{"id":"https://openalex.org/W3124033940","doi":"https://doi.org/10.1145/3416126","title":"Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers","display_name":"Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers","publication_year":2021,"publication_date":"2021-01-22","ids":{"openalex":"https://openalex.org/W3124033940","doi":"https://doi.org/10.1145/3416126","mag":"3124033940"},"language":"en","primary_location":{"id":"doi:10.1145/3416126","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3416126","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3416126","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3416126","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056722177","display_name":"Usui Toshinori","orcid":null},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Toshinori Usui","raw_affiliation_strings":["NTT Secure Platform Laboratories/Institute of Industrial Science, The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories/Institute of Industrial Science, The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019011248","display_name":"Yuto Otsuki","orcid":null},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yuto Otsuki","raw_affiliation_strings":["NTT Secure Platform Laboratories, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042634142","display_name":"Tomonori Ikuse","orcid":null},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tomonori Ikuse","raw_affiliation_strings":["NTT Secure Platform Laboratories, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058925200","display_name":"Yuhei Kawakoya","orcid":"https://orcid.org/0009-0005-9310-0493"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yuhei Kawakoya","raw_affiliation_strings":["NTT Secure Platform Laboratories, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102143401","display_name":"Makoto Iwamura","orcid":null},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Makoto Iwamura","raw_affiliation_strings":["NTT Secure Platform Laboratories, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031557291","display_name":"Jun Miyoshi","orcid":"https://orcid.org/0000-0002-4496-4800"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Jun Miyoshi","raw_affiliation_strings":["NTT Secure Platform Laboratories, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060665991","display_name":"K. Matsuura","orcid":"https://orcid.org/0009-0005-0348-026X"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kanta Matsuura","raw_affiliation_strings":["Institute of Industrial Science, The University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Industrial Science, The University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5056722177"],"corresponding_institution_ids":["https://openalex.org/I74801974"],"apc_list":null,"apc_paid":null,"fwci":0.1537,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.39447506,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":"1","first_page":"1","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.913004457950592},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8464545607566833},{"id":"https://openalex.org/keywords/vbscript","display_name":"VBScript","score":0.5430577993392944},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5097072124481201},{"id":"https://openalex.org/keywords/visual-basic-for-applications","display_name":"Visual Basic for Applications","score":0.5016310214996338},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.4851442277431488},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.45157450437545776},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3340855836868286},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2692873477935791},{"id":"https://openalex.org/keywords/microsoft-visual-studio","display_name":"Microsoft Visual Studio","score":0.17704951763153076}],"concepts":[{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.913004457950592},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8464545607566833},{"id":"https://openalex.org/C124998573","wikidata":"https://www.wikidata.org/wiki/Q13743","display_name":"VBScript","level":4,"score":0.5430577993392944},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5097072124481201},{"id":"https://openalex.org/C115199736","wikidata":"https://www.wikidata.org/wiki/Q667566","display_name":"Visual Basic for Applications","level":2,"score":0.5016310214996338},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.4851442277431488},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.45157450437545776},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3340855836868286},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2692873477935791},{"id":"https://openalex.org/C512115632","wikidata":"https://www.wikidata.org/wiki/Q134067","display_name":"Microsoft Visual Studio","level":3,"score":0.17704951763153076},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3416126","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3416126","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3416126","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3416126","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3416126","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3416126","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.5899999737739563}],"awards":[{"id":"https://openalex.org/G1069223013","display_name":null,"funder_award_id":"JSPS