{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:16:17Z","timestamp":1759335377898,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T00:00:00Z","timestamp":1686009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,6]]},"DOI":"10.1145\/3589250.3596147","type":"proceedings-article","created":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T20:34:07Z","timestamp":1686083647000},"page":"55-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Crosys: Cross Architectural Dynamic Analysis"],"prefix":"10.1145","author":[{"given":"Sangrok","family":"Lee","sequence":"first","affiliation":[{"name":"Affiliated Institute of ETRI, South Korea"}]},{"given":"Jieun","family":"Lee","sequence":"additional","affiliation":[{"name":"Affiliated Institute of ETRI, South Korea"}]},{"given":"Jaeyong","family":"Ko","sequence":"additional","affiliation":[{"name":"Affiliated Institute of ETRI, South Korea"}]},{"given":"Jaewoo","family":"Shim","sequence":"additional","affiliation":[{"name":"Affiliated Institute of ETRI, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. lli - directly execute programs from LLVM bitcode. https:\/\/llvm.org\/docs\/CommandGuide\/lli.html \t\t\t\t  2022. lli - directly execute programs from LLVM bitcode. https:\/\/llvm.org\/docs\/CommandGuide\/lli.html"},{"key":"e_1_3_2_1_2_1","unstructured":"Cybersecurity & Infrastructure Security Agency. 2017. Heightened DDoS Threat Posed by Mirai and Other Botnets. https:\/\/www.cisa.gov\/news-events\/alerts\/2016\/10\/14\/heightened-ddos-threat-posed-mirai-and-other-botnets \t\t\t\t  Cybersecurity & Infrastructure Security Agency. 2017. Heightened DDoS Threat Posed by Mirai and Other Botnets. https:\/\/www.cisa.gov\/news-events\/alerts\/2016\/10\/14\/heightened-ddos-threat-posed-mirai-and-other-botnets"},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Security Symposium. 583\u2013600","author":"Andriesse Dennis","year":"2016","unstructured":"Dennis Andriesse , Xi Chen , Victor Van Der Veen , Asia Slowinska , and Herbert Bos . 2016 . An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries .. In USENIX Security Symposium. 583\u2013600 . Dennis Andriesse, Xi Chen, Victor Van Der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries.. In USENIX Security Symposium. 583\u2013600."},{"volume-title":"26th $USENIX$ security symposium ($USENIX$ Security 17). 1093\u20131110.","author":"Antonakakis Manos","key":"e_1_3_2_1_4_1","unstructured":"Manos Antonakakis , Tim April , Michael Bailey , Matt Bernhard , Elie Bursztein , Jaime Cochran , Zakir Durumeric , J Alex Halderman , Luca Invernizzi , and Michalis Kallitsis . 2017. Understanding the mirai botnet . In 26th $USENIX$ security symposium ($USENIX$ Security 17). 1093\u20131110. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, and Michalis Kallitsis. 2017. Understanding the mirai botnet. In 26th $USENIX$ security symposium ($USENIX$ Security 17). 1093\u20131110."},{"key":"e_1_3_2_1_5_1","unstructured":"arm. 2023. ABI for the Arm 32-bit Architecture. https:\/\/developer.arm.com\/Architectures\/Application Binary Interface \t\t\t\t  arm. 2023. ABI for the Arm 32-bit Architecture. https:\/\/developer.arm.com\/Architectures\/Application Binary Interface"},{"key":"e_1_3_2_1_6_1","volume-title":"Compiler Construction: 13th International Conference, CC","author":"Balakrishnan Gogul","year":"2004","unstructured":"Gogul Balakrishnan and Thomas Reps . 2004. Analyzing memory accesses in x86 executables . In Compiler Construction: 13th International Conference, CC 2004 , Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29-April 2, 2004. Proceedings 13. 