{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:44:54Z","timestamp":1773193494535,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["No.2021-0-01332"],"award-info":[{"award-number":["No.2021-0-01332"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3676641.3716026","type":"proceedings-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:47:32Z","timestamp":1743094052000},"page":"1317-1333","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Sound Reassembly of Modern x86-64 Binaries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2158-9367","authenticated-orcid":false,"given":"Hyungseok","family":"Kim","sequence":"first","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3129-3857","authenticated-orcid":false,"given":"Soomin","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6012-7228","authenticated-orcid":false,"given":"Sang Kil","family":"Cha","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"340","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Abadi Mart\u00edn","year":"2005","unstructured":"Mart\u00edn Abadi, Mihai Budiu, \u00dalfar Erlingsson, and Jay Ligatti. Controlflow integrity. In Proceedings of the ACM Conference on Computer and Communications Security, pages 340--353, 2005."},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Proceedings of the ACM European Conference on Computer Systems","author":"Altinay Anil","year":"2020","unstructured":"Anil Altinay, Joseph Nash, Taddeus Kroes, Prabhu Rajasekaran, Dixin Zhou, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, and Cristiano Giuffrida. BinRec: Dynamic binary lifting and recompilation. In Proceedings of the ACM European Conference on Computer Systems, pages 1--16, 2020."},{"key":"e_1_3_2_1_3_1","unstructured":"Arch Linux. Updates to build flags. https:\/\/rfc.archlinux.page\/0003- buildflags\/."},{"key":"e_1_3_2_1_4_1","unstructured":"ARM. Branch target identification (BTI). https:\/\/developer.arm.com\/ documentation\/ddi0596\/2021-06\/Base-Instructions\/BTI-Branch-Target-Identification-."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Bauman Erick","year":"2018","unstructured":"Erick Bauman, Zhiqiang Lin, and Kevin Hamlen. Superset disassembly: Statically rewriting x86 binaries without heuristics. In Proceedings of the Network and Distributed System Security Symposium, 2018."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247401"},{"key":"e_1_3_2_1_7_1","volume-title":"pyelftools. https:\/\/github.com\/eliben\/pyelftools","author":"Bendersky Eli","year":"2011","unstructured":"Eli Bendersky. pyelftools. https:\/\/github.com\/eliben\/pyelftools, 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024569.2024572"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/776261.776290"},{"key":"e_1_3_2_1_10_1","unstructured":"CentOS Git Server. rpms\/redhat-rpm-config. https:\/\/git.centos.org\/rpms\/redhat-rpm-config\/blob\/c8s\/f\/SOURCES\/buildflags.md."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1999.777758"},{"key":"e_1_3_2_1_13_1","first-page":"40","volume-title":"Proceedings of the ACM Symposium on Information, Computer and Communications Security","author":"Davi Lucas","year":"2011","unstructured":"Lucas Davi, Ahmad-Reza Sadeghi, and Marcel Winandy. Ropdefender: A detection tool to defend against return-oriented programming attacks. In Proceedings of the ACM Symposium on Information, Computer and Communications Security, pages 40--51, 2011."},{"key":"e_1_3_2_1_14_1","first-page":"15","volume-title":"Proceedings of the ACM Asia Conference on Computer and Communications Security","author":"D'Elia Daniele Cono","year":"2019","unstructured":"Daniele Cono D'Elia, Emilio Coppa, Simone Nicchi, Federico Palmaro, and Lorenzo Cavallaro. SoK: Using dynamic binary instrumentation for security (and how you may get caught red handed). In Proceedings of the ACM Asia Conference on Computer and Communications Security, pages 15--27, 2019."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_12"},{"key":"e_1_3_2_1_16_1","first-page":"6311","volume-title":"Proceedings of the USENIX Security Symposium","author":"Bartolomeo Luca Di","year":"2023","unstructured":"Luca Di Bartolomeo, Hossein Moghaddas, and Mathias Payer. ARMore: Pushing love back into binaries. In Proceedings of the USENIX Security Symposium, pages 6311--6328, 2023."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00009"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385972"},{"key":"e_1_3_2_1_19_1","first-page":"140","volume-title":"Proceedings of the ACM Asia Conference on Computer and Communications Security","author":"Elsabagh Mohamed","year":"2017","unstructured":"Mohamed Elsabagh, Dan Fleck, and Angelos Stavrou. Strict virtual call integrity checking for C binaries. In Proceedings of the ACM Asia Conference on Computer and Communications Security, pages 140--154, 2017."},{"key":"e_1_3_2_1_20_1","first-page":"75","volume-title":"Proceedings of the USENIX Symposium on Operating System Design and Implementation","author":"Erlingsson Ulfar","year":"2006","unstructured":"Ulfar Erlingsson, Martin Abadi, Michael Vrable, Mihai Budiu, and George C Necula. XFI: Software guards for system address spaces. In Proceedings of the USENIX Symposium on Operating System Design and Implementation, pages 75--88, 2006."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/fedoraproject. org\/wiki\/Changes\/HardeningFlags28","author":"Wiki Fedora Project","unstructured":"Fedora Project Wiki. Changes\/hardeningflags28. https:\/\/fedoraproject. org\/wiki\/Changes\/HardeningFlags28."},{"key":"e_1_3_2_1_22_1","first-page":"1075","volume-title":"Proceedings of the USENIX Security Symposium","author":"Flores-Montoya Antonio","year":"2020","unstructured":"Antonio Flores-Montoya and Eric Schulte. Datalog disassembly. In Proceedings of the USENIX Security Symposium, pages 1075--1092, 2020."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Conference on USENIX Windows NT Symposium","author":"Hunt Galen","year":"1999","unstructured":"Galen Hunt and Doug Brubacher. Detours: Binary interception of win32 functions. In Proceedings of the Conference on USENIX Windows NT Symposium, 1999."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23051"},{"key":"e_1_3_2_1_26_1","first-page":"1469","volume-title":"Proceedings of the USENIX Security Symposium","author":"Kim Hyungseok","year":"2023","unstructured":"Hyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, and Sang Kil Cha. Reassembly is hard: A reflection on challenges and strategies. In Proceedings of the USENIX Security Symposium, pages 1469--1486, 2023."