{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T07:46:37Z","timestamp":1768031197905,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chinese National Natural Science Foundation","award":["62032010, 62172201"],"award-info":[{"award-number":["62032010, 62172201"]}]},{"name":"Chinese National Key R&D Program","award":["2022YFF0604503"],"award-info":[{"award-number":["2022YFF0604503"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598097","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"804-815","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["OCFI: Make Function Entry Identification Hard Again"],"prefix":"10.1145","author":[{"given":"Chengbin","family":"Pang","sequence":"first","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Tiantai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Xuelan","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Linzhang","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Bing","family":"Mao","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ghidra Software Reverse Engineering Framework. https:\/\/ghidra-sre.org\/ Accessed","author":"National Security Agency. 2019.","year":"2022","unstructured":"National Security Agency. 2019. Ghidra Software Reverse Engineering Framework. https:\/\/ghidra-sre.org\/ Accessed Dec 2, 2022 National Security Agency. 2019. Ghidra Software Reverse Engineering Framework. https:\/\/ghidra-sre.org\/ Accessed Dec 2, 2022"},{"key":"e_1_3_2_1_2_1","volume-title":"Angr: A powerful and user-friendly binary analysis platform!. https:\/\/github.com\/angr\/angr Accessed","author":"National Security Agency.","year":"2022","unstructured":"National Security Agency. 2022 . Angr: A powerful and user-friendly binary analysis platform!. https:\/\/github.com\/angr\/angr Accessed Dec 2, 2022 National Security Agency. 2022. Angr: A powerful and user-friendly binary analysis platform!. https:\/\/github.com\/angr\/angr Accessed Dec 2, 2022"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.11"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38033-4_22"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2017.09.004"},{"key":"e_1_3_2_1_6_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Bao Tiffany","year":"2014","unstructured":"Tiffany Bao , Jonathan Burket , Maverick Woo , Rafael Turner , and David Brumley . 2014 . $BYTEWEIGHT$: Learning to recognize functions in binary code . In 23rd USENIX Security Symposium (USENIX Security 14) . 845\u2013860. Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. $BYTEWEIGHT$: Learning to recognize functions in binary code. In 23rd USENIX Security Symposium (USENIX Security 14). 845\u2013860."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_8_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Carlini Nicholas","year":"2014","unstructured":"Nicholas Carlini and David Wagner . 2014 . $ROP$ is still dangerous: Breaking modern defenses . In 23rd USENIX Security Symposium (USENIX Security 14) . 385\u2013399. Nicholas Carlini and David Wagner. 2014. $ROP$ is still dangerous: Breaking modern defenses. In 23rd USENIX Security Symposium (USENIX Security 14). 385\u2013399."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45439-X_10"},{"key":"e_1_3_2_1_10_1","volume-title":"A taxonomy of obfuscating transformations. Department of Computer Science","author":"Collberg Christian","unstructured":"Christian Collberg , Clark Thomborson , and Douglas Low . 1997. A taxonomy of obfuscating transformations. Department of Computer Science , The University of Auckland , New Zealand . Christian Collberg, Clark Thomborson, and Douglas Low. 1997. A taxonomy of obfuscating transformations. Department of Computer Science, The University of Auckland, New Zealand."},{"key":"e_1_3_2_1_11_1","volume-title":"DWARF for the Arm\u00ae 64-bit Architecture (AArch64). https:\/\/github.com\/ARM-software\/abi-aa\/blob\/main\/aadwarf64\/aadwarf64.rst Accessed","author":"Developer Arm","year":"2022","unstructured":"Arm Developer . 