{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:40:06Z","timestamp":1755852006747,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T00:00:00Z","timestamp":1672876800000},"content-version":"vor","delay-in-days":87,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CCF-1919197, CCF-1908504"],"award-info":[{"award-number":["CCF-1919197, CCF-1908504"]}]},{"name":"DARPA","award":["N6600120C4031"],"award-info":[{"award-number":["N6600120C4031"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3561152","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Cornucopia : A Framework for Feedback Guided Generation of Binaries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6912-3840","authenticated-orcid":false,"given":"Vidush","family":"Singhal","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, Purdue University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0588-6440","authenticated-orcid":false,"given":"Akul Abhilash","family":"Pillai","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Purdue University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9900-2804","authenticated-orcid":false,"given":"Charitha","family":"Saumya","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Purdue University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6827-345X","authenticated-orcid":false,"given":"Milind","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Purdue University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5124-6818","authenticated-orcid":false,"given":"Aravind","family":"Machiry","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Purdue University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"volume-title":"How Machine Learning Is Solving the Binary Function Similarity Problem. In 31st USENIX Security Symposium (USENIX Security 22)","unstructured":"2022. How Machine Learning Is Solving the Binary Function Similarity Problem. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/marcelli","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/3359789.3359823"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.3390\/e22050575"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1314257.1314263"},{"unstructured":"Dennis Andriesse. 2018. Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation Analysis and Disassembly. no starch press.","key":"e_1_3_2_1_5_1"},{"unstructured":"Angr. 2021. Angr Issues. https:\/\/github.com\/angr\/angr\/issues?q=is%3Aissue+error.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2628071.2628092"},{"key":"e_1_3_2_1_8_1","volume-title":"25th Automated Reasoning Workshop. 23","author":"Armstrong Alasdair","year":"2018","unstructured":"Alasdair Armstrong, Thomas Bauereiss, Brian Campbell, Shaked Flur, Kathryn\u00a0E Gray, Prashanth Mundkur, Robert\u00a0M Norton, Christopher Pulte, Alastair Reid, Peter Sewell, 2018. Detailed models of instruction set architectures: From pseudocode to formal semantics. In 25th Automated Reasoning Workshop. 23."},{"volume-title":"23rd {USENIX} Security Symposium ({USENIX} Security 14). 845\u2013860.","author":"Bao Tiffany","unstructured":"Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. {BYTEWEIGHT}: Learning to recognize functions in binary code. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 845\u2013860.","key":"e_1_3_2_1_9_1"},{"volume-title":"Annual international cryptology conference","author":"Barak Boaz","unstructured":"Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. 2001. On the (im) possibility of obfuscating programs. In Annual international cryptology conference. Springer, 1\u201318.","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/j.procs.2015.10.114"},{"unstructured":"Craig Blackmore Oliver Ray and Kerstin Eder. 2017. Automatically tuning the gcc compiler to optimize the performance of applications running on embedded systems. arXiv preprint arXiv:1703.08228(2017).","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2699682"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/2896499"},{"unstructured":"Pan Cake. 2017. Libre and Portable Reverse Engineering Framework. https:\/\/rada.re\/n\/.","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1007\/978-3-030-20652-9_8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ICPC.2009.5090041"},{"unstructured":"Christian Collberg. 2021. The tigress c obfuscator. https:\/\/tigress.wtf\/.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/268946.268962"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/3314221.3314601"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/SP.2019.00003"},{"key":"e_1_3_2_1_22_1","first-page":"3","article-title":"Graph-based comparison of executable objects (english version)","volume":"5","author":"Dullien Thomas","year":"2005","unstructured":"Thomas Dullien and Rolf Rolles. 2005. Graph-based comparison of executable objects (english version). Sstic 5, 1 (2005), 3.","journal-title":"Sstic"},{"unstructured":"Michael Eager. 2012. The DWARF Debugging Standard. https:\/\/dwarfstd.org\/.","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1007\/978-3-642-24861-0_12"},{"unstructured":"Jos\u00e9\u00a0Angel Galindo David Benavides and Sergio Segura. 2010. Debian Packages Repositories as Software Product Line Models. Towards Automated Analysis.. In ACoTA. Citeseer 29\u201334.