{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:21Z","timestamp":1750220241466,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JSPS KAKENHI","award":["17KT0081"],"award-info":[{"award-number":["17KT0081"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545969","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"380-394","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks"],"prefix":"10.1145","author":[{"given":"Toshinori","family":"Usui","sequence":"first","affiliation":[{"name":"NTT Social Informatics Laboratories, Japan"}]},{"given":"Yuto","family":"Otsuki","sequence":"additional","affiliation":[{"name":"NTT Security (Japan) KK, Japan"}]},{"given":"Yuhei","family":"Kawakoya","sequence":"additional","affiliation":[{"name":"NTT Social Informatics Laboratories, Japan"}]},{"given":"Makoto","family":"Iwamura","sequence":"additional","affiliation":[{"name":"NTT Social Informatics Laboratories, Japan"}]},{"given":"Kanta","family":"Matsuura","sequence":"additional","affiliation":[{"name":"Institute of Industrial Science, The University of Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420952"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.17"},{"volume-title":"Botnet Detection. Vol.\u00a036","author":"Brumley David","key":"e_1_3_2_1_3_1","unstructured":"David Brumley , Cody Hartwig , Zhenkai Liang , James Newsome , Dawn Song , and Heng Yin . 2008. Automatically Identifying Trigger-based Behavior in Malware . In Botnet Detection. Vol.\u00a036 . Springer , 65\u201388. David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, and Heng Yin. 2008. Automatically Identifying Trigger-based Behavior in Malware. In Botnet Detection. Vol.\u00a036. Springer, 65\u201388."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541977"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23483"},{"key":"e_1_3_2_1_7_1","unstructured":"Microsoft Threat\u00a0Intelligence Center. 2020. Ghost in the shell: Investigating web shell attacks. https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/04\/ghost-in-the-shell-investigating-web-shell-attacks\/. (accessed: 2022-06-19).  Microsoft Threat\u00a0Intelligence Center. 2020. Ghost in the shell: Investigating web shell attacks. https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/04\/ghost-in-the-shell-investigating-web-shell-attacks\/. (accessed: 2022-06-19)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243823"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 26th Annual Network and Distributed System Security Symposium(NDSS \u201919)","author":"Chua Zheng\u00a0Leong","year":"2019","unstructured":"Zheng\u00a0Leong Chua , Yanhao Wang , Teodora Baluta , Prateek Saxena , Zhenkai Liang , and Purui Su . 2019 . One Engine To Serve\u2019em All: Inferring Taint Rules Without Architectural Semantics . In Proceedings of the 26th Annual Network and Distributed System Security Symposium(NDSS \u201919) . Internet Society. Zheng\u00a0Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, and Purui Su. 2019. One Engine To Serve\u2019em All: Inferring Taint Rules Without Architectural Semantics. In Proceedings of the 26th Annual Network and Distributed System Security Symposium(NDSS \u201919). Internet Society."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046739"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation(OSDI \u201908)","author":"Cozzie Anthony","year":"2008","unstructured":"Anthony Cozzie , Frank Stratton , Hui Xue , and Samuel\u00a0 T King . 2008 . Digging for Data Structures .. In Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation(OSDI \u201908) . 255\u2013266. Anthony Cozzie, Frank Stratton, Hui Xue, and Samuel\u00a0T King. 2008. Digging for Data Structures.. In Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation(OSDI \u201908). 255\u2013266."},{"key":"e_1_3_2_1_14_1","unstructured":"Cybersecurity and Infrastructure\u00a0Security Agency. 2015. Compromised Web Servers and Web Shells - Threat Awareness and Guidance. https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/TA15-314A. (accessed: 2022-06-19).  Cybersecurity and Infrastructure\u00a0Security Agency. 2015. Compromised Web Servers and Web Shells - Threat Awareness and Guidance. https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/TA15-314A. (accessed: 2022-06-19)."