{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:21Z","timestamp":1750220001944,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,17]]},"DOI":"10.1145\/3524481.3527215","type":"proceedings-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:51:53Z","timestamp":1658249513000},"page":"138-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["NEMIANA"],"prefix":"10.1145","author":[{"given":"Nobuyuki","family":"Kanaya","sequence":"first","affiliation":[{"name":"National Institute of Information and Communications Technology, Japan"}]},{"given":"Yu","family":"Tsuda","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Japan"}]},{"given":"Yuuki","family":"Takano","sequence":"additional","affiliation":[{"name":"Osaka University, Japan"}]},{"given":"Yoshitada","family":"Fujiwara","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Japan"}]},{"given":"Ryoichi","family":"Isawa","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Japan"}]},{"given":"Daisuke","family":"Inoue","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Japan"}]}],"member":"320","published-online":{"date-parts":[[2022,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037738"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 2005 USENIX Annual Technical Conference (USENIX ATC 05)","volume":"41","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard . 2005 . QEMU, a Fast and Portable Dynamic Translator . In Proceedings of the 2005 USENIX Annual Technical Conference (USENIX ATC 05) , FREENIX Track , Vol. 41 . California, USA, 46. Fabrice Bellard. 2005. QEMU, a Fast and Portable Dynamic Translator. In Proceedings of the 2005 USENIX Annual Technical Conference (USENIX ATC 05), FREENIX Track, Vol. 41. California, USA, 46."},{"key":"e_1_3_2_1_3_1","volume-title":"Howto: GDB Remote Serial Protocol. Retrieved","author":"Bennett Jeremy","year":"2008","unstructured":"Jeremy Bennett . 2008 . Howto: GDB Remote Serial Protocol. Retrieved Oct. 8, 2021 from https:\/\/www.embecosm.com\/appnotes\/ean4\/embecosm-howto-rsp-server-ean4-issue-2.html Jeremy Bennett. 2008. Howto: GDB Remote Serial Protocol. Retrieved Oct. 8, 2021 from https:\/\/www.embecosm.com\/appnotes\/ean4\/embecosm-howto-rsp-server-ean4-issue-2.html"},{"key":"e_1_3_2_1_4_1","unstructured":"Ron Bowes. 2021. BSidesSF CTF 2021 Author writeup: glitter-printer a buffer underflow where you modify the actual code. https:\/\/blog.skullsecurity.org\/2021\/bsidessf-ctf-2021-author-writeup-glitter-printer-a-buffer-underflow-where-you-modify-the-actual-code\/.  Ron Bowes. 2021. BSidesSF CTF 2021 Author writeup: glitter-printer a buffer underflow where you modify the actual code . https:\/\/blog.skullsecurity.org\/2021\/bsidessf-ctf-2021-author-writeup-glitter-printer-a-buffer-underflow-where-you-modify-the-actual-code\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3174243.3174269"},{"key":"e_1_3_2_1_7_1","volume-title":"Intelligence Report","author":"Nokia Corporation","year":"2020","unstructured":"Nokia Corporation . 2020. Threat Intelligence Report 2020 . Retrieved Oct . 8, 2021 from https:\/\/onestore.nokia.com\/asset\/210088 Nokia Corporation. 2020. Threat Intelligence Report 2020. Retrieved Oct. 8, 2021 from https:\/\/onestore.nokia.com\/asset\/210088"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Delshadtehrani Leila","year":"2020","unstructured":"Leila Delshadtehrani , Sadullah Canakci , Boyou Zhou , Schuyler Eldridge , Ajay Joshi , and Manuel Egele . 2020 . PHMon: A Programmable Hardware Monitor and Its Security Use Cases . In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 807--824. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/delshadtehrani Leila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, and Manuel Egele. 2020. PHMon: A Programmable Hardware Monitor and Its Security Use Cases. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 807--824. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/delshadtehrani"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2189750.2151004"},{"volume-title":"RISC-V GNU Compiler Toolchain. Retrieved","year":"2021","key":"e_1_3_2_1_10_1","unstructured":"jim-wilson. 2014. RISC-V GNU Compiler Toolchain. Retrieved Oct. 8, 2021 from https:\/\/github.com\/riscv-collab\/riscv-gnu-toolchain jim-wilson. 2014. RISC-V GNU Compiler Toolchain. Retrieved Oct. 8, 2021 from https:\/\/github.com\/riscv-collab\/riscv-gnu-toolchain"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware","volume":"2014","author":"Kruegel Christopher","year":"2014","unstructured":"Christopher Kruegel . 2014 . Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware . In Proceedings of Black Hat USA 2014. 1 -- 7 . Christopher Kruegel. 2014. Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware. In Proceedings of Black Hat USA 2014. 1--7.","journal-title":"Proceedings of Black Hat USA"},{"key":"e_1_3_2_1_12_1","unstructured":"Arm Limited. 2005. Dhrystones. Retrieved Oct. 8 2021 from https:\/\/www.keil.com\/benchmarks\/dhrystone.asp  Arm Limited. 2005. Dhrystones . Retrieved Oct. 8 2021 from https:\/\/www.keil.com\/benchmarks\/dhrystone.asp"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23017"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/996566.996655"},{"volume-title":"GitHub - qemu\/qemu at v6.0.0. Retrieved","year":"2021","key":"e_1_3_2_1_15_1","unstructured":"pm215. 2021. GitHub - qemu\/qemu at v6.0.0. Retrieved Oct. 8, 2021 from https:\/\/github.com\/qemu\/qemu\/tree\/v6.0.0 pm215. 2021. GitHub - qemu\/qemu at v6.0.0. Retrieved Oct. 8, 2021 from https:\/\/github.com\/qemu\/qemu\/tree\/v6.0.0"},{"key":"e_1_3_2_1_16_1","volume-title":"Open On-Chip Debugger. Retrieved","author":"Rath Dominic","year":"2021","unstructured":"Dominic Rath . 2021. Open On-Chip Debugger. Retrieved Oct. 8, 2021 from http:\/\/openocd.org\/ Dominic Rath. 2021. Open On-Chip Debugger. Retrieved Oct. 8, 2021 from http:\/\/openocd.org\/"},{"key":"e_1_3_2_1_17_1","volume-title":"RISC-V Proxy Kernel and Boot Loader. Retrieved","author":"Software RISC-V","year":"2021","unstructured":"RISC-V Software . 2011. RISC-V Proxy Kernel and Boot Loader. Retrieved Oct. 8, 2021 from https:\/\/github.com\/riscv-software-src\/riscv-pk RISC-V Software. 2011. RISC-V Proxy Kernel and Boot Loader. Retrieved Oct. 8, 2021 from https:\/\/github.com\/riscv-software-src\/riscv-pk"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1996.508015"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537690"},{"key":"e_1_3_2_1_20_1","unstructured":"SiFive Inc. 2019. HiFive1 Rev B. Retrieved Oct. 8 2021 from https:\/\/www.sifive.com\/boards\/hifive1-rev-b  SiFive Inc. 2019. HiFive1 Rev B . Retrieved Oct. 8 2021 from https:\/\/www.sifive.com\/boards\/hifive1-rev-b"},{"key":"e_1_3_2_1_21_1","volume-title":"New Mirai Variant Targeting Network Security Devices. Retrieved","author":"Singhal Vaibhav","year":"2021","unstructured":"Vaibhav Singhal , Ruchna Nigam , Zhibin Zhang , and Asher Davila . 2021. New Mirai Variant Targeting Network Security Devices. Retrieved Oct. 8, 2021 from https:\/\/unit42.paloaltonetworks.com\/mirai-variant-iot-vulnerabilities\/ Vaibhav Singhal, Ruchna Nigam, Zhibin Zhang, and Asher Davila. 2021. New Mirai Variant Targeting Network Security Devices. Retrieved Oct. 8, 2021 from https:\/\/unit42.paloaltonetworks.com\/mirai-variant-iot-vulnerabilities\/"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/358274.358283"},{"key":"e_1_3_2_1_23_1","unstructured":"Xilinx Inc. 2018. Zynq UltraScale + MPSoC ZCU104 Evaluation Kit. Retrieved Oct. 8 2021 from https:\/\/www.xilinx.com\/products\/boards-and-kits\/zcu104.html  Xilinx Inc. 2018. Zynq UltraScale + MPSoC ZCU104 Evaluation Kit . Retrieved Oct. 8 2021 from https:\/\/www.xilinx.com\/products\/boards-and-kits\/zcu104.html"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2943176"},{"key":"e_1_3_2_1_25_1","first-page":"1","article-title":"AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems","volume":"23","author":"Zaddach Jonas","year":"2014","unstructured":"Jonas Zaddach , Luca Bruno , Aurelien Francillon , Davide Balzarotti , 2014 . AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems ' Firmwares. In NDSS , Vol. 23. 1 -- 16 . Jonas Zaddach, Luca Bruno, Aurelien Francillon, Davide Balzarotti, et al. 2014. AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares. In NDSS, Vol. 23. 1--16.","journal-title":"Firmwares. In NDSS"}],"event":{"name":"AST '22: IEEE\/ACM 3rd International Conference on Automation of Software Test","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE TCSC IEEE Technical Committee on Scalable Computing"],"location":"Pittsburgh Pennsylvania","acronym":"AST '22"},"container-title":["Proceedings of the 3rd ACM\/IEEE International Conference on Automation of Software Test"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524481.3527215","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524481.3527215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:59Z","timestamp":1750182659000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524481.3527215"}},"subtitle":["cross-platform execution migration for debugging"],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":25,"alternative-id":["10.1145\/3524481.3527215","10.1145\/3524481"],"URL":"https:\/\/doi.org\/10.1145\/3524481.3527215","relation":{},"subject":[],"published":{"date-parts":[[2022,5,17]]},"assertion":[{"value":"2022-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}