2022. DWARF for the Arm\u00ae 64-bit Architecture (AArch64). https:\/\/github.com\/ARM-software\/abi-aa\/blob\/main\/aadwarf64\/aadwarf64.rst Accessed Dec 10, 2022 Arm Developer. 2022. DWARF for the Arm\u00ae 64-bit Architecture (AArch64). https:\/\/github.com\/ARM-software\/abi-aa\/blob\/main\/aadwarf64\/aadwarf64.rst Accessed Dec 10, 2022"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Victor Duta Fabian Freyer Fabio Pagani Marius Muench and Cristiano Giuffrida. 2023. Let Me Unwind That For You: Exceptions to Backward-Edge Protection. In NDSS. \t\t\t\t  Victor Duta Fabian Freyer Fabio Pagani Marius Muench and Cristiano Giuffrida. 2023. Let Me Unwind That For You: Exceptions to Backward-Edge Protection. In NDSS.","DOI":"10.14722\/ndss.2023.23295"},{"key":"e_1_3_2_1_13_1","volume-title":"Declaring Attributes of Functions. https:\/\/gcc.gnu.org\/onlinedocs\/gcc-4.7.2\/gcc\/Function-Attributes.html Accessed","author":"GCC GNU.","year":"2022","unstructured":"GCC GNU. 2022. Declaring Attributes of Functions. https:\/\/gcc.gnu.org\/onlinedocs\/gcc-4.7.2\/gcc\/Function-Attributes.html Accessed Dec 10, 2022 GCC GNU. 2022. Declaring Attributes of Functions. https:\/\/gcc.gnu.org\/onlinedocs\/gcc-4.7.2\/gcc\/Function-Attributes.html Accessed Dec 10, 2022"},{"key":"e_1_3_2_1_14_1","volume-title":"2014 IEEE Symposium on Security and Privacy. 575\u2013589","author":"G\u00f6ktas Enes","year":"2014","unstructured":"Enes G\u00f6ktas , Elias Athanasopoulos , Herbert Bos , and Georgios Portokalidis . 2014 . Out of control: Overcoming control-flow integrity . In 2014 IEEE Symposium on Security and Privacy. 575\u2013589 . Enes G\u00f6ktas, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis. 2014. Out of control: Overcoming control-flow integrity. In 2014 IEEE Symposium on Security and Privacy. 575\u2013589."},{"key":"e_1_3_2_1_15_1","unstructured":"Joshua Haberman. 2017. Testcases of ELF. https:\/\/github.com\/google\/bloaty\/tree\/main\/tests\/testdata\/linux-x86_64 \t\t\t\t  Joshua Haberman. 2017. Testcases of ELF. https:\/\/github.com\/google\/bloaty\/tree\/main\/tests\/testdata\/linux-x86_64"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.07.007"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.16"},{"key":"e_1_3_2_1_19_1","first-page":"3","article-title":"Obfuscating C++ programs via control flow flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae","volume":"30","author":"L\u00e1szl\u00f3 T\u0131mea","year":"2009","unstructured":"T\u0131mea L\u00e1szl\u00f3 and \u00c1kos Kiss . 2009 . Obfuscating C++ programs via control flow flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae , Sectio Computatorica , 30 , 1 (2009), 3 \u2013 19 . T\u0131mea L\u00e1szl\u00f3 and \u00c1kos Kiss. 2009. Obfuscating C++ programs via control flow flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae, Sectio Computatorica, 30, 1 (2009), 3\u201319.","journal-title":"Sectio Computatorica"},{"key":"e_1_3_2_1_20_1","volume-title":"https:\/\/llvm.org\/devmtg\/2017-10\/slides\/Blaikie-Modular%20Codegen.pdf Accessed","author":"Modular Codegen LLVM.","year":"2023","unstructured":"LLVM. 2017. Modular Codegen . https:\/\/llvm.org\/devmtg\/2017-10\/slides\/Blaikie-Modular%20Codegen.pdf Accessed Jan 1, 2023 LLVM. 2017. Modular Codegen. https:\/\/llvm.org\/devmtg\/2017-10\/slides\/Blaikie-Modular%20Codegen.pdf Accessed Jan 1, 2023"},{"key":"e_1_3_2_1_21_1","volume-title":"Source code of AsmPrinter. https:\/\/github.com\/llvm\/llvm-project\/blob\/llvmorg-12.0.0\/llvm\/lib\/CodeGen\/AsmPrinter\/AsmPrinter.cpp Accessed","author":"LLVM.","year":"2023","unstructured":"LLVM. 2020. Source code of AsmPrinter. https:\/\/github.com\/llvm\/llvm-project\/blob\/llvmorg-12.0.0\/llvm\/lib\/CodeGen\/AsmPrinter\/AsmPrinter.cpp