5\u201323. Gogul Balakrishnan and Thomas Reps. 2004. Analyzing memory accesses in x86 executables. In Compiler Construction: 13th International Conference, CC 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29-April 2, 2004. Proceedings 13. 5\u201323."},{"key":"e_1_3_2_1_7_1","first-page":"46","article-title":"QEMU, a fast and portable dynamic translator.. In USENIX annual technical conference","volume":"41","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard . 2005 . QEMU, a fast and portable dynamic translator.. In USENIX annual technical conference , FREENIX Track. 41 , 46 . Fabrice Bellard. 2005. QEMU, a fast and portable dynamic translator.. In USENIX annual technical conference, FREENIX Track. 41, 46.","journal-title":"FREENIX Track."},{"key":"e_1_3_2_1_8_1","volume-title":"Computer Aided Verification: 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings 23","author":"Brumley David","year":"2011","unstructured":"David Brumley , Ivan Jager , Thanassis Avgerinos , and Edward J Schwartz . 2011 . BAP: A binary analysis platform . In Computer Aided Verification: 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings 23 . 463\u2013469. David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J Schwartz. 2011. BAP: A binary analysis platform. In Computer Aided Verification: 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings 23. 463\u2013469."},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of NDSS. 21\u201324","author":"Chen Daming Dominic","year":"2016","unstructured":"Daming Dominic Chen , Manuel Egele , Maverick Woo , and David Brumley . 2016 . Towards fully automated dynamic analysis for embedded firmware . In Proc. of NDSS. 21\u201324 . Daming Dominic Chen, Manuel Egele, Maverick Woo, and David Brumley. 2016. Towards fully automated dynamic analysis for embedded firmware. In Proc. of NDSS. 21\u201324."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 29th USENIX Security Symposium.","author":"Clements Abraham","year":"2020","unstructured":"Abraham Clements , Eric Gustafson , Tobias Scharnowski , Paul Grosen , David Fritz , Christopher Kruegel , Giovanni Vigna , Saurabh Bagchi , and Mathias Payer . 2020 . Halucinator: Firmware re-hosting through abstraction layer emulation . In Proceedings of the 29th USENIX Security Symposium. Abraham Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, and Mathias Payer. 2020. Halucinator: Firmware re-hosting through abstraction layer emulation. In Proceedings of the 29th USENIX Security Symposium."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897900"},{"key":"e_1_3_2_1_12_1","volume-title":"2018 IEEE symposium on security and privacy (SP). 161\u2013175","author":"Cozzi Emanuele","year":"2018","unstructured":"Emanuele Cozzi , Mariano Graziano , Yanick Fratantonio , and Davide Balzarotti . 2018 . Understanding linux malware . In 2018 IEEE symposium on security and privacy (SP). 161\u2013175 . Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, and Davide Balzarotti. 2018. Understanding linux malware. In 2018 IEEE symposium on security and privacy (SP). 161\u2013175."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854038.2854061"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_15_1","volume-title":"Binsec: Binary code analysis with low-level regions. In Tools and Algorithms for the Construction and Analysis of Systems: 21st International Conference, TACAS","author":"Djoudi Adel","year":"2015","unstructured":"Adel Djoudi and S\u00e9bastien Bardin . 2015 . Binsec: Binary code analysis with low-level regions. In Tools and Algorithms for the Construction and Analysis of Systems: 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings 21. 212\u2013217. Adel Djoudi and S\u00e9bastien Bardin. 