{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:21:52Z","timestamp":1763018512266,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ONR","award":["N00014-21-C-1032"],"award-info":[{"award-number":["N00014-21-C-1032"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,8]]},"DOI":"10.1145\/3546096.3546112","type":"proceedings-article","created":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T16:05:58Z","timestamp":1659629158000},"page":"129-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A Broad Comparative Evaluation of x86-64 Binary Rewriters"],"prefix":"10.1145","author":[{"given":"Eric","family":"Schulte","sequence":"first","affiliation":[{"name":"GrammaTech, United States"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael D.","family":"Brown","sequence":"additional","affiliation":[{"name":"Trail of Bits, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vlad","family":"Folts","sequence":"additional","affiliation":[{"name":"GrammaTech, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,8,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AFL++. 2022. AFL++. https:\/\/aflplus.plus\/.  AFL++. 2022. AFL++. https:\/\/aflplus.plus\/."},{"key":"e_1_3_2_1_2_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Andriesse Dennis","year":"2016","unstructured":"Dennis Andriesse , Xi Chen , Victor van\u00a0der Veen , Asia Slowinska , and Herbert Bos . 2016 . An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 583\u2013600. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/andriesse Dennis Andriesse, Xi Chen, Victor van\u00a0der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 583\u2013600. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/andriesse"},{"key":"e_1_3_2_1_3_1","volume-title":"\u00a0Hamlen","author":"Bauman Erick","year":"2018","unstructured":"Erick Bauman , Zhiqiang Lin , and Kevin W . \u00a0Hamlen . 2018 . Superset Disassembly : Statically Rewriting x86 Binaries Without Heuristics. In NDSS. https:\/\/doi.org\/10.14722\/ndss.2018.23304 10.14722\/ndss.2018.23304 Erick Bauman, Zhiqiang Lin, and Kevin W.\u00a0Hamlen. 2018. Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. In NDSS. https:\/\/doi.org\/10.14722\/ndss.2018.23304"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 10th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools","author":"R.","year":"2024","unstructured":"Andrew\u00a0 R. Bernat and Barton\u00a0P. Miller. 2011. Anywhere, Any-time Binary Instrumentation . In Proceedings of the 10th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools ( Szeged, Hungary) (PASTE \u201911). ACM, New York, NY, USA, 9\u201316. https:\/\/doi.org\/10.1145\/ 2024 569.2024572 10.1145\/2024569.2024572 Andrew\u00a0R. Bernat and Barton\u00a0P. Miller. 2011. Anywhere, Any-time Binary Instrumentation. In Proceedings of the 10th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools (Szeged, Hungary) (PASTE \u201911). ACM, New York, NY, USA, 9\u201316. https:\/\/doi.org\/10.1145\/2024569.2024572"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385964"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_7_1","volume-title":"ReCon 2014 Conference","author":"Dinaburg Artem","year":"2014","unstructured":"Artem Dinaburg and Andrew Ruef . 2014 . McSema: Static translation of x86 instructions to llvm . In ReCon 2014 Conference , Montreal, Canada. Artem Dinaburg and Andrew Ruef. 2014. McSema: Static translation of x86 instructions to llvm. In ReCon 2014 Conference, Montreal, Canada."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Sushant Dinesh. 2019. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. Ph.\u00a0D. Dissertation. figshare.  Sushant Dinesh. 2019. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. Ph.\u00a0D. Dissertation. figshare.","DOI":"10.1109\/SP40000.2020.00009"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385972"},{"key":"e_1_3_2_1_10_1","volume-title":"Datalog Disassembly. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Flores-Montoya Antonio","year":"2020","unstructured":"Antonio Flores-Montoya and Eric Schulte . 2020 . Datalog Disassembly. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 1075\u20131092. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/flores-montoya Antonio Flores-Montoya and Eric Schulte. 2020. Datalog Disassembly. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1075\u20131092. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/flores-montoya"},{"key":"e_1_3_2_1_11_1","unstructured":"Inc. Galois. 2021. ReOpt. https:\/\/github.com\/GaloisInc\/reopt.  Inc. Galois. 2021. ReOpt. https:\/\/github.com\/GaloisInc\/reopt."},{"key":"e_1_3_2_1_12_1","unstructured":"Google. 2022. Bloaty: a size profiler for binaries. https:\/\/github.com\/google\/bloaty.  Google. 2022. Bloaty: a size profiler for binaries. https:\/\/github.com\/google\/bloaty."