{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:12:51Z","timestamp":1775873571034,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62302497, 92270204"],"award-info":[{"award-number":["62302497, 92270204"]}]},{"name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","award":[""],"award-info":[{"award-number":[""]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3650212.3652144","type":"proceedings-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:44:25Z","timestamp":1726055065000},"page":"491-502","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Evaluating the Effectiveness of Decompilers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1689-653X","authenticated-orcid":false,"given":"Ying","family":"Cao","sequence":"first","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, Beijing, China \/ School of Cyber Security at University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0410-4090","authenticated-orcid":false,"given":"Runze","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, Beijing, China \/ School of Cyber Security at University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8751-9918","authenticated-orcid":false,"given":"Ruigang","family":"Liang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, Beijing, China \/ School of Cyber Security at University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5624-2987","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, Beijing, China \/ School of Cyber Security at University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Binary Ninja. https:\/\/binary.ninja\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2023. ClangCheck. https:\/\/clang.llvm.org\/docs\/ClangCheck.html"},{"key":"e_1_3_2_1_3_1","unstructured":"2023. Decompiler Explorer. https:\/\/dogbolt.org\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2023. Ghidra. https:\/\/ghidra-sre.org\/"},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Hex-Rays. https:\/\/www.hex-rays.com\/products\/decompiler\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2023. RetDec. https:\/\/retdec.com\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2023. rev.ng. https:\/\/rev.ng\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"2024. Artifact. https:\/\/doi.org\/10.1145\/3580433 10.1145\/3580433","DOI":"10.1145\/3580433"},{"key":"e_1_3_2_1_9_1","volume-title":"Fish Wang, and Chitta Baral.","author":"Banerjee Pratyay","year":"2021","unstructured":"Pratyay Banerjee, Kuntal Kumar Pal, Fish Wang, and Chitta Baral. 2021. Variable name recovery in decompiled binary code using constrained masked language modeling. arXiv preprint arXiv:2103.12801."},{"key":"e_1_3_2_1_10_1","volume-title":"DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation. In 33st USENIX Security Symposium (USENIX Security 24)","author":"Basque Zion Leonahenahe","unstructured":"Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O\u2019Kain, Derron Miao, Tiffany Bao, Adam Doup\u00e9, Yan Shoshitaishvili, and Ruoyu Wang. [n. d.]. Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation. In 33st USENIX Security Symposium (USENIX Security 24)."},{"key":"e_1_3_2_1_11_1","volume-title":"Decomperson: How Humans Decompile and What We Can Learn From It. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Burk Kevin","year":"2022","unstructured":"Kevin Burk, Fabio Pagani, Christopher Kruegel, and Giovanni Vigna. 2022. Decomperson: How Humans Decompile and What We Can Learn From It. In 31st USENIX Security Symposium (USENIX Security 22). 2765\u20132782."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567998"},{"key":"e_1_3_2_1_13_1","volume-title":"31st USENIX Security Symposium (USENIX Security 23)","author":"Chen Qibin","year":"2022","unstructured":"Qibin Chen, Jeremy Lacomis, Edward J Schwartz, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu. 2022. Augmenting decompiler output with learned variable names and types. In 31st USENIX Security Symposium (USENIX Security 23). 4327\u20134343."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380250706"},{"key":"e_1_3_2_1_15_1","volume-title":"2018 International Carnahan Conference on Security Technology (ICCST). 1\u20135.","author":"Federico Alessandro Di","year":"2018","unstructured":"Alessandro Di Federico, Pietro Fezzardi, and Giovanni Agosta. 2018. rev. ng: A multi-architecture framework for reverse engineering and vulnerability discovery. In 2018 International Carnahan Conference on Security Technology (ICCST). 1\u20135."},{"key":"e_1_3_2_1_16_1","volume-title":"2013 20th Working Conference on Reverse Engineering (WCRE). 449\u2013456","author":"\u010eurfina Luk\u00e1s","year":"2013","unstructured":"Luk\u00e1s \u010eurfina, Jakub K\u0159oustek, and Petr Zemek. 2013. PsybOt malware: A step-by-step decompilation case study. In 2013 20th Working Conference on Reverse Engineering (WCRE). 449\u2013456."},{"key":"e_1_3_2_1_17_1","volume-title":"Henry Low, and Nicholas Sim.","author":"Enders Steffen","year":"2022","unstructured":"Steffen Enders, Eva-Maria C Behner, Niklas Bergmann, Mariia Rybalka, Elmar Padilla, Er Xue Hui, Henry Low, and Nicholas Sim. 2022. dewolf: Improving Decompilation by leveraging User Surveys. arXiv preprint arXiv:2205.06719."