{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:37:28Z","timestamp":1761597448793,"version":"3.40.1"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/mc.2013.268","type":"journal-article","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T18:02:02Z","timestamp":1377021722000},"page":"60-68","source":"Crossref","is-referenced-by-count":15,"title":["Binary Code Analysis"],"prefix":"10.1109","volume":"46","author":[{"given":"Kaiping","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hee Beng Kuan","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"author":"Hanov","key":"ref1","article-title":"Static Analysis of Binary Executables"},{"article-title":"A Survey on Tools for Binary Code Analysis","year":"2004","author":"Li","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1999.777758"},{"key":"ref4","first-page":"1013","article-title":"On the Static Analysis of Indirect Control Transfers in Binaries","volume-title":"Proc. Int\u2019l Conf. Parallel and Distributed Processing Techniques and Applications (PDPTA 00","author":"De Sutter","year":"2000"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173063"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268948"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.21236\/ADA449077"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref9","article-title":"IntScope: Automatically Detecting Integer Overflow Vulnerability in x86 Binary Using Symbolic Execution","volume-title":"Proc. Network Distributed System Security Symp. (NDSS 09)","author":"Wang","year":"2009"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21236\/ADA538843"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624245"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/773473.178456"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2003.1238038"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21236\/ada449067"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1356058.1356069"},{"key":"ref16","article-title":"Automating Mimicry Attacks Using Static Binary Analysis","volume-title":"Proc. 14th Usenix Security Symp. (SSYM 05)","volume":"4","author":"Kruegel","year":"2005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191551"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1216374.1216380"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254830"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"ref23","first-page":"321","article-title":"Understanding Data Lifetime via Whole System Simulation","volume-title":"Proc. 13th Usenix Security Symp. (SSYM 04)","author":"Chow","year":"2004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/6583166\/06583187.pdf?arnumber=6583187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T06:02:35Z","timestamp":1742364155000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6583187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":24,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/mc.2013.268","relation":{},"ISSN":["0018-9162"],"issn-type":[{"type":"print","value":"0018-9162"}],"subject":[],"published":{"date-parts":[[2013,8]]}}}