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 28th C&ESAR(2021)","author":"Grelot Frederic","year":"2021","unstructured":"Frederic Grelot, Sebastien Larinier, and Marie Salmon. 2021. Automation of Binary Analysis: From Open Source Collection to Threat Intelligence. Proceedings of the 28th C&ESAR(2021), 41."},{"unstructured":"Aric Hagberg and Drew Conway. 2020. NetworkX: Network Analysis with Python.","key":"e_1_3_2_1_27_1"},{"unstructured":"Nadav Har\u2019El. 2017. x86 Floating point exceptions - incorrect support?https:\/\/bugs.launchpad.net\/qemu\/+bug\/1668041.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/3243734.3243866"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1016\/j.infsof.2018.07.007"},{"volume-title":"Moving Target Defense","author":"Jackson Todd","unstructured":"Todd Jackson, Babak Salamat, Andrei Homescu, Karthikeyan Manivannan, Gregor Wagner, Andreas Gal, Stefan Brunthaler, Christian Wimmer, and Michael Franz. 2011. Compiler-generated software diversity. In Moving Target Defense. Springer, 77\u201398.","key":"e_1_3_2_1_31_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/SMC.2017.8122653"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_2_1_34_1","volume-title":"SoK: Automatic Deobfuscation of Virtualization-protected Applications. In The 16th International Conference on Availability, Reliability and Security. 1\u201315","author":"Kochberger Patrick","year":"2021","unstructured":"Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, and Edgar Weippl. 2021. SoK: Automatic Deobfuscation of Virtualization-protected Applications. In The 16th International Conference on Availability, Reliability and Security. 1\u201315."},{"volume-title":"Adversarial malware binaries: Evading deep learning for malware detection in executables. In 2018 26th European signal processing conference (EUSIPCO)","author":"Kolosnjaji Bojan","unstructured":"Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, and Fabio Roli. 2018. Adversarial malware binaries: Evading deep learning for malware detection in executables. In 2018 26th European signal processing conference (EUSIPCO). IEEE, 533\u2013537.","key":"e_1_3_2_1_35_1"},{"doi-asserted-by":"crossref","unstructured":"Jesse Kornblum. 2006. Identifying almost identical files using context triggered piecewise hashing. Digital investigation 3(2006) 91\u201397.","key":"e_1_3_2_1_36_1","DOI":"10.1016\/j.diin.2006.06.015"},{"key":"e_1_3_2_1_37_1","volume-title":"International Conference on Security and Privacy in Communication Systems. Springer, 206\u2013224","author":"Lan Pengwei","year":"2017","unstructured":"Pengwei Lan, Pei Wang, Shuai Wang, and Dinghao Wu. 2017. Lambda obfuscation. In International Conference on Security and Privacy in Communication Systems. Springer, 206\u2013224."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_39_1","first-page":"3","article-title":"Obfuscating C++ programs via control flow flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae","volume":"30","author":"L\u00e1szl\u00f3 T\u0131mea","year":"2009","unstructured":"T\u0131mea L\u00e1szl\u00f3 and \u00c1kos Kiss. 2009. Obfuscating C++ programs via control flow flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae, Sectio Computatorica 30, 1 (2009), 3\u201319.","journal-title":"Sectio Computatorica"},{"unstructured":"lcamtuf. 2014. Binary fuzzing strategies: what works what doesn\u2019t. https:\/\/lcamtuf.blogspot.com\/2014\/08\/binary-fuzzing-strategies-what-works.html.","key":"e_1_3_2_1_40_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1145\/1772954.1772964"},{"key":"e_1_3_2_1_42_1","volume-title":"When Function Signature Recovery Meets Compiler Optimization. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 36\u201352","author":"Lin Yan","year":"2021","unstructured":"Yan Lin and Debin Gao. 2021. When Function Signature Recovery Meets Compiler Optimization. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 36\u201352."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1109\/ICSE.2017.28"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the International Conference on Software Engineering Research and Practice (SERP06)","author":"Madou Matias","year":"2006","unstructured":"Matias Madou, Bertrand Anckaert, Bruno De\u00a0Bus, Koen De\u00a0Bosschere, Jan Cappaert, and Bart Preneel. 2006. On the effectiveness of source code transformations for binary obfuscation. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP06). CSREA Press, 527\u2013533."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1007\/978-3-030-22038-9_15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1145\/3433210.3453115"},{"key":"e_1_3_2_1_47_1","volume-title":"Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education.","author":"Nagra Jasvir","year":"2009","unstructured":"Jasvir Nagra and Christian Collberg. 2009. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1109\/ASE.2013.6693078"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1109\/SP40001.2021.00012"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1145\/3468264.3468607"},{"key":"e_1_3_2_1_51_1","volume-title":"USENIX Security Symposium. 275\u2013290","author":"Popov V","year":"2007","unstructured":"Igor\u00a0V Popov, Saumya\u00a0K Debray, and Gregory\u00a0R Andrews. 