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses(RAID \u201919)","author":"Davanian Ali","year":"2019","unstructured":"Ali Davanian , Zhenxiao Qi , Yu Qu , and Heng Yin . 2019 . DECAF++: Elastic whole-system dynamic taint analysis . In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses(RAID \u201919) . 31\u201345. Ali Davanian, Zhenxiao Qi, Yu Qu, and Heng Yin. 2019. DECAF++: Elastic whole-system dynamic taint analysis. In Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses(RAID \u201919). 31\u201345."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774482"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843859.2843867"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1183929"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23237"},{"key":"e_1_3_2_1_21_1","unstructured":"Python\u00a0Software Foundation. 2022. CPython. https:\/\/github.com\/python\/cpython. (accessed: 2021-02-24).  Python\u00a0Software Foundation. 2022. CPython. https:\/\/github.com\/python\/cpython. (accessed: 2021-02-24)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69659-1_21"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243866"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554909"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610407"},{"key":"e_1_3_2_1_26_1","unstructured":"Hex-Rays. 2022. IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/. (accessed: 2021-02-24).  Hex-Rays. 2022. IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/. (accessed: 2021-02-24)."},{"key":"e_1_3_2_1_27_1","unstructured":"Hex-Rays. 2022. IDAPython. https:\/\/github.com\/idapython\/src. (accessed: 2021-02-24).  Hex-Rays. 2022. IDAPython. https:\/\/github.com\/idapython\/src. (accessed: 2021-02-24)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098995"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 26th Annual Network and Distributed System Security Symposium(NDSS \u201911)","author":"Kang Min\u00a0Gyung","year":"2011","unstructured":"Min\u00a0Gyung Kang , Stephen McCamant , Pongsin Poosankam , and Dawn Song . 2011 . DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation . In Proceedings of the 26th Annual Network and Distributed System Security Symposium(NDSS \u201911) . Internet Society. Min\u00a0Gyung Kang, Stephen McCamant, Pongsin Poosankam, and Dawn Song. 2011. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In Proceedings of the 26th Annual Network and Distributed System Security Symposium(NDSS \u201911). Internet Society."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314399"},{"key":"e_1_3_2_1_31_1","volume-title":"Platform-Independent Dynamic Taint Analysis for JavaScript","author":"Karim Rezwana","year":"2018","unstructured":"Rezwana Karim , Frank Tip , Alena Sochurkova , and Koushik Sen . 2018. Platform-Independent Dynamic Taint Analysis for JavaScript . IEEE Transactions on Software Engineering( 2018 ). Rezwana Karim, Frank Tip, Alena Sochurkova, and Koushik Sen. 2018. Platform-Independent Dynamic Taint Analysis for JavaScript. IEEE Transactions on Software Engineering(2018)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.27.297"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.16"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813642"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.10"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134099"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101923"},{"key":"e_1_3_2_1_39_1","volume-title":"June","author":"Labs McAfee","year":"2021","unstructured":"McAfee Labs . 2021. McAfee Labs Threats Report , June 2021 . https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-threats-jun-2021.pdf. (accessed: 2022-06-19). McAfee Labs. 2021. McAfee Labs Threats Report, June 2021. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-threats-jun-2021.pdf. (accessed: 2022-06-19)."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 18th Annual Network and Distributed System Security Symposium(NDSS \u201911)","author":"Lee JongHyup","year":"2011","unstructured":"JongHyup Lee , Thanassis Avgerinos , and David Brumley . 2011 . TIE: Principled Reverse Engineering of Types in Binary Programs . In Proceedings of the 18th Annual Network and Distributed System Security Symposium(NDSS \u201911) . Internet Society, 1\u201318. JongHyup Lee, Thanassis Avgerinos, and David Brumley. 2011. TIE: Principled Reverse Engineering of Types in Binary Programs. In Proceedings of the 18th Annual Network and Distributed System Security Symposium(NDSS \u201911). Internet Society, 1\u201318."