Accessed Jan 3, 2023 LLVM. 2020. Source code of AsmPrinter. https:\/\/github.com\/llvm\/llvm-project\/blob\/llvmorg-12.0.0\/llvm\/lib\/CodeGen\/AsmPrinter\/AsmPrinter.cpp Accessed Jan 3, 2023"},{"key":"e_1_3_2_1_22_1","volume-title":"Source code of CFIInstrInserter. https:\/\/github.com\/llvm\/llvm-project\/blob\/llvmorg-12.0.0\/llvm\/lib\/CodeGen\/CFIInstrInserter.cpp Accessed","author":"LLVM.","year":"2023","unstructured":"LLVM. 2020. Source code of CFIInstrInserter. https:\/\/github.com\/llvm\/llvm-project\/blob\/llvmorg-12.0.0\/llvm\/lib\/CodeGen\/CFIInstrInserter.cpp Accessed Jan 3, 2023 LLVM. 2020. Source code of CFIInstrInserter. https:\/\/github.com\/llvm\/llvm-project\/blob\/llvmorg-12.0.0\/llvm\/lib\/CodeGen\/CFIInstrInserter.cpp Accessed Jan 3, 2023"},{"key":"e_1_3_2_1_23_1","volume-title":"llvm::CallGraphSCCPass Class Reference. https:\/\/llvm.org\/doxygen\/classllvm_1_1CallGraphSCCPass.html Accessed","author":"LLVM.","year":"2022","unstructured":"LLVM. 2022. llvm::CallGraphSCCPass Class Reference. https:\/\/llvm.org\/doxygen\/classllvm_1_1CallGraphSCCPass.html Accessed Dec 6, 2022 LLVM. 2022. llvm::CallGraphSCCPass Class Reference. https:\/\/llvm.org\/doxygen\/classllvm_1_1CallGraphSCCPass.html Accessed Dec 6, 2022"},{"key":"e_1_3_2_1_24_1","volume-title":"llvm::ResumeInst Class Reference. https:\/\/llvm.org\/doxygen\/classllvm_1_1ResumeInst.html Accessed","author":"LLVM.","year":"2023","unstructured":"LLVM. 2023. llvm::ResumeInst Class Reference. https:\/\/llvm.org\/doxygen\/classllvm_1_1ResumeInst.html Accessed Jan 5, 2023 LLVM. 2023. llvm::ResumeInst Class Reference. https:\/\/llvm.org\/doxygen\/classllvm_1_1ResumeInst.html Accessed Jan 5, 2023"},{"key":"e_1_3_2_1_25_1","volume-title":"Intel386 Architecture Processor Supplement. https:\/\/raw.githubusercontent.com\/wiki\/hjl-tools\/x86-psABI\/intel386-psABI-1.1.pdf Accessed","author":"Lu H.j.","year":"2022","unstructured":"H.j. Lu , David L Kreitzer , Millind Girkar , and Zia Ansari . 2015. System V Application Binary Interface , Intel386 Architecture Processor Supplement. https:\/\/raw.githubusercontent.com\/wiki\/hjl-tools\/x86-psABI\/intel386-psABI-1.1.pdf Accessed Dec 2, 2022 H.j. Lu, David L Kreitzer, Millind Girkar, and Zia Ansari. 2015. System V Application Binary Interface, Intel386 Architecture Processor Supplement. https:\/\/raw.githubusercontent.com\/wiki\/hjl-tools\/x86-psABI\/intel386-psABI-1.1.pdf Accessed Dec 2, 2022"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2655046"},{"key":"e_1_3_2_1_27_1","volume-title":"AMD64 Architecture Processor Supplement. https:\/\/refspecs.linuxbase.org\/elf\/x86_64-abi-0.99.pdf Accessed","author":"Matz Michael","year":"2022","unstructured":"Michael Matz , Jan Hubicka , Andreas Jaeger , and Mark Mitchell . 2012. System V Application Binary Interface , AMD64 Architecture Processor Supplement. https:\/\/refspecs.linuxbase.org\/elf\/x86_64-abi-0.99.pdf Accessed Dec 2, 2022 Michael Matz, Jan Hubicka, Andreas Jaeger, and Mark Mitchell. 2012. System V Application Binary Interface, AMD64 Architecture Processor Supplement. https:\/\/refspecs.linuxbase.org\/elf\/x86_64-abi-0.99.pdf Accessed Dec 2, 2022"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931047"},{"key":"e_1_3_2_1_29_1","unstructured":"Max Moroz. 2019. Testcases of PDF. https:\/\/github.com\/google\/AFL\/blob\/master\/testcases\/others\/pdf\/small.pdf \t\t\t\t  Max Moroz. 2019. Testcases of PDF. https:\/\/github.com\/google\/AFL\/blob\/master\/testcases\/others\/pdf\/small.pdf"},{"key":"e_1_3_2_1_30_1","unstructured":"Max Moroz. 2019. Testcases of XML. https:\/\/github.com\/google\/AFL\/blob\/master\/testcases\/others\/xml\/small_document.xml \t\t\t\t  Max Moroz. 