{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:33:19Z","timestamp":1730327599736,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T00:00:00Z","timestamp":1738886400000},"content-version":"vor","delay-in-days":685,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ONR","award":["N00014-17-1-2891"]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1918667","2153056"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,25]]},"DOI":"10.1145\/3623278.3624766","type":"proceedings-article","created":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T14:28:26Z","timestamp":1707316106000},"page":"1-18","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Accurate Disassembly of Complex Binaries Without Use of Compiler Metadata"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0006-8375-9857","authenticated-orcid":false,"given":"Soumyakant","family":"Priyadarshan","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0009-0003-3976-9941","authenticated-orcid":false,"given":"Huan","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Stony Brook University, stony brook, USA"}]},{"ORCID":"http:\/\/orcid.org\/0009-0008-9135-3296","authenticated-orcid":false,"given":"R.","family":"Sekar","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amogh Akshintala Bhushan Jain Chia-Che Tsai Michael Ferdman and Donald E Porter. 2019. Occurrence of instructions among C\/C++ binaries in Ubuntu 16.04. http:\/\/x86instructionpop.com\/."},{"key":"e_1_3_2_1_2_1","first-page":"X86","volume":"201","author":"Akshintala Amogh","unstructured":"Amogh Akshintala, Bhushan Jain, Chia-Che Tsai, Michael Ferdman, and Donald E Porter. 2019. X86-64 instruction usage among C\/C++ applications. In SYSTOR.","journal-title":"Porter."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Jim Alves-Foss and Jia Song. 2019. Function boundary detection in stripped binaries. In ACSAC.","DOI":"10.1145\/3359789.3359825"},{"key":"e_1_3_2_1_4_1","volume-title":"Asia Slowinska, and Herbert Bos.","author":"Andriesse Dennis","year":"2016","unstructured":"Dennis Andriesse, Xi Chen, Victor Van Der Veen, Asia Slowinska, and Herbert Bos. 2016. An in-depth analysis of disassembly on full-scale x86\/x64 binaries. In USENIX Security."},{"volume-title":"Compiler-agnostic function detection in binaries","author":"Andriesse Dennis","key":"e_1_3_2_1_5_1","unstructured":"Dennis Andriesse, Asia Slowinska, and Herbert Bos. 2017. Compiler-agnostic function detection in binaries. In IEEE S&P."},{"key":"e_1_3_2_1_6_1","volume-title":"Oxymoron: Making fine-grained memory randomization practical by allowing code sharing. In USENIX Security.","author":"Backes Michael","year":"2014","unstructured":"Michael Backes and Stefan N\u00fcrnberger. 2014. Oxymoron: Making fine-grained memory randomization practical by allowing code sharing. In USENIX Security."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"G. Balakrishnan and T. Reps. 2004. Analyzing memory accesses in x86 executables. In Compiler Construction.","DOI":"10.1007\/978-3-540-24723-4_2"},{"key":"e_1_3_2_1_8_1","volume-title":"BYTEWEIGHT: Learning to Recognize Functions in Binary Code. In USENIX Security.","author":"Bao T.","year":"2014","unstructured":"T. Bao, J. Burket, M. Woo, R. Turner, and D. Brumley. 2014. BYTEWEIGHT: Learning to Recognize Functions in Binary Code. In USENIX Security."},{"key":"e_1_3_2_1_9_1","volume-title":"Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.. In NDSS.","author":"Bauman Erick","year":"2018","unstructured":"Erick Bauman, Zhiqiang Lin, and Kevin W Hamlen. 2018. Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.. In NDSS."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"M Ammar Ben Khadra Dominik Stoffel and Wolfgang Kunz. 2016. Speculative disassembly of binary code. In CASES.","DOI":"10.1145\/2968455.2968505"},{"key":"e_1_3_2_1_11_1","volume-title":"DuVarney","author":"Bhatkar Sandeep","year":"2005","unstructured":"Sandeep Bhatkar, R. Sekar, and Daniel C. DuVarney. 