2015. Binsec: Binary code analysis with low-level regions. In Tools and Algorithms for the Construction and Analysis of Systems: 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings 21. 212\u2013217."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191549"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium. 1075\u20131092","author":"Flores-Montoya Antonio","year":"2020","unstructured":"Antonio Flores-Montoya and Eric Schulte . 2020 . Datalog disassembly . In Proceedings of the 29th USENIX Conference on Security Symposium. 1075\u20131092 . Antonio Flores-Montoya and Eric Schulte. 2020. Datalog disassembly. In Proceedings of the 29th USENIX Conference on Security Symposium. 1075\u20131092."},{"key":"e_1_3_2_1_18_1","unstructured":"Free Software Foundation. 2021. GNU Automake - Generalities about Testing. https:\/\/www.gnu.org\/software\/automake\/manual\/html_node\/Generalities-about-Testing.html \t\t\t\t  Free Software Foundation. 2021. GNU Automake - Generalities about Testing. https:\/\/www.gnu.org\/software\/automake\/manual\/html_node\/Generalities-about-Testing.html"},{"key":"e_1_3_2_1_19_1","unstructured":"Free Software Foundation. 2021. GNU Automake - Support for test suites. https:\/\/www.gnu.org\/software\/automake\/manual\/html_node\/Tests.html \t\t\t\t  Free Software Foundation. 2021. GNU Automake - Support for test suites. https:\/\/www.gnu.org\/software\/automake\/manual\/html_node\/Tests.html"},{"key":"e_1_3_2_1_20_1","volume-title":"Binary Analysis Research Workshop.","author":"Gussoni Andrea","year":"2019","unstructured":"Andrea Gussoni , Alessandro Di Federico , Pietro Fezzardi , and Giovanni Agosta . 2019 . Performance, correctness, exceptions: Pick three . In Binary Analysis Research Workshop. Andrea Gussoni, Alessandro Di Federico, Pietro Fezzardi, and Giovanni Agosta. 2019. Performance, correctness, exceptions: Pick three. In Binary Analysis Research Workshop."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/143095.143114"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the Tenth International Symposium on Code Generation and Optimization. 104\u2013113","author":"Hong Ding-Yong","year":"2012","unstructured":"Ding-Yong Hong , Chun-Chen Hsu , Pen-Chung Yew , Jan-Jan Wu , Wei-Chung Hsu , Pangfeng Liu , Chien-Min Wang , and Yeh-Ching Chung . 2012 . HQEMU: a multi-threaded and retargetable dynamic binary translator on multicores . In Proceedings of the Tenth International Symposium on Code Generation and Optimization. 104\u2013113 . Ding-Yong Hong, Chun-Chen Hsu, Pen-Chung Yew, Jan-Jan Wu, Wei-Chung Hsu, Pangfeng Liu, Chien-Min Wang, and Yeh-Ching Chung. 2012. HQEMU: a multi-threaded and retargetable dynamic binary translator on multicores. In Proceedings of the Tenth International Symposium on Code Generation and Optimization. 104\u2013113."},{"key":"e_1_3_2_1_23_1","unstructured":"Hyukmin Kwon Jaewoo Shim and Sangrok Lee. 2020. A Cross Debugger for Multi-Architecture Binaries. https:\/\/llvm.org\/devmtg\/2020-04\/talks.html \t\t\t\t  Hyukmin Kwon Jaewoo Shim and Sangrok Lee. 2020. A Cross Debugger for Multi-Architecture Binaries. https:\/\/llvm.org\/devmtg\/2020-04\/talks.html"},{"key":"e_1_3_2_1_24_1","volume-title":"Sangrok Lee and Jaewoo Shim","author":"Jaeyong Ko Jieun Lee","year":"2022","unstructured":"Jieun Lee Jaeyong Ko , Sangrok Lee and Jaewoo Shim . 2022 . Execution Domain Transition: Binary and LLVM IR can run in conjunction. https:\/\/www.youtube.com\/watch?v=s7nNYZvkGi8 Jieun Lee Jaeyong Ko, Sangrok Lee and Jaewoo Shim. 2022. Execution Domain Transition: Binary and LLVM IR can run in conjunction. https:\/\/www.youtube.com\/watch?v=s7nNYZvkGi8"},{"key":"e_1_3_2_1_25_1","unstructured":"Hyungseok Kim Soomin Kim Junoh Lee Kangkook Jee and Sang Kil Cha. 2023. Reassembly is Hard: A Reflection on Challenges and Strategies. \t\t\t\t  Hyungseok Kim Soomin Kim Junoh Lee Kangkook Jee and Sang Kil Cha. 2023. Reassembly is Hard: A Reflection on Challenges and Strategies."