{"id":"https://openalex.org/W4285814662","doi":"https://doi.org/10.1145/3524481.3527215","title":"NEMIANA","display_name":"NEMIANA","publication_year":2022,"publication_date":"2022-05-17","ids":{"openalex":"https://openalex.org/W4285814662","doi":"https://doi.org/10.1145/3524481.3527215"},"language":"en","primary_location":{"id":"doi:10.1145/3524481.3527215","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3524481.3527215","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3524481.3527215","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM/IEEE International Conference on Automation of Software Test","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3524481.3527215","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008438259","display_name":"Nobuyuki Kanaya","orcid":null},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Nobuyuki Kanaya","raw_affiliation_strings":["National Institute of Information and Communications Technology, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology, Japan","institution_ids":["https://openalex.org/I90023481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070057383","display_name":"Yu Tsuda","orcid":null},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yu Tsuda","raw_affiliation_strings":["National Institute of Information and Communications Technology, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology, Japan","institution_ids":["https://openalex.org/I90023481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061525465","display_name":"Yuuki Takano","orcid":"https://orcid.org/0000-0002-6888-9024"},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yuuki Takano","raw_affiliation_strings":["Osaka University, Japan"],"affiliations":[{"raw_affiliation_string":"Osaka University, Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059388572","display_name":"Yoshitada Fujiwara","orcid":null},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshitada Fujiwara","raw_affiliation_strings":["National Institute of Information and Communications Technology, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology, Japan","institution_ids":["https://openalex.org/I90023481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085568759","display_name":"Ryoichi Isawa","orcid":null},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryoichi Isawa","raw_affiliation_strings":["National Institute of Information and Communications Technology, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology, Japan","institution_ids":["https://openalex.org/I90023481"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071687365","display_name":"Daisuke Inoue","orcid":"https://orcid.org/0000-0002-4373-0834"},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Daisuke Inoue","raw_affiliation_strings":["National Institute of Information and Communications Technology, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology, Japan","institution_ids":["https://openalex.org/I90023481"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5008438259"],"corresponding_institution_ids":["https://openalex.org/I90023481"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06946343,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"138","last_page":"147"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.8674479722976685},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8417993783950806},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5903431177139282},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5434404611587524},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44011908769607544},{"id":"https://openalex.org/keywords/debugger","display_name":"Debugger","score":0.43481236696243286},{"id":"https://openalex.org/keywords/algorithmic-program-debugging","display_name":"Algorithmic program debugging","score":0.42810171842575073},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.3657982349395752}],"concepts":[{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.8674479722976685},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8417993783950806},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5903431177139282},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5434404611587524},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44011908769607544},{"id":"https://openalex.org/C2778485113","wikidata":"https://www.wikidata.org/wiki/Q193231","display_name":"Debugger","level":3,"score":0.43481236696243286},{"id":"https://openalex.org/C136388014","wikidata":"https://www.wikidata.org/wiki/Q17084976","display_name":"Algorithmic program