3523207"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,24]]},"references-count":44,"alternative-id":["10.1145\/3523181.3523207","10.1145\/3523181"],"URL":"https:\/\/doi.org\/10.1145\/3523181.3523207","relation":{},"subject":[],"published":{"date-parts":[[2022,2,24]]},"assertion":[{"value":"2022-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}