{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:29:16Z","timestamp":1761294556359,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3568562.3568628","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:25:01Z","timestamp":1669681501000},"page":"352-359","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Automatic Stub Generation for Dynamic Symbolic Execution of ARM binary"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3101-191X","authenticated-orcid":false,"given":"Anh T. V.","family":"Nguyen","sequence":"first","affiliation":[{"name":"Japan Advanced Institute of Science and Technology, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8050-7228","authenticated-orcid":false,"given":"Mizuhito","family":"Ogawa","sequence":"additional","affiliation":[{"name":"Japan Advanced Institute of Science and Technology, Japan"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Saswat Anand Corina Pasareanu and Willem Visser. 2007. JPF-SE: A symbolic execution extension to Java pathfinder Vol.\u00a04424. 134\u2013138.  Saswat Anand Corina Pasareanu and Willem Visser. 2007. JPF-SE: A symbolic execution extension to Java pathfinder Vol.\u00a04424. 134\u2013138.","DOI":"10.1007\/978-3-540-71209-1_12"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1707801.1706305"},{"volume-title":"The Logic of Public Announcements and Common Knowledge and Private Suspicions. In 7th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-98)","author":"Baltag A.","key":"e_1_3_2_1_3_1","unstructured":"A. Baltag , L.S. Moss , and S. Solecki . 1998 . The Logic of Public Announcements and Common Knowledge and Private Suspicions. In 7th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-98) . Morgan Kaufmann, 43\u201356. A. Baltag, L.S. Moss, and S. Solecki. 1998. The Logic of Public Announcements and Common Knowledge and Private Suspicions. In 7th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-98). Morgan Kaufmann, 43\u201356."},{"volume-title":"Awareness Logic: A Kripke-Based Rendition of the Heifetz-Meier-Schipper Model. In Dynamic Logic. New Trends and Applications - Third International Workshop, (DaL\u00ed 2020)","author":"Belardinelli G.","key":"e_1_3_2_1_4_1","unstructured":"G. Belardinelli and R.K. Rendsvig . 2020 . Awareness Logic: A Kripke-Based Rendition of the Heifetz-Meier-Schipper Model. In Dynamic Logic. New Trends and Applications - Third International Workshop, (DaL\u00ed 2020) (LNCS, Vol.\u00a012569). Springer, 33\u201350. G. Belardinelli and R.K. Rendsvig. 2020. Awareness Logic: A Kripke-Based Rendition of the Heifetz-Meier-Schipper Model. In Dynamic Logic. New Trends and Applications - Third International Workshop, (DaL\u00ed 2020)(LNCS, Vol.\u00a012569). Springer, 33\u201350."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Guillaume Bonfante Jose Fernandez Jean-Yves Marion Benjamin Rouxel Fabrice Sabatier and Aur\u00e9lien Thierry. 2015. CoDisasm. 745\u2013756.  Guillaume Bonfante Jose Fernandez Jean-Yves Marion Benjamin Rouxel Fabrice Sabatier and Aur\u00e9lien Thierry. 2015. CoDisasm. 745\u2013756.","DOI":"10.1145\/2810103.2813627"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"D. Brumley C. Hartwig Z. Liang J. Newsome D. Song and H. Yin. 2008. Automatically Identifying Trigger-based Behavior in Malware. In Book chapter in Botnet Analysis and Defense Editors Wenke Lee. 65\u201388.  D. Brumley C. Hartwig Z. Liang J. Newsome D. Song and H. Yin. 2008. Automatically Identifying Trigger-based Behavior in Malware. In Book chapter in Botnet Analysis and Defense Editors Wenke Lee. 65\u201388.","DOI":"10.1007\/978-0-387-68768-1_4"},{"key":"e_1_3_2_1_7_1","volume-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI.","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and D. Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI. Cristian Cadar, Daniel Dunbar, and D. Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI."},{"key":"e_1_3_2_1_8_1","volume-title":"Unleashing Mayhem on Binary Code. (05","author":"Cha Sang","year":"2012","unstructured":"Sang Cha , Thanassis Avgerinos , Alexandre Rebert , and David Brumley . 2012. Unleashing Mayhem on Binary Code. (05 2012 ), 380\u2013394. Sang Cha, Thanassis Avgerinos, Alexandre Rebert, and David Brumley. 2012. Unleashing Mayhem on Binary Code. (05 2012), 380\u2013394."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248487.1950396"},{"volume-title":"A Complete Formal Semantics of X86-64 User-Level Instruction Set Architecture","author":"Dasgupta Sandeep","key":"e_1_3_2_1_10_1","unstructured":"Sandeep Dasgupta , Daejun Park , Theodoros Kasampalis , Vikram\u00a0 S. Adve , and Grigore Ro\u015fu . 2019. A Complete Formal Semantics of X86-64 User-Level Instruction Set Architecture . In PLDI. Association for Computing Machinery , New York, NY, USA , 1133\u20131148. Sandeep Dasgupta, Daejun Park, Theodoros Kasampalis, Vikram\u00a0S. Adve, and Grigore Ro\u015fu. 2019. A Complete Formal Semantics of X86-64 User-Level Instruction Set Architecture. In PLDI. Association for Computing Machinery, New York, NY, USA, 1133\u20131148."},{"key":"e_1_3_2_1_11_1","volume-title":"BINSEC: Binary Code Analysis with Low-Level Regions. In TACAS.","author":"Djoudi A.","year":"2015","unstructured":"A. Djoudi and S\u00e9bastien Bardin . 2015 . BINSEC: Binary Code Analysis with Low-Level Regions. In TACAS. A. Djoudi and S\u00e9bastien Bardin. 2015. BINSEC: Binary Code Analysis with Low-Level Regions. In TACAS."},{"key":"e_1_3_2_1_12_1","unstructured":"Nguyen\u00a0Minh Hai Mizuhito Ogawa and Q.\u00a0T. Tho. 2015. Obfuscation Code Localization Based on CFG Generation of Malware. In FPS.  Nguyen\u00a0Minh Hai Mizuhito Ogawa and Q.\u00a0T. Tho. 2015. Obfuscation Code Localization Based on CFG Generation of Malware. In FPS."},{"volume-title":"Advances in Information and Computer Security.","author":"Izumida Tomonori","key":"e_1_3_2_1_13_1","unstructured":"Tomonori Izumida , Kokichi Futatsugi , and Akira Mori . 2010. A Generic Binary Analysis Method for Malware . In Advances in Information and Computer Security. Berlin, Heidelberg , 199\u2013216. Tomonori Izumida, Kokichi Futatsugi, and Akira Mori. 2010. A Generic Binary Analysis Method for Malware. In Advances in Information and Computer Security. Berlin, Heidelberg, 199\u2013216."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_15_1","volume-title":"HVC 2009(LNCS, Vol.\u00a06405)","author":"Li Xin","year":"2009","unstructured":"Xin Li and Mizuhito Ogawa . 2009 . Stacking-Based Context-Sensitive Points-to Analysis for Java. In Hardware and Software: Verification and Testing - 5th International Haifa Verification Conference , HVC 2009(LNCS, Vol.\u00a06405) . Springer, 133\u2013149. Xin Li and Mizuhito Ogawa. 2009. Stacking-Based Context-Sensitive Points-to Analysis for Java. In Hardware and Software: Verification and Testing - 5th International Haifa Verification Conference, HVC 2009(LNCS, Vol.\u00a06405). Springer, 133\u2013149."},{"key":"e_1_3_2_1_16_1","unstructured":"M.H. Nguyen M. Ogawa and T.T. Quan. 2017. Packer Identification Based on Metadata Signature. In The 7th Software Security Protection and Reverse Engineering Workshop (SSPREW-7) ACM.  M.H. Nguyen M. Ogawa and T.T. Quan. 2017. Packer Identification Based on Metadata Signature. In The 7th Software Security Protection and Reverse Engineering Workshop (SSPREW-7) ACM."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"e_1_3_2_1_18_1","unstructured":"Anthony Romano. 2014. Methods for binary symbolic execution.  Anthony Romano. 