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00061"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616366"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452024"},{"key":"e_1_3_2_1_30_1","first-page":"412","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Li Juanru","year":"2018","unstructured":"Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, and Dawu Gu. K-hunt: Pinpointing insecure cryptographic keys from execution traces. In Proceedings of the ACM Conference on Computer and Communications Security, pages 412--425, 2018."},{"key":"e_1_3_2_1_31_1","first-page":"190","volume-title":"Proceedings of the ACM Conference on Programming Language Design and Implementation","author":"Luk Chi-Keung","year":"2005","unstructured":"Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Proceedings of the ACM Conference on Programming Language Design and Implementation, pages 190--200, 2005."},{"key":"e_1_3_2_1_32_1","unstructured":"LWN.net. Kernel release status. https:\/\/lwn.net\/Articles\/924113\/."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931047"},{"key":"e_1_3_2_1_34_1","unstructured":"Michael Larabel and Matthew Tippett. Phoronix test suite. https: \/\/phoronix-test-suite.com."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.6"},{"key":"e_1_3_2_1_36_1","unstructured":"National Security Agency. Ghidra. https:\/\/ghidra-sre.org."},{"key":"e_1_3_2_1_37_1","first-page":"89","volume-title":"Proceedings of the ACM Conference on Programming Language Design and Implementation","author":"Nethercote Nicholas","year":"2007","unstructured":"Nicholas Nethercote and Julian Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. In Proceedings of the ACM Conference on Programming Language Design and Implementation, pages 89--100, 2007."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00046"},{"key":"e_1_3_2_1_39_1","first-page":"829","volume-title":"Proceedings of the USENIX Security Symposium","author":"Peng Fei","year":"2014","unstructured":"Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, and Zhendong Su. X-Force: Force-executing binary programs for security applications. In Proceedings of the USENIX Security Symposium, pages 829--844, 2014."},{"key":"e_1_3_2_1_40_1","unstructured":"Phoronix. Intel shadow stack finally merged for linux 6.6. https: \/\/www.phoronix.com\/news\/Intel-Shadow-Stack-Linux-6.6."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23297"},{"key":"e_1_3_2_1_42_1","first-page":"381","volume-title":"Proceedings of the International Conference on Research in Attacks, Intrusions, and Defenses","author":"Salehi Majid","year":"2020","unstructured":"Majid Salehi, Danny Hughes, and Bruno Crispo. \u03bcSBS: Static binary sanitization of bare-metal embedded devices for fault observability. In Proceedings of the International Conference on Research in Attacks, Intrusions, and Defenses, pages 381--395, 2020."},{"key":"e_1_3_2_1_43_1","first-page":"309","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. AddressSanitizer: A fast address sanity checker. In Proceedings of the USENIX Annual Technical Conference, pages 309--318, 2012."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3337167.3337175"},{"key":"e_1_3_2_1_45_1","unstructured":"Ubuntu wiki. Compilerflags. https:\/\/wiki.ubuntu.com\/ToolChain\/CompilerFlags."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690244"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Wang Ruoyu","year":"2017","unstructured":"Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, and Giovanni Vigna. Ramblr: Making reassembly great again. In Proceedings of the Network and Distributed System Security Symposium, 2017."},{"key":"e_1_3_2_1_48_1","first-page":"627","volume-title":"Proceedings of the USENIX Security Symposium","author":"Wang Shuai","year":"2015","unstructured":"Shuai Wang, Pei Wang, and Dinghao Wu. Reassembleable disassembling. In Proceedings of the USENIX Security Symposium, pages 627--642, 2015."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653696"},{"key":"e_1_3_2_1_50_1","first-page":"157","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Wartell Richard","year":"2012","unstructured":"Richard Wartell, Vishwath Mohan, Kevin W Hamlen, and Zhiqiang Lin. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In Proceedings of the ACM Conference on Computer and Communications Security, pages 157--168, 2012."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420995"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378470"},{"key":"e_1_3_2_1_53_1","first-page":"859","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Xiao Yuan","year":"2017","unstructured":"Yuan Xiao, Mengyuan Li, Sanchuan Chen, and Yinqian Zhang. STACCO: Differentially analyzing side-channel traces for detecting SSL\/TLS vulnerabilities in secure enclaves. In Proceedings of the ACM Conference on Computer and Communications Security, pages 859--874, 2017."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516664"},{"key":"e_1_3_2_1_55_1","first-page":"559","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Zhang Chao","year":"2013","unstructured":"Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, L\u00e1szl\u00f3 Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. Practical control flow integrity and randomization for binary executables. In Proceedings of the IEEE Symposium on Security and Privacy, pages 559--573, 2013."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"e_1_3_2_1_57_1","first-page":"337","volume-title":"Proceedings of the USENIX Security Symposium","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R. Sekar. Control flow integrity for COTS binaries. In Proceedings of the USENIX Security Symposium, pages 337--352, 2013."}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676641.3716026","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676641.3716026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T11:12:34Z","timestamp":1755774754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676641.3716026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":57,"alternative-id":["10.1145\/3676641.3716026","10.1145\/3676641"],"URL":"https:\/\/doi.org\/10.1145\/3676641.3716026","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}