{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:51Z","timestamp":1750309611439,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Conservatoire National des Arts et M\u00e9tiers"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707995","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:21Z","timestamp":1747247181000},"page":"1894-1898","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Automatic Functions Annotations through Concrete Procedural Debugging and ELF Libification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8031-1438","authenticated-orcid":false,"given":"Jonathan","family":"Brossard","sequence":"first","affiliation":[{"name":"CEDRIC\/ISID, Conservatoire National des Arts et Metiers, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2001.93364"},{"key":"e_1_3_2_2_2_1","volume-title":"USA","author":"Aitel Dave","year":"2004","unstructured":"Dave Aitel. 2004. An introduction to MOSDEF. Black Hat Briefings, USA (2004)."},{"key":"e_1_3_2_2_3_1","volume-title":"Static analysis. Principles of Software System Construction","author":"Aldrich Jonathan","year":"2011","unstructured":"Jonathan Aldrich and C Jaspan. 2011. Static analysis. Principles of Software System Construction (2011)."},{"key":"e_1_3_2_2_4_1","volume-title":"18th USENIX WOOT Conference on Offensive Technologies (WOOT 24)","author":"Brossard Jonathan","year":"2024","unstructured":"Jonathan Brossard. 2024. Introduction to Procedural Debugging through Binary Libification. In 18th USENIX WOOT Conference on Offensive Technologies (WOOT 24). USENIX Association, Philadelphia, PA, 17\u201325. https:\/\/www.usenix.org\/conference\/woot24\/presentation\/brossard"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev61143.2024.00023"},{"key":"e_1_3_2_2_6_1","unstructured":"Mauro Capeletti. 2016. Unlinker: an approach to identify original compilation units in stripped binaries. (2016)."},{"key":"e_1_3_2_2_7_1","first-page":"77","article-title":"Interprocedural data flow decompilation","volume":"4","author":"Cifuentes Cristina","year":"1996","unstructured":"Cristina Cifuentes. 1996. Interprocedural data flow decompilation. Journal of Programming Languages 4 (1996), 77\u2013100.","journal-title":"Journal of Programming Languages"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61053-7_55"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_16"},{"key":"e_1_3_2_2_10_1","unstructured":"Aleksandra Doniec. 2020. Converts a EXE into DLL. https:\/\/github.com\/hasherezade\/exe_to_dll."},{"key":"e_1_3_2_2_11_1","volume-title":"Weird machines, exploitability, and provable unexploitability","author":"Dullien Thomas","year":"2017","unstructured":"Thomas Dullien. 2017. Weird machines, exploitability, and provable unexploitability. IEEE Transactions on Emerging Topics in Computing (2017)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.42"},{"key":"e_1_3_2_2_13_1","volume-title":"2nd International Conference on i-Warfare and Security","volume":"20087","author":"Garfinkel Simson","year":"2007","unstructured":"Simson Garfinkel. 2007. Anti-forensics: Techniques, detection and countermeasures. In 2nd International Conference on i-Warfare and Security, Vol. 20087. 77\u201384."},{"key":"e_1_3_2_2_14_1","unstructured":"The Grugq. 2004. The Design and Implementation of Userland Exec. (2004)."},{"key":"e_1_3_2_2_15_1","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Haller Istvan","year":"2013","unstructured":"Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, and Herbert Bos. 2013. Dowsing for {Overflows}: A Guided Fuzzer to Find Buffer Boundary Violations. In 22nd USENIX Security Symposium (USENIX Security 13). 49\u201364."},{"key":"e_1_3_2_2_16_1","unstructured":"Christopher Jones. 2019. Static Analyzer Non-Comprehensive Overview[Power-Point presentation]. (2019)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TechDefense59795.2023.10380808"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0002-y"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00044"},{"key":"e_1_3_2_2_20_1","unstructured":"Matz Michael. 2014. System V Application Binary Interface AMD64 Architecture Processor Supplement. (2014)."},{"key":"e_1_3_2_2_21_1","unstructured":"Tavis Ormandy. 2017. Porting Windows Dynamic Link Libraries to Linux. https:\/\/github.com\/taviso\/loadlibrary."},{"key":"e_1_3_2_2_22_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Poeplau Sebastian","year":"2020","unstructured":"Sebastian Poeplau and Aur\u00e9lien Francillon. 2020. Symbolic execution with {SymCC}: Don't interpret, compile!. In 29th USENIX Security Symposium (USENIX Security 20). 181\u2013198."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1953-0053041-6"},{"key":"e_1_3_2_2_24_1","unstructured":"Colin Robertson. 2016. Using SAL Annotations to Reduce C\/C++ Code Defects."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3632933"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/15567280701418155"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6668-6"},{"volume-title":"Angr-the next generation of binary analysis. In 2017 IEEE Cybersecurity Development (SecDev)","author":"Wang Fish","key":"e_1_3_2_2_29_1","unstructured":"Fish Wang and Yan Shoshitaishvili. 2017. Angr-the next generation of binary analysis. In 2017 IEEE Cybersecurity Development (SecDev). IEEE, 8\u20139."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23808-6_34"},{"key":"e_1_3_2_2_31_1","volume-title":"A brief survey of program slicing. ACM SIGSOFT Software Engineering Notes","author":"Xu Baowen","year":"2005","unstructured":"Baowen Xu, Ju Qian, Xiaofang Zhang, Zhongqiang Wu, and Lin Chen. 2005. A brief survey of program slicing. ACM SIGSOFT Software Engineering Notes (2005)."},{"key":"e_1_3_2_2_32_1","volume-title":"Layered obfuscation: a taxonomy of software obfuscation techniques for layered security. Cybersecurity","author":"Xu Hui","year":"2020","unstructured":"Hui Xu, Yangfan Zhou, Jiang Ming, and Michael Lyu. 2020. Layered obfuscation: a taxonomy of software obfuscation techniques for layered security. Cybersecurity (2020)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDS50568.2020.9268686"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:37Z","timestamp":1750298257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":32,"alternative-id":["10.1145\/3672608.3707995","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707995","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}