KAKENHI","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G2011206346","display_name":null,"funder_award_id":"KAKENHI Grant Number JP17KT0081","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G2774880626","display_name":"Security Evaluation Methods in Trust Infrastructure Based on Engineering and Economics","funder_award_id":"17KT0081","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G3459562248","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4227499671","display_name":null,"funder_award_id":"KAKENHI Grant","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4636223006","display_name":null,"funder_award_id":"JSPS KAK","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G5551805229","display_name":null,"funder_award_id":"JP17KT0081","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G5786340949","display_name":null,"funder_award_id":"KAKENHI Grant Number","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G8430481527","display_name":null,"funder_award_id":"Number","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3124033940.pdf","grobid_xml":"https://content.openalex.org/works/W3124033940.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W62185554","https://openalex.org/W182734301","https://openalex.org/W1773541209","https://openalex.org/W2039999720","https://openalex.org/W2049629426","https://openalex.org/W2087064593","https://openalex.org/W2087740020","https://openalex.org/W2095519872","https://openalex.org/W2112448454","https://openalex.org/W2121234902","https://openalex.org/W2122366494","https://openalex.org/W2125682153","https://openalex.org/W2128389850","https://openalex.org/W2135162105","https://openalex.org/W2138580357","https://openalex.org/W2140807364","https://openalex.org/W2148155140","https://openalex.org/W2166779248","https://openalex.org/W2296241649","https://openalex.org/W2328374358","https://openalex.org/W2407044862","https://openalex.org/W2509347842","https://openalex.org/W2517430515","https://openalex.org/W2738011505","https://openalex.org/W2742249911","https://openalex.org/W2789673548","https://openalex.org/W2790562154","https://openalex.org/W2891539454","https://openalex.org/W2892187814","https://openalex.org/W2990353952","https://openalex.org/W3166159123","https://openalex.org/W4243272515"],"related_works":["https://openalex.org/W3023132425","https://openalex.org/W65796520","https://openalex.org/W2359947154","https://openalex.org/W150021437","https://openalex.org/W1954715427","https://openalex.org/W2375223485","https://openalex.org/W2600169860","https://openalex.org/W2186082214","https://openalex.org/W377483258","https://openalex.org/W137501682"],"abstract_inverted_index":{"Script":[0],"languages":[1,59,74,178],"are":[2],"designed":[3],"to":[4,17,54,60,115],"be":[5],"easy-to-use":[6],"and":[7,91,140,193],"require":[8],"low":[9],"learning":[10],"costs.":[11],"These":[12],"features":[13],"provide":[14],"attackers":[15,181],"options":[16],"choose":[18],"a":[19,37,84,95,104,123,136,142,147],"script":[20,58,73,96,105,124,137,143,148,171,177,201],"language":[21,149],"for":[22,43,56,72,86,102,146,174,184],"developing":[23],"their":[24],"malicious":[25,62,207],"scripts.":[26,208],"This":[27,154],"diversity":[28],"of":[29,119,122,132,135],"choice":[30],"in":[31,46,65,94,157],"the":[32,41,47,89,117,129,133,159,170,175],"attacker":[33],"side":[34],"unexpectedly":[35],"imposes":[36],"significant":[38],"cost":[39,71,118],"on":[40],"preparation":[42],"analysis":[44],"tools":[45],"defense":[48],"side.":[49],"That":[50],"is,":[51],"we":[52,82],"have":[53],"prepare":[55],"multiple":[57],"analyze":[61],"scripts":[63],"written":[64],"them.":[66],"We":[67],"call":[68],"this":[69,80],"unbalanced":[70],"asymmetry":[75,160],"problem":[76],".":[77],"To":[78],"solve":[79],"problem,":[81],"propose":[83],"method":[85,112,168],"automatically":[87],"detecting":[88],"hook":[90],"tap":[92],"points":[93],"engine":[97,125],"binary":[98],"that":[99,166,199],"is":[100,128],"essential":[101],"building":[103],"Application":[106],"Programming":[107],"Interface":[108],"(API)":[109],"tracer.":[110],"Our":[111],"allows":[113],"us":[114],"reduce":[116],"reverse":[120],"engineering":[121],"binary,":[126],"which":[127],"largest":[130],"portion":[131],"development":[134],"API":[138,144,172,202],"tracer,":[139],"build":[141],"tracer":[145],"with":[150],"minimum":[151],"manual":[152],"intervention.":[153],"advantage":[155],"results":[156,164,196],"solving":[158],"problem.":[161],"The":[162,195],"experimental":[163],"showed":[165],"our":[167],"generated":[169],"tracers":[173,203],"three":[176],"popular":[179],"among":[180],"(Visual":[182],"Basic":[183,189],"Applications":[185],"(VBA),":[186],"Microsoft":[187],"Visual":[188],"Scripting":[190],"Edition":[191],"(VBScript),":[192],"PowerShell).":[194],"also":[197],"demonstrated":[198],"these":[200],"successfully":[204],"analyzed":[205],"real-world":[206]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