},{"key":"e_1_3_2_1_18_1","unstructured":"Javier Escalada Ted Scully and Francisco Ortin. 2021. Improving type information inferred by decompilers with supervised machine learning. arXiv preprint arXiv:2101.08116."},{"key":"e_1_3_2_1_19_1","volume-title":"Coda: An end-to-end neural program decompiler. In Advances in Neural Information Processing Systems. 3703\u20133714.","author":"Fu Cheng","year":"2019","unstructured":"Cheng Fu, Huili Chen, Haolan Liu, Xinyun Chen, Yuandong Tian, Farinaz Koushanfar, and Jishen Zhao. 2019. Coda: An end-to-end neural program decompiler. In Advances in Neural Information Processing Systems. 3703\u20133714."},{"key":"e_1_3_2_1_20_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Hernandez Grant","year":"2020","unstructured":"Grant Hernandez, Dave Jing Tian, Anurag Swarnim Yadav, Byron J Williams, and Kevin RB Butler. 2020. $BigMAC$:$Fine-Grained$ Policy Analysis of Android Firmware. In 29th USENIX Security Symposium (USENIX Security 20). 271\u2013287."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 1631\u20131645","author":"Jin Xin","year":"2022","unstructured":"Xin Jin, Kexin Pei, Jun Yeon Won, and Zhiqiang Lin. 2022. Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 1631\u20131645."},{"key":"e_1_3_2_1_22_1","volume-title":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 346\u2013356","author":"Katz Deborah S","year":"2018","unstructured":"Deborah S Katz, Jason Ruchti, and Eric Schulte. 2018. Using recurrent neural networks for decompilation. In 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 346\u2013356."},{"key":"e_1_3_2_1_23_1","volume-title":"Towards Neural Decompilation. CoRR, abs\/1905.08325","author":"Katz Omer","year":"2019","unstructured":"Omer Katz, Yuval Olshaker, Yoav Goldberg, and Eran Yahav. 2019. Towards Neural Decompilation. CoRR, abs\/1905.08325 (2019)."},{"key":"e_1_3_2_1_24_1","volume-title":"2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 628\u2013639","author":"Lacomis Jeremy","year":"2019","unstructured":"Jeremy Lacomis, Pengcheng Yin, Edward Schwartz, Miltiadis Allamanis, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu. 2019. Dire: A neural approach to decompiled identifier naming. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 628\u2013639."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560422"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00070-0"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2788959.2788964"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397370"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.24"},{"key":"e_1_3_2_1_31_1","volume-title":"Static single assignment for decompilation","author":"Van Emmerik Michael James","unstructured":"Michael James Van Emmerik. 2007. Static single assignment for decompilation. University of Queensland."},{"key":"e_1_3_2_1_32_1","unstructured":"Benjy Weinberger Craig Silverstein Gregory Eitzmann Mark Mentovai and Tashana Landray. 2013. Google C++ style guide. Section: Line Length. url: http:\/\/google-styleguide. googlecode. com\/svn\/trunk\/cppguide. xml# Line_Length."},{"key":"e_1_3_2_1_33_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Wu Ruoyu","year":"2022","unstructured":"Ruoyu Wu, Taegyu Kim, Dave Jing Tian, Antonio Bianchi, and Dongyan Xu. 2022. $DnD$: A $Cross-Architecture$ deep neural network decompiler. In 31st USENIX Security Symposium (USENIX Security 22). 2135\u20132152."},{"key":"e_1_3_2_1_34_1","volume-title":"2016 IEEE Symposium on Security and Privacy (SP). 158\u2013177","author":"Yakdan Khaled","year":"2016","unstructured":"Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, and Matthew Smith. 2016. Helping johnny to analyze malware: A usability-optimized decompiler and malware analysis user study. In 2016 IEEE Symposium on Security and Privacy (SP). 158\u2013177."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Khaled Yakdan Sebastian Eschweiler Elmar Gerhards-Padilla and Matthew Smith. 2015. No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.. In NDSS.","DOI":"10.14722\/ndss.2015.23185"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Xuejun Yang Yang Chen Eric Eide and John Regehr. 2011. Finding and understanding bugs in C compilers. 283\u2013294.","DOI":"10.1145\/1993316.1993532"},{"key":"e_1_3_2_1_37_1","volume-title":"29th USENIX security symposium (USENIX security 20). 2255\u20132269.","author":"Zong Peiyuan","unstructured":"Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, and Kai Chen. 2020. $FuzzGuard$: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning. In 29th USENIX security symposium (USENIX security 20). 2255\u20132269."}],"event":{"name":"ISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Vienna Austria","acronym":"ISSTA '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3652144","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650212.3652144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:06Z","timestamp":1750287006000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3652144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":37,"alternative-id":["10.1145\/3650212.3652144","10.1145\/3650212"],"URL":"https:\/\/doi.org\/10.1145\/3650212.3652144","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2024-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}