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516703"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 2008 USENIX Annual Technical Conference(ATC \u201908)","author":"Livshits V\u00a0Benjamin","year":"2008","unstructured":"V\u00a0Benjamin Livshits and Weidong Cui . 2008 . Spectator: Detection and Containment of JavaScript Worms .. In Proceedings of the 2008 USENIX Annual Technical Conference(ATC \u201908) . USENIX Association, 335\u2013348. V\u00a0Benjamin Livshits and Weidong Cui. 2008. Spectator: Detection and Containment of JavaScript Worms.. In Proceedings of the 2008 USENIX Annual Technical Conference(ATC \u201908). USENIX Association, 335\u2013348."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_14"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWSESS.2009.5068455"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359821"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363199"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 12th Annual Network and Distributed Systems Security Symposium(NDSS \u201905)","author":"Newsome James","year":"2005","unstructured":"James Newsome and Dawn Song . 2005 . Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In Proceedings of the 12th Annual Network and Distributed Systems Security Symposium(NDSS \u201905) . Internet Society, 1\u201317. James Newsome and Dawn Song. 2005. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the 12th Annual Network and Distributed Systems Security Symposium(NDSS \u201905). Internet Society, 1\u201317."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 8th International Workshop on Recent Advances in Intrusion Detection(RAID \u201905)","author":"Pietraszek Tadeusz","year":"2005","unstructured":"Tadeusz Pietraszek and Chris\u00a0Vanden Berghe . 2005 . Defending Against Injection Attacks Through Context-Sensitive String Evaluation . In Proceedings of the 8th International Workshop on Recent Advances in Intrusion Detection(RAID \u201905) . Springer, 124\u2013145. Tadeusz Pietraszek and Chris\u00a0Vanden Berghe. 2005. Defending Against Injection Attacks Through Context-Sensitive String Evaluation. In Proceedings of the 8th International Workshop on Recent Advances in Intrusion Detection(RAID \u201905). Springer, 124\u2013145."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217938"},{"key":"e_1_3_2_1_51_1","unstructured":"ReactOS Project. 2022. ReactOS. https:\/\/www.reactos.org\/. (accessed: 2021-05-03).  ReactOS Project. 2022. ReactOS. https:\/\/www.reactos.org\/. (accessed: 2021-05-03)."},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 3rd USENIX Workshop on Offensive Technologies(WOOT \u201909)","author":"Rolles Rolf","year":"2009","unstructured":"Rolf Rolles . 2009 . Unpacking Virtualization Obfuscators . In Proceedings of the 3rd USENIX Workshop on Offensive Technologies(WOOT \u201909) . USENIX. Rolf Rolles. 2009. Unpacking Virtualization Obfuscators. In Proceedings of the 3rd USENIX Workshop on Offensive Technologies(WOOT \u201909). USENIX."},{"key":"e_1_3_2_1_53_1","volume-title":"Triton: Concolic Execution Framework","author":"Saudel Florent","year":"2015","unstructured":"Florent Saudel and Jonathan Salwan . 2015 . Triton: Concolic Execution Framework . http:\/\/shell-storm.org\/talks\/SSTIC2015_English_slide_detailed_version_Triton_Concolic_Execution_FrameWork_FSaudel_JSalwan.pdf. (accessed: 2021-08-09). Florent Saudel and Jonathan Salwan. 2015. Triton: Concolic Execution Framework. http:\/\/shell-storm.org\/talks\/SSTIC2015_English_slide_detailed_version_Triton_Concolic_Execution_FrameWork_FSaudel_JSalwan.pdf. (accessed: 2021-08-09)."},{"key":"e_1_3_2_1_54_1","volume-title":"Automatic Reverse Engineering of Malware Emulators. In 2009 30th IEEE Symposium on Security and Privacy(SP \u201909)","author":"Sharif Monirul","year":"2009","unstructured":"Monirul Sharif , Andrea Lanzi , Jonathon Giffin , and Wenke Lee . 2009 . Automatic Reverse Engineering of Malware Emulators. In 2009 30th IEEE Symposium on Security and Privacy(SP \u201909) . IEEE, 94\u2013109. Monirul Sharif, Andrea Lanzi, Jonathon Giffin, and Wenke Lee. 2009. Automatic Reverse Engineering of Malware Emulators. In 2009 30th IEEE Symposium on Security and Privacy(SP \u201909). IEEE, 94\u2013109."