2019. Testcases of XML. https:\/\/github.com\/google\/AFL\/blob\/master\/testcases\/others\/xml\/small_document.xml"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78813-5_38"},{"key":"e_1_3_2_1_32_1","volume-title":"5th USENIX Workshop on Offensive Technologies (WOOT 11)","author":"Oakley James","year":"2011","unstructured":"James Oakley . 2011 . Exploiting the $Hard-Working$$DWARF$: Trojan and Exploit Techniques with No Native Executable Code . In 5th USENIX Workshop on Offensive Technologies (WOOT 11) . James Oakley. 2011. Exploiting the $Hard-Working$$DWARF$: Trojan and Exploit Techniques with No Native Executable Code. In 5th USENIX Workshop on Offensive Technologies (WOOT 11)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00012"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00046"},{"key":"e_1_3_2_1_35_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Pang Chengbin","year":"2022","unstructured":"Chengbin Pang , Tiantai Zhang , Ruotong Yu , Bing Mao , and Jun Xu . 2022 . Ground Truth for Binary Disassembly is Not Easy . In 31st USENIX Security Symposium (USENIX Security 22) . 2479\u20132495. Chengbin Pang, Tiantai Zhang, Ruotong Yu, Bing Mao, and Jun Xu. 2022. Ground Truth for Binary Disassembly is Not Easy. In 31st USENIX Security Symposium (USENIX Security 22). 2479\u20132495."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411502.3418428"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427292"},{"key":"e_1_3_2_1_38_1","volume-title":"LLVM Language Reference Manual. https:\/\/llvm.org\/docs\/LangRef.html Accessed","author":"Project LLVM","year":"2022","unstructured":"LLVM Project . 2022. LLVM Language Reference Manual. https:\/\/llvm.org\/docs\/LangRef.html Accessed Dec 10, 2022 LLVM Project. 2022. LLVM Language Reference Manual. https:\/\/llvm.org\/docs\/LangRef.html Accessed Dec 10, 2022"},{"key":"e_1_3_2_1_39_1","first-page":"74","article-title":"Camouflage in malware: from encryption to metamorphism","volume":"12","author":"Rad Babak Bashari","year":"2012","unstructured":"Babak Bashari Rad , Maslin Masrom , and Suhaimi Ibrahim . 2012 . Camouflage in malware: from encryption to metamorphism . International Journal of Computer Science and Network Security , 12 , 8 (2012), 74 \u2013 83 . Babak Bashari Rad, Maslin Masrom, and Suhaimi Ibrahim. 2012. Camouflage in malware: from encryption to metamorphism. International Journal of Computer Science and Network Security, 12, 8 (2012), 74\u201383.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_40_1","unstructured":"radreorg. 2020. Radare2 Github Repo. https:\/\/github.com\/radareorg\/radare2\/tree\/5a1df188 \t\t\t\t  radreorg. 2020. Radare2 Github Repo. https:\/\/github.com\/radareorg\/radare2\/tree\/5a1df188"},{"key":"e_1_3_2_1_41_1","volume-title":"The truth of the f-measure","author":"Sasaki Yutaka","year":"2007","unstructured":"Yutaka Sasaki . 2007. The truth of the f-measure . 2007 . URL : https:\/\/www. cs. odu. edu\/mukka\/cs795sum09dm\/Lecturenotes\/Day3\/F-measure-YS-26Oct07. pdf [accessed 2021-05-26], 49 (2007). Yutaka Sasaki. 2007. The truth of the f-measure. 2007. URL: https:\/\/www. cs. odu. edu\/mukka\/cs795sum09dm\/Lecturenotes\/Day3\/F-measure-YS-26Oct07. pdf [accessed 2021-05-26], 49 (2007)."},{"key":"e_1_3_2_1_42_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Schloegel Moritz","year":"2022","unstructured":"Moritz Schloegel , Tim Blazytko , Moritz Contag , Cornelius Aschermann , Julius Basler , Thorsten Holz , and Ali Abbasi . 2022 . Loki: Hardening code obfuscation against automated attacks . In 31st USENIX Security Symposium (USENIX Security 22) . 3055\u20133073. Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, and Ali Abbasi. 2022. Loki: Hardening code obfuscation against automated attacks. In 31st USENIX Security Symposium (USENIX Security 22). 3055\u20133073."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_19"},{"key":"e_1_3_2_1_44_1","volume-title":"Return-oriented programming: Exploits without code injection. Black Hat USA Briefings (August","author":"Shacham Hovav","year":"2008","unstructured":"Hovav Shacham , E Buchanan , R Roemer , and S Savage . 