},{"key":"e_1_3_2_1_26_1","volume-title":"2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE). 353\u2013364","author":"Kim Soomin","year":"2017","unstructured":"Soomin Kim , Markus Faerevaag , Minkyu Jung , Seungll Jung , DongYeop Oh , JongHyup Lee , and Sang Kil Cha . 2017 . Testing intermediate representations for binary analysis . In 2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE). 353\u2013364 . Soomin Kim, Markus Faerevaag, Minkyu Jung, Seungll Jung, DongYeop Oh, JongHyup Lee, and Sang Kil Cha. 2017. Testing intermediate representations for binary analysis. In 2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE). 353\u2013364."},{"key":"e_1_3_2_1_27_1","unstructured":"William Largent. 2018. New VPNFilter malware targets at least 500K networking devices worldwide. https:\/\/blog.talosintelligence.com\/vpnfilter\/ \t\t\t\t  William Largent. 2018. New VPNFilter malware targets at least 500K networking devices worldwide. https:\/\/blog.talosintelligence.com\/vpnfilter\/"},{"key":"e_1_3_2_1_28_1","volume-title":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 775\u2013784","author":"Lee Yen-Ting","year":"2020","unstructured":"Yen-Ting Lee , Tao Ban , Tzu-Ling Wan , Shin-Ming Cheng , Ryoichi Isawa , Takeshi Takahashi , and Daisuke Inoue . 2020 . Cross platform IoT-malware family classification based on printable strings . In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 775\u2013784 . Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, and Daisuke Inoue. 2020. Cross platform IoT-malware family classification based on printable strings. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 775\u2013784."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"key":"e_1_3_2_1_30_1","unstructured":"Hongjiu Lu Michael Matz Milind Girkar Jan Hubiaka Andreas Jaeger and Mark Mitchell. 2018. System v application binary interface amd64 architecture processor supplement (with lp64 and ilp32 programming models) version 1.0. \t\t\t\t  Hongjiu Lu Michael Matz Milind Girkar Jan Hubiaka Andreas Jaeger and Mark Mitchell. 2018. System v application binary interface amd64 architecture processor supplement (with lp64 and ilp32 programming models) version 1.0."},{"key":"e_1_3_2_1_31_1","unstructured":"Koh M. Nakagawa. 2021. Reverse-engineering Rosetta 2 part1: Analyzing AOT files and the Rosetta 2 runtime. https:\/\/ffri.github.io\/ProjectChampollion\/part1\/ \t\t\t\t  Koh M. Nakagawa. 2021. Reverse-engineering Rosetta 2 part1: Analyzing AOT files and the Rosetta 2 runtime. https:\/\/ffri.github.io\/ProjectChampollion\/part1\/"},{"key":"e_1_3_2_1_32_1","unstructured":"UNIX PRESS. 1996. System V application binary interface: MIPS Architecture Processor Supplement. \t\t\t\t  UNIX PRESS. 1996. System V application binary interface: MIPS Architecture Processor Supplement."},{"key":"e_1_3_2_1_33_1","volume-title":"Ninth Working Conference on Reverse Engineering, 2002. Proceedings.. 45\u201354","author":"Schwarz Benjamin","year":"2002","unstructured":"Benjamin Schwarz , Saumya Debray , and Gregory Andrews . 2002 . Disassembly of executable code revisited . In Ninth Working Conference on Reverse Engineering, 2002. Proceedings.. 45\u201354 . Benjamin Schwarz, Saumya Debray, and Gregory Andrews. 2002. Disassembly of executable code revisited. In Ninth Working Conference on Reverse Engineering, 2002. Proceedings.. 45\u201354."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 2012 international conference on Compilers, architectures and synthesis for embedded systems. 