2005. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_1_13_1","unstructured":"Derek Bruening Timothy Garnett and Saman Amarasinghe. 2003. An infrastructure for adaptive dynamic optimization. In CGO."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_8"},{"key":"e_1_3_2_1_15_1","volume-title":"Chia Yuan Cho, and Hee Beng Kuan Tan","author":"Chandramohan Mahinthan","year":"2016","unstructured":"Mahinthan Chandramohan, Yinxing Xue, Zhengzi Xu, Yang Liu, Chia Yuan Cho, and Hee Beng Kuan Tan. 2016. Bingo: Cross-architecture cross-os binary search. In ACM SIGSOFT."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Patrick Cousot and Radhia Cousot. 1977. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In ACM Principles of programming languages.","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Marco Cova Viktoria Felmetsger Greg Banks and Giovanni Vigna. 2006. Static detection of vulnerabilities in x86 executables. In ACSAC.","DOI":"10.1109\/ACSAC.2006.50"},{"key":"e_1_3_2_1_18_1","unstructured":"Lucas Vincenzo Davi Alexandra Dmitrienko Stefan N\u00fcrnberger and Ahmad-Reza Sadeghi. 2013. Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. In ACM CCS."},{"key":"e_1_3_2_1_19_1","volume-title":"Bruno De Bus, and Koen De Bosschere","author":"Sutter Bjorn De","year":"2005","unstructured":"Bjorn De Sutter, Bruno De Bus, and Koen De Bosschere. 2005. Link-time binary rewriting techniques for program compaction. ACM TOPLAS (2005)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968455.2968514"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"volume-title":"RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization","author":"Dinesh Sushant","key":"e_1_3_2_1_22_1","unstructured":"Sushant Dinesh, Nathan Burow, Dongyan Xu, and Mathias Payer. 2020. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In IEEE S&P."},{"key":"e_1_3_2_1_23_1","volume-title":"Vulcan: Binary transformation in a distributed environment. Technical Report. Technical Report MSR-TR-2001-50, Microsoft Research.","author":"Edwards Andrew","year":"2001","unstructured":"Andrew Edwards, Amitabh Srivastava, and Hoi Vo. 2001. Vulcan: Binary transformation in a distributed environment. Technical Report. Technical Report MSR-TR-2001-50, Microsoft Research."},{"key":"e_1_3_2_1_24_1","volume-title":"ATOM: A flexible interface for building high performance program analysis tools. In USENIX.","author":"Eustace Alan","year":"1995","unstructured":"Alan Eustace and Amitabh Srivastava. 1995. ATOM: A flexible interface for building high performance program analysis tools. In USENIX."},{"key":"e_1_3_2_1_25_1","unstructured":"Antonio Flores-Montoya and Eric Schulte. 2020. Datalog disassembly. In USENIX Security."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345665"},{"key":"e_1_3_2_1_27_1","unstructured":"GNU. [n.d.]. Index of\/gnu\/binutils. https:\/\/ftp.gnu.org\/gnu\/binutils\/. Accessed: 2023-03-03."},{"key":"e_1_3_2_1_28_1","unstructured":"Part Guide. 2011. Intel\u00ae 64 and IA-32 architectures software developer\u00e2\u0102\u0179s manual. Volume 3B: System programming Guide Part (2011)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Sumit Gulwani and George C Necula. 2003. Discovering affine equalities using random interpretation. In POPL.","DOI":"10.1145\/604131.604138"},{"key":"e_1_3_2_1_30_1","volume-title":"Practical analysis of stripped binary code. ACM SIGARCH","author":"Harris Laune C","year":"2005","unstructured":"Laune C Harris and Barton P Miller. 2005. Practical analysis of stripped binary code. ACM SIGARCH (2005)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Niranjan Hasabnis and R Sekar. 2016. Extracting Instruction Semantics Via Symbolic Execution of Code Generators. In ACM FSE.","DOI":"10.1145\/2950290.2950335"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Niranjan Hasabnis and R Sekar. 