2008. Return-oriented programming: Exploits without code injection. Black Hat USA Briefings (August 2008 ). Hovav Shacham, E Buchanan, R Roemer, and S Savage. 2008. Return-oriented programming: Exploits without code injection. Black Hat USA Briefings (August 2008)."},{"key":"e_1_3_2_1_45_1","volume-title":"Version 4. https:\/\/dwarfstd.org\/doc\/DWARF4.pdf Accessed","author":"Dwarf","year":"2022","unstructured":"Dwarf std. 2010. DWARF Debugging Information Format , Version 4. https:\/\/dwarfstd.org\/doc\/DWARF4.pdf Accessed Dec 6, 2022 Dwarf std. 2010. DWARF Debugging Information Format, Version 4. https:\/\/dwarfstd.org\/doc\/DWARF4.pdf Accessed Dec 6, 2022"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijeme.2018.02.03"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SWAT.1971.10"},{"key":"e_1_3_2_1_49_1","volume-title":"Attributes in Clang. https:\/\/clang.llvm.org\/docs\/AttributeReference.html Accessed","author":"Team Clang","year":"2022","unstructured":"Clang Team . 2022. Attributes in Clang. https:\/\/clang.llvm.org\/docs\/AttributeReference.html Accessed Dec 10, 2022 Clang Team. 2022. Attributes in Clang. https:\/\/clang.llvm.org\/docs\/AttributeReference.html Accessed Dec 10, 2022"},{"key":"e_1_3_2_1_50_1","volume-title":"Angr: A powerful and user-friendly binary analysis platform!. https:\/\/github.com\/angr\/angr\/tree\/v9.2.15","author":"SEFCOM at Arizona State University the Computer Security Lab at UC Santa Barbara.","year":"2022","unstructured":"SEFCOM at Arizona State University the Computer Security Lab at UC Santa Barbara. 2022 . Angr: A powerful and user-friendly binary analysis platform!. https:\/\/github.com\/angr\/angr\/tree\/v9.2.15 SEFCOM at Arizona State University the Computer Security Lab at UC Santa Barbara. 2022. Angr: A powerful and user-friendly binary analysis platform!. https:\/\/github.com\/angr\/angr\/tree\/v9.2.15"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45871-7_20"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993532"},{"key":"e_1_3_2_1_53_1","volume-title":"FETCH: A fast and easy-to-use tool to find function entries from x86\/x64 System-V binaries (stripped or not). https:\/\/github.com\/ruotongyu\/FETCH","author":"Yu Ruotong","year":"2022","unstructured":"Ruotong Yu . 2022 . FETCH: A fast and easy-to-use tool to find function entries from x86\/x64 System-V binaries (stripped or not). https:\/\/github.com\/ruotongyu\/FETCH Ruotong Yu. 2022. FETCH: A fast and easy-to-use tool to find function entries from x86\/x64 System-V binaries (stripped or not). https:\/\/github.com\/ruotongyu\/FETCH"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77535-5_5"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Lukas Zobernig Steven D Galbraith and Giovanni Russello. 2019. When are opaque predicates useful? In 2019 18th IEEE International Conference On Trust Security And Privacy In Computing And Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). 168\u2013175. \t\t\t\t  Lukas Zobernig Steven D Galbraith and Giovanni Russello. 2019. When are opaque predicates useful? In 2019 18th IEEE International Conference On Trust Security And Privacy In Computing And Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). 168\u2013175.","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00031"}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Seattle WA USA","acronym":"ISSTA '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598097","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:42Z","timestamp":1750182522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":55,"alternative-id":["10.1145\/3597926.3598097","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598097","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}