{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T10:25:20Z","timestamp":1771928720850,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031547751","type":"print"},{"value":"9783031547768","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54776-8_9","type":"book-chapter","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T07:02:36Z","timestamp":1709103756000},"page":"217-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An In-Depth Analysis of\u00a0the\u00a0Code-Reuse Gadgets Introduced by\u00a0Software Obfuscation"],"prefix":"10.1007","author":[{"given":"Naiqian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zheyun","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Dongpeng","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"9_CR1","unstructured":"Angr-team: Angrop - a ROP gadget finder and chain builder. https:\/\/github.com\/angr\/angrop (2021)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Avgerinos, T., Cha, S.K., Rebert, A., Schwartz, E.J., Woo, M., Brumley, D.: Automatic exploit generation. Commun. ACM 57(2), 74\u201384 (2014)","DOI":"10.1145\/2560217.2560219"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Banescu, S., Collberg, C., Pretschner, A.: Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning. In: Proceedings of the 26th USENIX Conference on Security Symposium (USENIX Security 2017) (2017)","DOI":"10.1145\/2991079.2991114"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Bletsch, T., Jiang, X., Freeh, V.W., Liang, Z.: Jump-oriented programming: a new class of code-reuse attack. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (AsiaCCS) (2011)","DOI":"10.1145\/1966913.1966919"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, M., Pham, V.T., Nguyen, M.D., Roychoudhury, A.: Directed Greybox fuzzing. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3134020"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, M., Pham, V.T., Roychoudhury, A.: Coverage-based Greybox fuzzing as markov chain. IEEE Trans. Softw. Eng. 45(5), 489\u2013506 (2017)","DOI":"10.1109\/TSE.2017.2785841"},{"key":"9_CR7","unstructured":"Brown, M.D., Pande, S.: Is less really more? towards better metrics for measuring security improvements realized through software debloating. In: 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19) (2019)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: generalizing return-oriented programming to RISC. In: Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008) (2008)","DOI":"10.1145\/1455770.1455776"},{"key":"9_CR9","unstructured":"Carlini, N., Wagner, D.: ROP is still dangerous: breaking modern defenses. In: Proceedings of the 23rd USENIX Conference on Security Symposium (2014)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Avgerinos, T., Rebert, A., Brumley, D.: Unleashing mayhem on binary code. In: IEEE Symposium on Security and Privacy. IEEE (2012)","DOI":"10.1109\/SP.2012.31"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.R., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (2010)","DOI":"10.1145\/1866307.1866370"},{"key":"9_CR12","unstructured":"Collberg, C.: The Tigress C Obfuscator. https:\/\/tigress.wtf"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Francillion, A., Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security. ACM (2008)","DOI":"10.1145\/1455770.1455775"},{"key":"9_CR14","unstructured":"Hex-Rays: IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/"},{"key":"9_CR15","unstructured":"Hu, H., Chua, Z.L., Adrian, S., Saxena, P., Liang, Z.: Automatic generation of data-oriented exploits. In: 24th USENIX Security Symposium (USENIX Security 15) (2015)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Hu, H., Shinde, S., Adrian, S., Chua, Z.L., Saxena, P., Liang, Z.: Data-oriented programming: on the expressiveness of non-control data attacks. In: IEEE Symposium on Security and Privacy (SP) (2016)","DOI":"10.1109\/SP.2016.62"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Ispoglou, K.K., AlBassam, B., Jaeger, T., Payer, M.: Block oriented programming: automating data-only attacks. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (2018)","DOI":"10.1145\/3243734.3243739"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Joshi, H.P., Dhanasekaran, A., Dutta, R.: Impact of software obfuscation on susceptibility to return-oriented programming attacks. In: 36th IEEE Sarnoff Symposium (2015)","DOI":"10.1109\/SARNOF.2015.7324662"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Joshi, H.P., Dhanasekaran, A., Dutta, R.: Trading off a vulnerability: does software obfuscation increase the risk of ROP attacks. J. Cyber Secur. Mobility 4(4), 305\u2013324 (2015)","DOI":"10.13052\/jcsm2245-1439.444"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM - software protection for the masses. In: Proceedings of the IEEE\/ACM 1st International Workshop on Software Protection, SPRO (2015)","DOI":"10.1109\/SPRO.2015.10"},{"key":"9_CR21","unstructured":"Krajca, P.: MyJit Library. http:\/\/myjit.sourceforge.net\/"},{"key":"9_CR22","volume-title":"Obfuscating C++ Programs via Control Flow Flattening","author":"T L\u00e1szl\u00f3","year":"2009","unstructured":"L\u00e1szl\u00f3, T., Kiss, \u00c1.: Obfuscating C++ Programs via Control Flow Flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae, Sectio Computatorica (2009)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Manikyam, R., McDonald, J.T., Mahoney, W.R., Andel, T.R., Russ, S.H.: Comparing the effectiveness of commercial obfuscators against MATE attacks. In: Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering (SSPREW) (2016)","DOI":"10.1145\/3015135.3015143"},{"key":"9_CR24","unstructured":"Oreans Technologies: Code Virtualizer: Total Obfuscation against Reverse Engineering. http:\/\/oreans.com\/codevirtualizer.php"},{"key":"9_CR25","unstructured":"Oreans Technologies: Themida: Advanced Windows Software Protection System. https:\/\/www.oreans.com\/themida.php"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Polychronakis, M.: Reverse Engineering of Malware Emulators. (2011)","DOI":"10.1007\/978-1-4419-5906-5_849"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Rawat, S., Jain, V., Kumar, A., Cojocar, L., Giuffrida, C., Bos, H.: VUzzer: application-aware evolutionary fuzzing. In: Network and Distributed Systems Security Symposium (2017)","DOI":"10.14722\/ndss.2017.23404"},{"key":"9_CR28","unstructured":"Salwan, J.: ROPgadget (2011). http:\/\/shell-storm.org\/project\/ROPgadget\/"},{"key":"9_CR29","unstructured":"Schirra, S.: Ropper (2019). https:\/\/scoding.de\/ropper\/"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Schloegel, M., Blazytko, T., Basler, J., Hemmer, F., Holz, T.: Towards automating code-reuse attacks using synthesized gadget chains. In: European Symposium on Research in Computer Security (2021)","DOI":"10.1007\/978-3-030-88418-5_11"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"9_CR32","unstructured":"Souchet, A.: Ropium (2018). https:\/\/github.com\/Boyan-MILANOV\/ropium"},{"key":"9_CR33","unstructured":"VMProtect Software: VMProtect software protection. http:\/\/vmpsoft.com"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: Revery: from proof-of-concept to exploitable. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018)","DOI":"10.1145\/3243734.3243847"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, N., Alden, D., Xu, D., Wang, S., Jaeger, T., Ruml, W.: No free lunch: on the increased code reuse attack surface of obfuscated programs. In: 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) (2023)","DOI":"10.1109\/DSN58367.2023.00039"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54776-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T16:16:57Z","timestamp":1709655417000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54776-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031547751","9783031547768"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54776-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wp.nyu.edu\/acns2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}