2016. Lifting assembly to intermediate representation: A novel approach leveraging compilers. In ASPLOS.","DOI":"10.1145\/2872362.2872380"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Xin Hu and Kang G Shin. 2013. DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles. In ACSAC.","DOI":"10.1145\/2523649.2523677"},{"key":"e_1_3_2_1_34_1","volume-title":"Amarasinghe","author":"Kiriansky Vladimir","year":"2002","unstructured":"Vladimir Kiriansky, Derek Bruening, and Saman P. Amarasinghe. 2002. Secure Execution via Program Shepherding. In USENIX Security."},{"key":"e_1_3_2_1_35_1","unstructured":"Hyungjoon Koo Yaohui Chen Long Lu Vasileios P Kemerlis and Michalis Polychronakis. 2018. Compiler-assisted code randomization. In Security and Privacy."},{"key":"e_1_3_2_1_36_1","unstructured":"Christopher Kruegel William Robertson Fredrik Valeur and Giovanni Vigna. 2004. Static disassembly of obfuscated binaries. In USENIX Security."},{"key":"e_1_3_2_1_37_1","volume-title":"Larus and Eric Schnarr","author":"James","year":"1995","unstructured":"James R. Larus and Eric Schnarr. 1995. EEL: machine-independent executable editing. In PLDI."},{"key":"e_1_3_2_1_38_1","volume-title":"TIE: Principled reverse engineering of types in binary programs.","author":"Lee JongHyup","year":"2011","unstructured":"JongHyup Lee, Thanassis Avgerinos, and David Brumley. 2011. TIE: Principled reverse engineering of types in binary programs. (2011)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Lixin Li Jim Just and R. Sekar. 2006. Address-space randomization for windows systems. In ACSAC.","DOI":"10.1109\/ACSAC.2006.10"},{"key":"e_1_3_2_1_40_1","volume-title":"Vuldeepecker: A deep learning-based system for vulnerability detection. arXiv preprint arXiv:1801.01681","author":"Li Zhen","year":"2018","unstructured":"Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, and Yuyi Zhong. 2018. Vuldeepecker: A deep learning-based system for vulnerability detection. arXiv preprint arXiv:1801.01681 (2018)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2788959.2788964"},{"key":"e_1_3_2_1_42_1","volume-title":"System V application binary interface. AMD64 Architecture Processor Supplement","author":"Lu HJ","year":"2018","unstructured":"HJ Lu, Michael Matz, J Hubicka, A Jaeger, and M Mitchell. 2018. System V application binary interface. AMD64 Architecture Processor Supplement (2018)."},{"key":"e_1_3_2_1_43_1","unstructured":"C-K Luk Robert Muth Harish Patil Robert Cohn and Geoff Lowney. 2004. Ispike: a post-link optimizer for the intel\/spl reg\/itanium\/spl reg\/architecture. In CGO."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Xiaozhu Meng and Barton P Miller. 2016. Binary code is not easy. In ISSTA.","DOI":"10.1145\/2931037.2931047"},{"volume-title":"Probabilistic disassembly","author":"Miller Kenneth","key":"e_1_3_2_1_45_1","unstructured":"Kenneth Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang, Xiangyu Zhang, and Zhiqiang Lin. 2019. Probabilistic disassembly. In IEEE\/ACM ICSE."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Markus M\u00fcller-Olm and Helmut Seidl. 2004. A note on Karr\u00e2\u0102\u0179s algorithm. In International Colloquium on Automata Languages and Programming.","DOI":"10.1007\/978-3-540-27836-8_85"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Nicholas Nethercote and Julian Seward. 2007. Valgrind: a framework for heavy-weight dynamic binary instrumentation. In PLDI.","DOI":"10.1145\/1250734.1250746"},{"volume-title":"LISC v2: Learning Instruction Semantics from Code Generators","author":"Nguyen Huan","key":"e_1_3_2_1_48_1","unstructured":"Huan Nguyen, Niranjan Hasabnis, and R Sekar. 2019. LISC v2: Learning Instruction Semantics from Code Generators. http:\/\/www.seclab.cs.sunysb.edu\/seclab\/liscV2\/. Accessed: 2023-08-06."},{"volume-title":"Bolt: a practical binary optimizer for data centers and beyond","author":"Panchenko Maksim","key":"e_1_3_2_1_49_1","unstructured":"Maksim Panchenko, Rafael Auler, Bill Nell, and Guilherme Ottoni. 