2014. Methods for binary symbolic execution."},{"key":"e_1_3_2_1_19_1","volume-title":"Symbolic Deobfuscation: From Virtualized Code Back to the Original. In DIMVA, Vol.\u00a010885","author":"Salwan Jonathan","year":"2018","unstructured":"Jonathan Salwan , S\u00e9bastien Bardin , and Marie-Laure Potet . 2018 . Symbolic Deobfuscation: From Virtualized Code Back to the Original. In DIMVA, Vol.\u00a010885 . Springer , 372\u2013392. Jonathan Salwan, S\u00e9bastien Bardin, and Marie-Laure Potet. 2018. Symbolic Deobfuscation: From Virtualized Code Back to the Original. In DIMVA, Vol.\u00a010885. Springer, 372\u2013392."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA482657"},{"key":"e_1_3_2_1_21_1","volume-title":"(State of) The Art of War: Offensive Techniques in Binary Analysis. S&P","author":"Shoshitaishvili Yan","year":"2016","unstructured":"Yan Shoshitaishvili , Ruoyu Wang , Christopher Salls , Nick Stephens , Mario Polino , Andrew Dutcher , John Grosen , Siji Feng , Christophe Hauser , C. Kr\u00fcgel , and Giovanni Vigna . 2016. SOK : (State of) The Art of War: Offensive Techniques in Binary Analysis. S&P ( 2016 ), 138\u2013157. Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, C. Kr\u00fcgel, and Giovanni Vigna. 2016. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. S&P (2016), 138\u2013157."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Aditya Thakur Junghee Lim Akash Lal Amanda Burton Evan Driscoll Matt Elder Tycho Andersen and Thomas Reps. 2010. Directed Proof Generation for Machine Code. 288\u2013305.  Aditya Thakur Junghee Lim Akash Lal Amanda Burton Evan Driscoll Matt Elder Tycho Andersen and Thomas Reps. 2010. Directed Proof Generation for Machine Code. 288\u2013305.","DOI":"10.1007\/978-3-642-14295-6_27"},{"volume-title":"Formal Semantics Extraction from MIPS Instruction Manual","author":"Trac Quang\u00a0Thinh","key":"e_1_3_2_1_23_1","unstructured":"Quang\u00a0Thinh Trac and Mizuhito Ogawa . 2019. Formal Semantics Extraction from MIPS Instruction Manual . In FTSCS. Springer , 133\u2013140. Quang\u00a0Thinh Trac and Mizuhito Ogawa. 2019. Formal Semantics Extraction from MIPS Instruction Manual. In FTSCS. Springer, 133\u2013140."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11229-010-9764-9"},{"key":"e_1_3_2_1_25_1","unstructured":"Le Vinh. August 2016. Automatic stub generation from natural language description.  Le Vinh. August 2016. Automatic stub generation from natural language description."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Anh Vu and Mizuhito Ogawa. 2019. Formal Semantics Extraction from Natural Language Specifications for ARM. In FM(LNCS). 465\u2013483.  Anh Vu and Mizuhito Ogawa. 2019. Formal Semantics Extraction from Natural Language Specifications for ARM. In FM(LNCS). 465\u2013483.","DOI":"10.1007\/978-3-030-30942-8_28"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390658"},{"key":"e_1_3_2_1_28_1","unstructured":"Nguyen Lam\u00a0Hoang Yen. March 2018. Automatic extraction of x86 formal semantics from its natural language description.  Nguyen Lam\u00a0Hoang Yen. March 2018. Automatic extraction of x86 formal semantics from its natural language description."}],"event":{"name":"SoICT 2022: The 11th International Symposium on Information and Communication Technology","acronym":"SoICT 2022","location":"Hanoi Vietnam"},"container-title":["The 11th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568562.3568628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:40Z","timestamp":1750186840000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":28,"alternative-id":["10.1145\/3568562.3568628","10.1145\/3568562"],"URL":"https:\/\/doi.org\/10.1145\/3568562.3568628","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}