debugging","level":3,"score":0.42810171842575073},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.3657982349395752}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3524481.3527215","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3524481.3527215","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3524481.3527215","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM/IEEE International Conference on Automation of Software Test","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3524481.3527215","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3524481.3527215","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3524481.3527215","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM/IEEE International Conference on Automation of Software Test","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4285814662.pdf","grobid_xml":"https://content.openalex.org/works/W4285814662.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W2004340162","https://openalex.org/W2073483982","https://openalex.org/W2125923006","https://openalex.org/W2130513448","https://openalex.org/W2576376563","https://openalex.org/W2604468014","https://openalex.org/W2751343396","https://openalex.org/W2778306243","https://openalex.org/W2884769489","https://openalex.org/W2975600444","https://openalex.org/W3105199275","https://openalex.org/W4232200297"],"related_works":["https://openalex.org/W4387146963","https://openalex.org/W2801084903","https://openalex.org/W2899875271","https://openalex.org/W4320152591","https://openalex.org/W4384377074","https://openalex.org/W564953056","https://openalex.org/W645308258","https://openalex.org/W1606209748","https://openalex.org/W2117261969","https://openalex.org/W2045467460"],"abstract_inverted_index":{"Many":[0],"IoT":[1],"devices":[2],"are":[3],"compromised":[4],"by":[5,192],"exploiting":[6],"their":[7,245],"software":[8,50,110],"vulnerabilities":[9,22],"in":[10,67],"these":[11],"devices.":[12],"A":[13,148],"technique":[14],"during":[15],"a":[16,42,70,74,122,125,132,196,220,229],"development":[17],"phase":[18],"to":[19,128,168,187,204],"fix":[20],"such":[21],"efficiently":[23,80],"is":[24,154,186,212],"leveraging":[25],"advantages":[26],"of":[27,49,84,109,158,175,181,223],"various":[28,169],"platforms":[29,170],"(e.g.,":[30,115,124,131,160],"single-board":[31,71,126],"computers,":[32],"emulators,":[33],"and":[34,235],"FPGA":[35,133],"(Field":[36],"Programmable":[37],"Gate":[38],"Array)":[39],"boards).":[40],"As":[41],"debugging":[43,60,139,231,246],"scenario,":[44],"developers":[45,203,240],"discover":[46],"some":[47],"vulnerability-candidates":[48],"under":[51],"test":[52],"on":[53,69,144],"an":[54,97,155],"emulator":[55],"like":[56],"QEMU":[57],"with":[58,77,232],"rich":[59],"plugins.":[61],"They":[62],"then":[63,136],"check":[64],"those":[65],"candidates":[66],"detail":[68],"computer":[72],"(i.e.,":[73],"real":[75],"device)":[76],"GDB.":[78],"To":[79],"conduct":[81],"this":[82],"kind":[83],"debugging,":[85],"we":[86,210],"propose":[87],"NEMIANA":[88,224,243],"(Noncomplex":[89],"Execution":[90],"Migration":[91],"Integrated":[92],"Architecture":[93],"for":[94,99,151,215,244],"Nonstop":[95],"Analyses),":[96],"architecture":[98],"automatically":[100],"conducting":[101],"cross-platform":[102,152],"execution":[103,113,142,207],"migration.":[104],"It":[105,238],"can":[106,165,241],"migrate":[107],"execution-state":[108,159],"at":[111,140],"any":[112,206],"points":[114],"500":[116],"steps":[117],"after":[118],"the":[119,145,176,218],"beginning)":[120],"from":[121],"platform":[123,130],"computer)":[127],"another":[129],"board).":[134],"Developers":[135],"seamlessly":[137],"continue":[138],"that":[141],"point":[143],"destination":[146],"platform.":[147],"key":[149,184],"idea":[150,185],"migration":[153],"abstraction":[156],"model":[157],"CPU":[161],"register/memory":[162],"values),":[163],"which":[164,209],"be":[166],"applied":[167],"(if":[171],"they":[172],"have":[173],"CPUs":[174],"same":[177],"ISA":[178],"(Instruction":[179],"Set":[180],"Architecture)).":[182],"Another":[183],"trace":[188],"all":[189],"instructions":[190],"executed":[191],"software.":[193],"This":[194],"incurs":[195],"system":[197,222],"performance":[198],"overhead;":[199],"however,":[200],"it":[201],"enables":[202],"choose":[205],"points,":[208],"hope":[211],"very":[213],"helpful":[214],"debugging.":[216],"In":[217],"evaluation,":[219],"prototype":[221],"demonstrates":[225],"three":[226],"case":[227],"studies:":[228],"typical":[230],"GDB,":[233],"benchmarking,":[234],"vulnerability":[236],"discovery.":[237],"shows":[239],"use":[242],"purposes.":[247]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-07-19T00:00:00"}