2019. Bolt: a practical binary optimizer for data centers and beyond. In IEEE\/ACM CGO."},{"volume-title":"SoK: All you ever wanted to know about x86\/x64 binary disassembly but were afraid to ask","author":"Pang Chengbin","key":"e_1_3_2_1_50_1","unstructured":"Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, and Jun Xu. 2021. SoK: All you ever wanted to know about x86\/x64 binary disassembly but were afraid to ask. In IEEE S&P."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Chengbin Pang Ruotong Yu Dongpeng Xu Eric Koskinen Georgios Portokalidis and Jun Xu. 2021. Towards Optimal Use of Exception Handling Information for Function Detection. In DSN.","DOI":"10.1109\/DSN48987.2021.00046"},{"key":"e_1_3_2_1_52_1","volume-title":"Xda: Accurate, robust disassembly with transfer learning. arXiv preprint arXiv:2010.00770","author":"Pei Kexin","year":"2020","unstructured":"Kexin Pei, Jonas Guan, David Williams-King, Junfeng Yang, and Suman Jana. 2020. Xda: Accurate, robust disassembly with transfer learning. arXiv preprint arXiv:2010.00770 (2020)."},{"volume-title":"Cross-architecture bug search in binary executables","author":"Pewny Jannik","key":"e_1_3_2_1_53_1","unstructured":"Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, and Thorsten Holz. 2015. Cross-architecture bug search in binary executables. In IEEE S&P."},{"key":"e_1_3_2_1_54_1","unstructured":"Pin [n. d.]. Pin - A Dynamic Binary Instrumentation Tool. http:\/\/pintool.org\/."},{"key":"e_1_3_2_1_55_1","volume-title":"SAFER: Efficient and Error-Tolerant Binary Instrumentation. In USENIX Security.","author":"Priyadarshan Soumyakant","year":"2023","unstructured":"Soumyakant Priyadarshan, Huan Nguyen, Rohit Chouhan, and R Sekar. 2023. SAFER: Efficient and Error-Tolerant Binary Instrumentation. In USENIX Security."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Soumyakant Priyadarshan Huan Nguyen and R. Sekar. 2020. On the Impact of Exception Handling Compatibility on Binary Instrumentation. In ACM FEAST.","DOI":"10.1145\/3411502.3418428"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Soumyakant Priyadarshan Huan Nguyen and R. Sekar. 2020. Practical Fine-Grained Binary Code Randomization. In ACSAC.","DOI":"10.1145\/3427228.3427292"},{"key":"e_1_3_2_1_58_1","volume-title":"Taesoo Kim, and Wenke Lee.","author":"Qian Chenxiong","year":"2019","unstructured":"Chenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, and Wenke Lee. 2019. RAZOR: A Framework for Post-deployment Software Debloating.. In USENIX Security."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Rui Qiao and R Sekar. 2017. A Principled Approach for Function Recognition in COTS Binaries. In Dependable Systems and Networks (DSN).","DOI":"10.1109\/DSN.2017.29"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Rui Qiao Mingwei Zhang and R Sekar. 2015. A Principled Approach for ROP Defense. In ACSAC.","DOI":"10.1145\/2818000.2818021"},{"key":"e_1_3_2_1_61_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, (DIMVA","author":"Redini Nilo","year":"2019","unstructured":"Nilo Redini, Ruoyu Wang, Aravind Machiry, Yan Shoshitaishvili, Giovanni Vigna, and Christopher Kruegel. 2019. BinTrimmer: Towards static binary debloating through abstract interpretation. In Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, (DIMVA 2019)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338503.3357725"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Prateek Saxena R Sekar and Varun Puranik. 2008. Efficient fine-grained binary instrumentation with applications to taint-tracking. In CGO.","DOI":"10.1145\/1356058.1356069"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/882506.885138"},{"key":"e_1_3_2_1_65_1","volume-title":"IEEE Workshop on Binary Translation.","author":"Scott Kevin","year":"2001","unstructured":"Kevin Scott and Jack Davidson. 2001. Strata: A software dynamic translation infrastructure. In IEEE Workshop on Binary Translation."