},{"key":"e_1_3_2_1_13_1","unstructured":"Inc. Grammatech. 2022. Lifter Evaluation. https:\/\/GitLab.com\/GrammaTech\/lifter-eval.  Inc. Grammatech. 2022. Lifter Evaluation. https:\/\/GitLab.com\/GrammaTech\/lifter-eval."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2014.14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Pantea Kiaei Cees-Bart Breunesse Mohsen Ahmadi Patrick Schaumont and Jasper van Woudenberg. 2020. Rewrite to Reinforce: Rewriting the Binary to Apply Countermeasures against Fault Injection. arXiv preprint arXiv:2011.14067(2020).  Pantea Kiaei Cees-Bart Breunesse Mohsen Ahmadi Patrick Schaumont and Jasper van Woudenberg. 2020. Rewrite to Reinforce: Rewriting the Binary to Apply Countermeasures against Fault Injection. arXiv preprint arXiv:2011.14067(2020).","DOI":"10.1109\/DAC18074.2021.9586278"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452024"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411502.3418429"},{"key":"e_1_3_2_1_18_1","unstructured":"Zephyr\u00a0Software LLC.2022. IRDB Cookbook Examples. https:\/\/git.zephyr-software.com\/opensrc\/irdb-cookbook-examples.  Zephyr\u00a0Software LLC.2022. IRDB Cookbook Examples. https:\/\/git.zephyr-software.com\/opensrc\/irdb-cookbook-examples."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931047"},{"key":"e_1_3_2_1_21_1","unstructured":"Microsoft. 2022. mctoll. https:\/\/github.com\/microsoft\/llvm-mctoll.  Microsoft. 2022. mctoll. https:\/\/github.com\/microsoft\/llvm-mctoll."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00012"},{"key":"e_1_3_2_1_23_1","unstructured":"Phoenix. 2021. Phoenix. https:\/\/github.com\/s3team\/phoenix.  Phoenix. 2021. Phoenix. https:\/\/github.com\/s3team\/phoenix."},{"volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 1733\u20131750.","author":"Qian Chenxiong","key":"e_1_3_2_1_24_1","unstructured":"Chenxiong Qian , Hong Hu , Mansour Alharthi , Pak\u00a0Ho Chung , Taesoo Kim , and Wenke Lee . 2019. {RAZOR} : A framework for post-deployment software debloating . In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1733\u20131750. Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak\u00a0Ho Chung, Taesoo Kim, and Wenke Lee. 2019. {RAZOR}: A framework for post-deployment software debloating. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1733\u20131750."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the USENIX Windows NT Workshop, Vol.\u00a01997","author":"Romer Ted","year":"1997","unstructured":"Ted Romer , Geoff Voelker , Dennis Lee , Alec Wolman , Wayne Wong , Hank Levy , Brian Bershad , and Brad Chen . 1997 . Instrumentation and optimization of Win32\/Intel executables using Etch . In Proceedings of the USENIX Windows NT Workshop, Vol.\u00a01997 . 1\u20138. Ted Romer, Geoff Voelker, Dennis Lee, Alec Wolman, Wayne Wong, Hank Levy, Brian Bershad, and Brad Chen. 1997. Instrumentation and optimization of Win32\/Intel executables using Etch. In Proceedings of the USENIX Windows NT Workshop, Vol.\u00a01997. 1\u20138."},{"key":"e_1_3_2_1_26_1","volume-title":"GTIRB: Intermediate Representation for Binaries. ArXiv abs\/1907.02859(2019).","author":"Schulte M.","year":"2019","unstructured":"Eric\u00a0 M. Schulte , Jonathan Dorn , Antonio Flores-Montoya , Aaron Ballman , and Tom Johnson . 2019 . GTIRB: Intermediate Representation for Binaries. ArXiv abs\/1907.02859(2019). Eric\u00a0M. Schulte, Jonathan Dorn, Antonio Flores-Montoya, Aaron Ballman, and Tom Johnson. 2019. GTIRB: Intermediate Representation for Binaries. ArXiv abs\/1907.02859(2019)."},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. 2001 Workshop on Binary Translation (WBT-2001)","author":"Schwarz Benjamin","year":"2001","unstructured":"Benjamin Schwarz , Saumya Debray , Gregory Andrews , and Matthew Legendre . 2001 . Plto: A link-time optimizer for the Intel IA-32 architecture . In Proc. 2001 Workshop on Binary Translation (WBT-2001) . Benjamin Schwarz, Saumya Debray, Gregory Andrews, and Matthew Legendre. 2001. Plto: A link-time optimizer for the Intel IA-32 architecture. In Proc. 2001 Workshop on Binary Translation (WBT-2001)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christopher Salls Nick Stephens Mario Polino Audrey Dutcher John Grosen Siji Feng Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. (2016).  Yan Shoshitaishvili Ruoyu Wang Christopher Salls Nick Stephens Mario Polino Audrey Dutcher John Grosen Siji Feng Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. (2016).","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671280"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062511"},{"key":"e_1_3_2_1_31_1","unstructured":"Inc. Trail\u00a0of Bits. 2022. Anvill. https:\/\/github.com\/lifting-bits\/anvill.  Inc. Trail\u00a0of Bits. 2022. Anvill. https:\/\/github.com\/lifting-bits\/anvill."