51\u201360","author":"Shen Bor-Yeh","year":"2012","unstructured":"Bor-Yeh Shen , Jiunn-Yeu Chen , Wei-Chung Hsu , and Wuu Yang . 2012 . LLBT: an LLVM-based static binary translator . In Proceedings of the 2012 international conference on Compilers, architectures and synthesis for embedded systems. 51\u201360 . Bor-Yeh Shen, Jiunn-Yeu Chen, Wei-Chung Hsu, and Wuu Yang. 2012. LLBT: an LLVM-based static binary translator. In Proceedings of the 2012 international conference on Compilers, architectures and synthesis for embedded systems. 51\u201360."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_36_1","volume-title":"2013 20th Working Conference on Reverse Engineering (WCRE). 52\u201361","author":"Smithson Matthew","year":"2013","unstructured":"Matthew Smithson , Khaled ElWazeer , Kapil Anand , Aparna Kotha , and Rajeev Barua . 2013 . Static binary rewriting without supplemental information: Overcoming the tradeoff between coverage and correctness . In 2013 20th Working Conference on Reverse Engineering (WCRE). 52\u201361 . Matthew Smithson, Khaled ElWazeer, Kapil Anand, Aparna Kotha, and Rajeev Barua. 2013. Static binary rewriting without supplemental information: Overcoming the tradeoff between coverage and correctness. In 2013 20th Working Conference on Reverse Engineering (WCRE). 52\u201361."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338507.3358616"},{"key":"e_1_3_2_1_38_1","volume-title":"Ramblr: Making Reassembly Great Again.. In NDSS.","author":"Wang Ruoyu","year":"2017","unstructured":"Ruoyu Wang , Yan Shoshitaishvili , Antonio Bianchi , Aravind Machiry , John Grosen , Paul Grosen , Christopher Kruegel , and Giovanni Vigna . 2017 . Ramblr: Making Reassembly Great Again.. In NDSS. Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, and Giovanni Vigna. 2017. Ramblr: Making Reassembly Great Again.. In NDSS."},{"volume-title":"24th $USENIX$ Security Symposium ($USENIX$ Security 15). 627\u2013642.","author":"Wang Shuai","key":"e_1_3_2_1_39_1","unstructured":"Shuai Wang , Pei Wang , and Dinghao Wu. 2015. Reassembleable disassembling . In 24th $USENIX$ Security Symposium ($USENIX$ Security 15). 627\u2013642. Shuai Wang, Pei Wang, and Dinghao Wu. 2015. Reassembleable disassembling. In 24th $USENIX$ Security Symposium ($USENIX$ Security 15). 627\u2013642."},{"key":"e_1_3_2_1_40_1","unstructured":"Philipp Wegner. 2023. Global IoT market size to grow 19% in 2023 \u2014IoT shows resilience despite economic downturn. https:\/\/iot-analytics.com\/iot-market-size\/ \t\t\t\t  Philipp Wegner. 2023. Global IoT market size to grow 19% in 2023 \u2014IoT shows resilience despite economic downturn. https:\/\/iot-analytics.com\/iot-market-size\/"},{"key":"e_1_3_2_1_41_1","unstructured":"Steve Zucker and Kari Karhi. 1995. System V Application Binary Interface: PowerPC\u2122 Processor Supplement. \t\t\t\t  Steve Zucker and Kari Karhi. 1995. System V Application Binary Interface: PowerPC\u2122 Processor Supplement."}],"event":{"name":"SOAP '23: 12th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Orlando FL USA","acronym":"SOAP '23"},"container-title":["Proceedings of the 12th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589250.3596147","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589250.3596147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:53Z","timestamp":1750182533000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589250.3596147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,6]]},"references-count":41,"alternative-id":["10.1145\/3589250.3596147","10.1145\/3589250"],"URL":"https:\/\/doi.org\/10.1145\/3589250.3596147","relation":{},"subject":[],"published":{"date-parts":[[2023,6,6]]},"assertion":[{"value":"2023-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}