},{"key":"e_1_3_2_1_66_1","unstructured":"Eui Chul Richard Shin Dawn Song and Reza Moazzezi. 2015. Recognizing functions in binaries with neural networks. In USENIX Security."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christopher Salls Nick Stephens Mario Polino Andrew Dutcher John Grosen Siji Feng Christophe Hauser Christopher Kruegel et al. 2016. Sok:(state of) the art of war: Offensive techniques in binary analysis. In Security and Privacy (SP).","DOI":"10.1109\/SP.2016.17"},{"volume-title":"Practical Proactive Integrity Preservation: A Basis for Malware Defense","author":"Sun Weiqing","key":"e_1_3_2_1_68_1","unstructured":"Weiqing Sun, R. Sekar, Gaurav Poothia, and Tejas Karandikar. 2008. Practical Proactive Integrity Preservation: A Basis for Malware Defense. In IEEE S&P."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Victor Van der Veen Dennis Andriesse Enes G\u00f6kta\u015f Ben Gras Lionel Sambuc Asia Slowinska Herbert Bos and Cristiano Giuffrida. 2015. Practical context-sensitive CFI. In ACM CCS.","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_70_1","volume-title":"Ramblr: Making Reassembly Great Again.. In NDSS.","author":"Wang Ruoyu","year":"2017","unstructured":"Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, and Giovanni Vigna. 2017. Ramblr: Making Reassembly Great Again.. In NDSS."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Richard Wartell Vishwath Mohan Kevin W Hamlen and Zhiqiang Lin. 2012. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In ACM CCS.","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06608-0_23"},{"key":"e_1_3_2_1_73_1","volume-title":"Junfeng Yang, and Vasileios P Kemerlis.","author":"Williams-King David","year":"2020","unstructured":"David Williams-King, Hidenori Kobayashi, Kent Williams-King, Graham Patterson, Frank Spano, Yu Jian Wu, Junfeng Yang, and Vasileios P Kemerlis. 2020. Egalito: Layout-Agnostic Binary Recompilation. In ASPLOS."},{"volume-title":"Practical control flow integrity and randomization for binary executables","author":"Zhang Chao","key":"e_1_3_2_1_74_1","unstructured":"Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. 2013. Practical control flow integrity and randomization for binary executables. In IEEE S&P."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","unstructured":"Mingwei Zhang Michalis Polychronakis and R Sekar. 2017. Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks. In ACSAC.","DOI":"10.1145\/3134600.3134634"},{"key":"e_1_3_2_1_76_1","unstructured":"Mingwei Zhang and R Sekar. 2013. Control flow integrity for COTS binaries. In USENIX Security."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Mingwei Zhang and R Sekar. 2015. Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks. In ACSAC.","DOI":"10.1145\/2818000.2818016"},{"key":"e_1_3_2_1_78_1","volume-title":"Stochfuzz: Sound and cost-effective fuzzing of stripped binaries by incremental and stochastic rewriting","author":"Zhang Zhuo","year":"2021","unstructured":"Zhuo Zhang, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu, and Xiangyu Zhang. 2021. Stochfuzz: Sound and cost-effective fuzzing of stripped binaries by incremental and stochastic rewriting. In IEEE S&P."}],"event":{"name":"ASPLOS '23: 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Vancouver BC Canada","acronym":"ASPLOS '23"},"container-title":["Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3623278.3624766","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3623278.3624766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T16:06:45Z","timestamp":1708963605000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3623278.3624766"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,25]]},"references-count":78,"alternative-id":["10.1145\/3623278.3624766","10.1145\/3623278"],"URL":"https:\/\/doi.org\/10.1145\/3623278.3624766","relation":{},"subject":[],"published":{"date-parts":[[2023,3,25]]},"assertion":[{"value":"2024-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}