},{"key":"e_1_3_2_1_32_1","unstructured":"Inc. Trail\u00a0of Bits. 2022. Rellic. https:\/\/github.com\/lifting-bits\/rellic.  Inc. Trail\u00a0of Bits. 2022. Rellic. https:\/\/github.com\/lifting-bits\/rellic."},{"key":"e_1_3_2_1_33_1","unstructured":"Inc. Trail\u00a0of Bits. 2022. Remill. https:\/\/github.com\/lifting-bits\/remill.  Inc. Trail\u00a0of Bits. 2022. Remill. https:\/\/github.com\/lifting-bits\/remill."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577061"},{"key":"e_1_3_2_1_35_1","volume-title":"Ramblr: Making Reassembly Great Again. In NDSS.","author":"Wang Ruoyu","year":"2017","unstructured":"Ruoyu Wang , Yan Shoshitaishvili , Antonio Bianchi , Aravind Machiry , John Grosen , Paul Grosen , Christopher Kruegel , and Giovanni Vigna . 2017 . Ramblr: Making Reassembly Great Again. In NDSS. Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, and Giovanni Vigna. 2017. Ramblr: Making Reassembly Great Again. In NDSS."},{"key":"e_1_3_2_1_36_1","volume-title":"Reassembleable Disassembling. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Wang Shuai","year":"2015","unstructured":"Shuai Wang , Pei Wang , and Dinghao Wu . 2015 . Reassembleable Disassembling. In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 627\u2013642. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/wang-shuai Shuai Wang, Pei Wang, and Dinghao Wu. 2015. Reassembleable Disassembling. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 627\u2013642. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/wang-shuai"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420995"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316415"},{"volume-title":"https:\/\/github.com\/columbia\/egalito-artefact\/blob\/master\/afl-support\/setup.sh#L25","author":"Williams-King David","key":"e_1_3_2_1_39_1","unstructured":"David Williams-King . 2022. AFL Setup . https:\/\/github.com\/columbia\/egalito-artefact\/blob\/master\/afl-support\/setup.sh#L25 . David Williams-King. 2022. AFL Setup. https:\/\/github.com\/columbia\/egalito-artefact\/blob\/master\/afl-support\/setup.sh#L25."},{"volume-title":"https:\/\/github.com\/columbia\/egalito-artefact\/blob\/master\/afl-support\/test-readelf.sh#L10","author":"Williams-King David","key":"e_1_3_2_1_40_1","unstructured":"David Williams-King . 2022. AFL Support . https:\/\/github.com\/columbia\/egalito-artefact\/blob\/master\/afl-support\/test-readelf.sh#L10 . David Williams-King. 2022. AFL Support. https:\/\/github.com\/columbia\/egalito-artefact\/blob\/master\/afl-support\/test-readelf.sh#L10."},{"key":"e_1_3_2_1_41_1","unstructured":"David Williams-King. 2022. README. https:\/\/github.com\/columbia\/egalito-artefact\/blob\/master\/README-afl.txt.  David Williams-King. 2022. README. https:\/\/github.com\/columbia\/egalito-artefact\/blob\/master\/README-afl.txt."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378470"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00029"},{"key":"e_1_3_2_1_44_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Xu Xiaoyang","year":"2019","unstructured":"Xiaoyang Xu , Masoud Ghaffarinia , Wenhao Wang , Kevin\u00a0 W Hamlen , and Zhiqiang Lin . 2019 . {CONFIRM}: Evaluating compatibility and relevance of control-flow integrity protections for modern software . In 28th USENIX Security Symposium (USENIX Security 19) . 1805\u20131821. Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin\u00a0W Hamlen, and Zhiqiang Lin. 2019. {CONFIRM}: Evaluating compatibility and relevance of control-flow integrity protections for modern software. In 28th USENIX Security Symposium (USENIX Security 19). 1805\u20131821."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"e_1_3_2_1_46_1","unstructured":"Mingwei Zhang and R Sekar. 2013. Control Flow Integrity for COTS Binaries.. In USENIX Security. 337\u2013352.  Mingwei Zhang and R Sekar. 2013. Control Flow Integrity for COTS Binaries.. In USENIX Security. 337\u2013352."}],"event":{"name":"CSET 2022: Cyber Security Experimentation and Test Workshop","acronym":"CSET 2022","location":"Virtual CA USA"},"container-title":["Proceedings of the 15th Workshop on Cyber Security Experimentation and Test"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546096.3546112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546096.3546112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:28Z","timestamp":1750183828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546096.3546112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,8]]},"references-count":46,"alternative-id":["10.1145\/3546096.3546112","10.1145\/3546096"],"URL":"https:\/\/doi.org\/10.1145\/3546096.3546112","relation":{},"subject":[],"published":{"date-parts":[[2022,8,8]]},"assertion":[{"value":"2022-08-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}