2007. Binary Obfuscation Using Signals.. In USENIX Security Symposium. 275\u2013290."},{"unstructured":"randare. 2021. Radare2 Issues. https:\/\/github.com\/radareorg\/radare2\/issues?q=is%3Aissue+error.","key":"e_1_3_2_1_52_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/3453483.3454035"},{"unstructured":"Rolf Rolles. 2014. COMPILER OPTIMIZATIONS FOR REVERSE ENGINEERS. https:\/\/www.msreverseengineering.com\/blog\/2014\/6\/23\/compiler-optimizations-for-reverse-engineers.","key":"e_1_3_2_1_54_1"},{"volume-title":"30th {USENIX} Security Symposium ({USENIX} Security 21). 2795\u20132809.","author":"Salls Christopher","unstructured":"Christopher Salls, Chani Jindal, Jake Corina, Christopher Kruegel, and Giovanni Vigna. 2021. Token-Level Fuzzing. In 30th {USENIX} Security Symposium ({USENIX} Security 21). 2795\u20132809.","key":"e_1_3_2_1_55_1"},{"doi-asserted-by":"crossref","unstructured":"Ina Schaefer Rick Rabiser Dave Clarke Lorenzo Bettini David Benavides Goetz Botterweck Animesh Pathak Salvador Trujillo and Karina Villela. 2012. Software diversity: state of the art and perspectives.","key":"e_1_3_2_1_56_1","DOI":"10.1007\/s10009-012-0253-y"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1109\/SP.2016.17"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1016\/j.sysarc.2020.101861"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.48550\/ARXIV.2209.06694"},{"volume-title":"The compiler design handbook: optimizations and machine code generation","author":"Srikant YN","unstructured":"YN Srikant and Priti Shankar. 2018. The compiler design handbook: optimizations and machine code generation. CRC Press.","key":"e_1_3_2_1_60_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.1145\/2931037.2931074"},{"unstructured":"Peter Szor and Peter Ferrie. 2001. Hunting for metamorphic. In Virus bulletin conference. Prague.","key":"e_1_3_2_1_62_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_63_1","DOI":"10.1007\/978-3-030-58768-0_14"},{"volume-title":"Assessment of source code obfuscation techniques. In 2016 IEEE 16th international working conference on source code analysis and manipulation (SCAM)","author":"Viticchi\u00e9 Alessio","unstructured":"Alessio Viticchi\u00e9, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella, and Roberto Tiella. 2016. Assessment of source code obfuscation techniques. In 2016 IEEE 16th international working conference on source code analysis and manipulation (SCAM). IEEE, 11\u201320.","key":"e_1_3_2_1_64_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_65_1","DOI":"10.1109\/MALWARE.2018.8659363"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_66_1","DOI":"10.1145\/2818000.2818017"},{"key":"e_1_3_2_1_67_1","volume-title":"Ramblr: Making Reassembly Great Again.. In NDSS.","author":"Wang Ruoyu","year":"2017","unstructured":"Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, and Giovanni Vigna. 2017. Ramblr: Making Reassembly Great Again.. In NDSS."},{"key":"e_1_3_2_1_68_1","volume-title":"International Conference on Security and Privacy in Communication Systems. Springer, 225\u2013244","author":"Wang Yan","year":"2017","unstructured":"Yan Wang, Shuai Wang, Pei Wang, and Dinghao Wu. 2017. Turing obfuscation. In International Conference on Security and Privacy in Communication Systems. Springer, 225\u2013244."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_69_1","DOI":"10.1145\/3316415"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_70_1","DOI":"10.1145\/1866307.1866368"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.1145\/1866307.1866368"},{"key":"e_1_3_2_1_72_1","volume-title":"Constructing precise control flow graphs from binaries","author":"Xu Liang","year":"2009","unstructured":"Liang Xu, Fangqi Sun, and Zhendong Su. 2009. Constructing precise control flow graphs from binaries. University of California, Davis, Tech. Rep(2009)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_73_1","DOI":"10.1109\/ACCESS.2019.2917668"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_74_1","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_75_1","article-title":"Kernel korner: The ELF object file format: Introduction","volume":"1995","author":"Youngdale Eric","year":"1995","unstructured":"Eric Youngdale. 1995. Kernel korner: The ELF object file format: Introduction. Linux Journal 1995, 12es (1995), 7\u2013es.","journal-title":"Linux Journal"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_76_1","DOI":"10.1109\/32.988498"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_77_1","DOI":"10.1109\/SP40001.2021.00051"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_78_1","DOI":"10.1145\/3360563"}],"event":{"acronym":"ASE '22","name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3561152","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3561152","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3561152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:25:44Z","timestamp":1755851144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3561152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":78,"alternative-id":["10.1145\/3551349.3561152","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3561152","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}