{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:46:35Z","timestamp":1749015995229,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031143137"},{"type":"electronic","value":"9783031143144"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-14314-4_46","type":"book-chapter","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T16:51:08Z","timestamp":1660236668000},"page":"441-448","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Constructing Opaque Predicate Using Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Yohsuke","family":"Hirano","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yasuhiro","family":"Ohtaki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,8,12]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Bardin, S., David, R., Marion, J.-Y.: Backward-bounded DSE: targeting infeasibility questions on obfuscated codes. In: 2017 IEEE Symposium on Security and Privacy. IEEE (2017)","DOI":"10.1109\/SP.2017.36"},{"key":"46_CR2","unstructured":"Arboit, G.: A method for watermarking java programs via opaque predicates. In: ICECR-5 (2002)"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Zobernig, L., Galbraith, S.D., Russello, G.: When are opaque predicates useful? In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering. IEEE (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00031"},{"key":"46_CR4","unstructured":"Tirenna, P.F.: Techniques for malware analysis based on symbolic execution. Diss, Politecnico di Torino (2020). https:\/\/webthesis.biblio.polito.it\/15305\/1\/tesi.pdf"},{"key":"46_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-319-93411-2_17","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"J Salwan","year":"2018","unstructured":"Salwan, J., Bardin, S., Potet, M.-L.: Symbolic deobfuscation: from virtualized code back to the original. In: Giuffrida, C., Bardin, S., Blanc, G. (eds.) DIMVA 2018. LNCS, vol. 10885, pp. 372\u2013392. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93411-2_17"},{"key":"46_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-319-89500-0_28","volume-title":"Information and Communications Security","author":"M Liang","year":"2018","unstructured":"Liang, M., Li, Z., Zeng, Q., Fang, Z.: Deobfuscation of virtualization-obfuscated code through symbolic execution and compilation optimization. In: Qing, S., Mitchell, C., Chen, L., Liu, D. (eds.) ICICS 2017. LNCS, vol. 10631, pp. 313\u2013324. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89500-0_28"},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Kan, Z., Wang, H., Wu, L., Guo, Y., Xu, G.: Deobfuscating android native binary code. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion). IEEE (2019)","DOI":"10.1109\/ICSE-Companion.2019.00135"},{"key":"46_CR8","unstructured":"Blazytko, T., Contag, M., Aschermann, C., Holz, T.: Syntia: synthesizing the semantics of obfuscated code. USENIX Security (2017)"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"David, R., Coniglio, L., Ceccato, M.: QSynth - a program synthesis based approach for binary code deobfuscation. In: BAR 2020 Workshop (2020)","DOI":"10.14722\/bar.2020.23009"},{"issue":"4","key":"46_CR10","first-page":"431","volume":"46","author":"A Monden","year":"2005","unstructured":"Monden, A.: Recent software protection techniques software only tamper prevention. IPSJ Mag. 46(4), 431\u2013437 (2005)","journal-title":"IPSJ Mag."},{"issue":"1","key":"46_CR11","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2020","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabachene, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33(1), 34\u201391 (2020)","journal-title":"J. Cryptol."},{"key":"46_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/978-3-642-32009-5_50","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"Z Brakerski","year":"2012","unstructured":"Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 868\u2013886. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_50"},{"key":"46_CR13","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptol, ePrint Arch, 144.2012 (2012)"},{"key":"46_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"key":"46_CR15","unstructured":"Microsoft Research, SEAL. https:\/\/github.com\/microsoft\/SEAL"},{"key":"46_CR16","unstructured":"Pin - A Dynamic Binary Instrumentation Tool. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/tool\/pin-a-dynamic-binary-instrumentation-tool.html"},{"key":"46_CR17","unstructured":"Nishi, Y., Kanzaki, Y., Monden, A.: A study on the effectiveness of code obfuscation techniques against automated attacks. Information Processing Society of Japan, pp. 199\u2013200 (2018)"},{"key":"46_CR18","unstructured":"angr. http:\/\/angr.io\/"},{"key":"46_CR19","doi-asserted-by":"crossref","unstructured":"Shoshitaishvili, Y., et al.: SOK: (state of) the art of war: offensive techniques in binary analysis. In: 2016 IEEE Symposium on Security and Privacy. IEEE (2016)","DOI":"10.1109\/SP.2016.17"},{"key":"46_CR20","doi-asserted-by":"crossref","unstructured":"Stephens, N., et al.: Driller: augmenting fuzzing through selective symbolic execution. In: NDSS, vol. 16, no. 2016 (2016)","DOI":"10.14722\/ndss.2016.23368"},{"key":"46_CR21","doi-asserted-by":"crossref","unstructured":"Shoshitaishvili, Y., et al.: Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware. In: NDSS, vol. 1 (2015)","DOI":"10.14722\/ndss.2015.23294"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Network-Based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14314-4_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T16:55:41Z","timestamp":1660236941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14314-4_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031143137","9783031143144"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14314-4_46","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"12 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NBiS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network-Based Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sanda-Shi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nbis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/nbis\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}