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00022"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519073"},{"key":"e_1_3_2_1_57_1","unstructured":"VMProtect Software. 2022. VMProtect. https:\/\/vmpsoft.com\/. (accessed: 2020-04-27).  VMProtect Software. 2022. VMProtect. https:\/\/vmpsoft.com\/. (accessed: 2020-04-27)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_59_1","unstructured":"The\u00a0PyPy Team. 2022. PyPy. https:\/\/www.pypy.org\/. (accessed: 2021-05-06).  The\u00a0PyPy Team. 2022. PyPy. https:\/\/www.pypy.org\/. (accessed: 2021-05-06)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_12"},{"key":"e_1_3_2_1_61_1","volume-title":"Article 5 (Jan.","author":"Usui Toshinori","year":"2021","unstructured":"Toshinori Usui , Yuto Otsuki , Tomonori Ikuse , Yuhei Kawakoya , Makoto Iwamura , Jun Miyoshi , and Kanta Matsuura . 2021. Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers. Digital Threats: Research and Practice 2, 1 , Article 5 (Jan. 2021 ), 31\u00a0pages. Toshinori Usui, Yuto Otsuki, Tomonori Ikuse, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, and Kanta Matsuura. 2021. Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers. Digital Threats: Research and Practice 2, 1, Article 5 (Jan. 2021), 31\u00a0pages."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359849"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_14"},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the 22nd Annual Network and Distributed System Security Symposium(NDSS \u201907)","author":"Vogt Philipp","year":"2007","unstructured":"Philipp Vogt , Florian Nentwich , Nenad Jovanovic , Engin Kirda , Christopher Kruegel , and Giovanni Vigna . 2007 . Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis .. In Proceedings of the 22nd Annual Network and Distributed System Security Symposium(NDSS \u201907) . Internet Society. Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. 2007. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.. In Proceedings of the 22nd Annual Network and Distributed System Security Symposium(NDSS \u201907). Internet Society."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_13"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483788"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.4360070105"},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the 15th Annual Network and Distributed System Security Symposium(NDSS \u201908","author":"Wondracek Gilbert","year":"2008","unstructured":"Gilbert Wondracek , Paolo\u00a0Milani Comparetti , Christopher Kruegel , Engin Kirda , and Scuola Superiore\u00a0S Anna . 2008 . Automatic Network Protocol Analysis .. In Proceedings of the 15th Annual Network and Distributed System Security Symposium(NDSS \u201908 , Vol.\u00a08). Internet Society, 1\u201314. Gilbert Wondracek, Paolo\u00a0Milani Comparetti, Christopher Kruegel, Engin Kirda, and Scuola Superiore\u00a0S Anna. 2008. Automatic Network Protocol Analysis.. In Proceedings of the 15th Annual Network and Distributed System Security Symposium(NDSS \u201908, Vol.\u00a08). Internet Society, 1\u201314."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASSET.1999.756769"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243827"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660352"},{"key":"e_1_3_2_1_72_1","volume-title":"TEMU: Binary Code Analysis via Whole-System Layered Annotative Execution. Technical Report. EECS Department","author":"Yin Heng","year":"2010","unstructured":"Heng Yin and Dawn Song . 2010 . TEMU: Binary Code Analysis via Whole-System Layered Annotative Execution. Technical Report. EECS Department , University of California , Berkeley. Heng Yin and Dawn Song. 2010. TEMU: Binary Code Analysis via Whole-System Layered Annotative Execution. Technical Report. EECS Department, University of California, Berkeley."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_8"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23331"}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2022","location":"Limassol Cyprus"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545969","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:27Z","timestamp":1750188627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":75,"alternative-id":["10.1145\/3545948.3545969","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545969","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}