{"id":"https://openalex.org/W2040518484","doi":"https://doi.org/10.1145/2786805.2786875","title":"Mimic: computing models for opaque code","display_name":"Mimic: computing models for opaque code","publication_year":2015,"publication_date":"2015-08-26","ids":{"openalex":"https://openalex.org/W2040518484","doi":"https://doi.org/10.1145/2786805.2786875","mag":"2040518484"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2786805.2786875","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://stefanheule.com/papers/fse15-mimic.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064408830","display_name":"Stefan Heule","orcid":null},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"funder","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stefan Heule","raw_affiliation_strings":["Stanford University - USA > > > >"],"affiliations":[{"raw_affiliation_string":"Stanford University - USA > > > >","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038828346","display_name":"Manu Sridharan","orcid":"https://orcid.org/0000-0001-7993-302X"},"institutions":[{"id":"https://openalex.org/I4210101778","display_name":"Samsung (United States)","ror":"https://ror.org/01bfbvm65","country_code":"US","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210101778"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Manu Sridharan","raw_affiliation_strings":["Samsung Research, USA"],"affiliations":[{"raw_affiliation_string":"Samsung Research, USA","institution_ids":["https://openalex.org/I4210101778"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101965118","display_name":"Satish Chandra","orcid":"https://orcid.org/0000-0003-2546-9000"},"institutions":[{"id":"https://openalex.org/I4210101778","display_name":"Samsung (United States)","ror":"https://ror.org/01bfbvm65","country_code":"US","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210101778"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Satish Chandra","raw_affiliation_strings":["Samsung Research, USA"],"affiliations":[{"raw_affiliation_string":"Samsung Research, USA","institution_ids":["https://openalex.org/I4210101778"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":7.13,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":26,"citation_normalized_percentile":{"value":0.935629,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"710","last_page":"720"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9942,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.81924266},{"id":"https://openalex.org/keywords/opacity","display_name":"Opacity","score":0.64632},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.49221554},{"id":"https://openalex.org/keywords/dead-code","display_name":"Dead code","score":0.42384598}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83244574},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.81924266},{"id":"https://openalex.org/C60056205","wikidata":"https://www.wikidata.org/wiki/Q691914","display_name":"Opacity","level":2,"score":0.64632},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.52733886},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.517393},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.5051554},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.49221554},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.4341068},{"id":"https://openalex.org/C47434764","wikidata":"https://www.wikidata.org/wiki/Q1770035","display_name":"Dead code","level":5,"score":0.42384598},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4100631},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.39706364},{"id":"https://openalex.org/C151578736","wikidata":"https://www.wikidata.org/wiki/Q1251793","display_name":"Redundant code","level":4,"score":0.34806323},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34491307},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2518955},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20273471},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.13211554},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2786805.2786875","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.720.7436","pdf_url":"http://stefanheule.com/papers/fse15-mimic.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.720.7436","pdf_url":"http://stefanheule.com/papers/fse15-mimic.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W148396834","https://openalex.org/W1965995882","https://openalex.org/W1969005071","https://openalex.org/W1974031481","https://openalex.org/W2008685183","https://openalex.org/W2024818492","https://openalex.org/W2060302428","https://openalex.org/W2105315191","https://openalex.org/W2113248059","https://openalex.org/W2126071695","https://openalex.org/W2132481916","https://openalex.org/W2134734244","https://openalex.org/W2135194391","https://openalex.org/W2146105230","https://openalex.org/W2149236697","https://openalex.org/W2152225177","https://openalex.org/W2181712945","https://openalex.org/W2294628582"],"related_works":["https://openalex.org/W632311702","https://openalex.org/W4387674316","https://openalex.org/W4253804737","https://openalex.org/W4235592786","https://openalex.org/W2160620982","https://openalex.org/W2123574549","https://openalex.org/W2084499270","https://openalex.org/W1855031921","https://openalex.org/W1777501891","https://openalex.org/W116913286"],"abstract_inverted_index":{"Opaque":[0],"code,":[1,36,75],"which":[2],"is":[3,8,30,40],"executable":[4,117],"but":[5,37],"whose":[6,120],"source":[7],"unavailable":[9],"or":[10],"hard":[11],"to":[12,33,50,89,96,114,136,162],"process,":[13],"can":[14],"be":[15],"problematic":[16],"in":[17,148],"a":[18,52,55,65,104,130,149,167],"number":[19],"of":[20,28,54,57,71,140,155,169],"scenarios,":[21],"such":[22],"as":[23],"program":[24,61,78],"analysis.":[25],"Manual":[26],"construction":[27],"models":[29,72,154,165],"often":[31],"used":[32,160],"handle":[34],"opaque":[35,74,87,124,156],"this":[38,45,94],"process":[39],"tedious":[41],"and":[42,92,129,159],"error-prone.":[43],"(In":[44],"paper,":[46],"we":[47],"use":[48],"model":[49,119],"mean":[51],"representation":[53],"piece":[56],"code":[58,88,118],"suitable":[59],"for":[60,68,73,152,166],"analysis.)":[62],"We":[63,143],"present":[64],"novel":[66],"technique":[67,81,147],"automatic":[69],"generation":[70],"based":[76],"on":[77],"synthesis.":[79],"The":[80],"intercepts":[82],"memory":[83],"accesses":[84],"from":[85],"the":[86,123,138,141],"client":[90],"objects,":[91],"uses":[93],"information":[95],"construct":[97],"partial":[98],"execution":[99],"traces.":[100],"Then,":[101],"it":[102],"performs":[103],"heuristic":[105],"search":[106],"inspired":[107],"by":[108],"Markov":[109],"Chain":[110],"Monte":[111],"Carlo":[112],"techniques":[113],"discover":[115],"an":[116],"behavior":[121],"matches":[122],"code.":[125],"Native":[126],"execution,":[127],"parallelization,":[128],"carefully-designed":[131],"fitness":[132],"function":[133],"are":[134],"leveraged":[135],"increase":[137],"effectiveness":[139],"search.":[142],"have":[144],"implemented":[145],"our":[146],"tool":[150],"Mimic":[151,161],"discovering":[153],"JavaScript":[157],"functions,":[158],"synthesize":[163],"correct":[164],"variety":[168],"array-manipulating":[170],"routines.":[171]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2040518484","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3}],"updated_date":"2025-04-16T18:58:21.801196","created_date":"2016-06-24"}