{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:24:57Z","timestamp":1757618697906,"version":"3.44.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031976193"},{"type":"electronic","value":"9783031976209"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97620-9_14","type":"book-chapter","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:37:32Z","timestamp":1752140252000},"page":"244-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantifying and\u00a0Mitigating the Impact of Obfuscations on Machine-Learning-Based Decompilation Improvement"],"prefix":"10.1007","author":[{"given":"Luke","family":"Dramko","sequence":"first","affiliation":[]},{"given":"Deniz","family":"B\u00f6l\u00f6ni-Turgut","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Le Goues","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Schwartz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"14_CR1","unstructured":"Andrivet, S.: ADVobfuscator (2020). https:\/\/github.com\/andrivet\/ADVobfuscator"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Armengol-Estap\u00e9, J., Woodruff, J., Cummins, C., O\u2019Boyle, M.F.: Slade: a portable small language model decompiler for optimized assembly. In: CGO, pp. 67\u201380. IEEE (2024)","DOI":"10.1109\/CGO57630.2024.10444788"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Boerner, T.J., Deems, S., Furlani, T.R., Knuth, S.L., Towns, J.: Access: advancing innovation: NSF\u2019s advanced cyberinfrastructure coordination ecosystem: services & support. In: Practice and Experience in Advanced Research Computing 2023: Computing for the Common Good, pp. 173\u2013176. PEARC \u201923, Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3569951.3597559","DOI":"10.1145\/3569951.3597559"},{"key":"14_CR4","unstructured":"Broder, A.Z.: On the resemblance and containment of documents. In: Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No. 97TB100171), pp. 21\u201329. IEEE (1997)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Casalnuovo, C., Barr, E.T., Dash, S.K., Devanbu, P., Morgan, E.: A theory of dual channel constraints. In: ICSE-NIER, pp. 25\u201328 (2020)","DOI":"10.1145\/3377816.3381720"},{"key":"14_CR6","unstructured":"Chen, Q., Lacomis, J., Schwartz, E.J., Le\u00a0Goues, C., Neubig, G., Vasilescu, B.: Augmenting decompiler output with learned variable names and types. In: 31st USENIX Security Symposium, pp. 4327\u20134343 (2022)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Coogan, K., Lu, G., Debray, S.: Deobfuscation of virtualization-obfuscated software: a semantics-based approach. In: CCS, pp. 275\u2013284 (2011)","DOI":"10.1145\/2046707.2046739"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"David, R., Coniglio, L., Ceccato, M., et\u00a0al.: QSynth-a program synthesis based approach for binary code deobfuscation. In: BAR 2020 Workshop (2020)","DOI":"10.14722\/bar.2020.23009"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"David, Y., Alon, U., Yahav, E.: Neural reverse engineering of stripped binaries using augmented control flow graphs 4(OOPSLA), 1\u201328 (2020)","DOI":"10.1145\/3428293"},{"key":"14_CR10","first-page":"4171","volume-title":"NAACL","author":"J Devlin","year":"2019","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: Pre-training of deep bidirectional transformers for language understanding. In: Burstein, J., Doran, C., Solorio, T. (eds.) NAACL, pp. 4171\u20134186. Association for Computational Linguistics, Minneapolis, Minnesota (2019)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Dong, W., Lin, J., Chang, R., Wang, R.: CaDeCFF: compiler-agnostic deobfuscator of control flow flattening. In: Proceedings of the 13th Asia-Pacific Symposium on Internetware (2022)","DOI":"10.1145\/3545258.3545269"},{"key":"14_CR12","unstructured":"Dramko, L., Lacomis, J., Schwartz, E.J., Vasilescu, B., Le Goues, C.: A taxonomy of C decompiler fidelity issues. In: 33rd USENIX Security Symposium (2024)"},{"issue":"2","key":"14_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3546946","volume":"32","author":"L Dramko","year":"2023","unstructured":"Dramko, L., et al.: Dire and its data: neural decompiled variable renamings with respect to software class. ACM Trans. Softw. Eng. Methodol. 32(2), 1\u201334 (2023)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"14_CR14","unstructured":"Fu, C., et al.: Coda: an end-to-end neural program decompiler. NeurIPS 32 (2019)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Gu, Y., Zhang, Z., Wang, X., Liu, Z., Sun, M.: Train no evil: selective masking for task-guided pre-training. In: Webber, B., Cohn, T., He, Y., Liu, Y. (eds.) EMNLP (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.566"},{"key":"14_CR16","unstructured":"Hestness, J., et al.: Deep learning scaling is predictable, empirically. arXiv preprint arXiv:1712.00409 (2017)"},{"issue":"5","key":"14_CR17","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1145\/2902362","volume":"59","author":"A Hindle","year":"2016","unstructured":"Hindle, A., Barr, E.T., Gabel, M., Su, Z., Devanbu, P.: On the naturalness of software. Commun. ACM 59(5), 122\u2013131 (2016)","journal-title":"Commun. ACM"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Hosseini, I., Dolan-Gavitt, B.: Beyond the c: retargetable decompilation using neural machine translation. In: NDSS (2022)","DOI":"10.14722\/bar.2022.23009"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Hu, P., Liang, R., Chen, K.: DeGPT: optimizing decompiler output with LLM. In: NDSS (2024)","DOI":"10.14722\/ndss.2024.24401"},{"key":"14_CR20","unstructured":"Hu, Z.: GHCC (2021). https:\/\/github.com\/huzecong\/ghcc"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Jin, X., Pei, K., Won, J.Y., Lin, Z.: SymLM: predicting function names in stripped binaries via context-sensitive execution-aware code embeddings. In: CCS, pp. 1631\u20131645 (2022)","DOI":"10.1145\/3548606.3560612"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM\u2013software protection for the masses. In: SPRO, pp.\u00a03\u20139. IEEE (2015)","DOI":"10.1109\/SPRO.2015.10"},{"issue":"9","key":"14_CR23","doi-asserted-by":"publisher","first-page":"100804","DOI":"10.1016\/j.patter.2023.100804","volume":"4","author":"S Kapoor","year":"2023","unstructured":"Kapoor, S., Narayanan, A.: Leakage and the reproducibility crisis in machine-learning-based science. Patterns 4(9), 100804 (2023)","journal-title":"Patterns"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Kim, H., Bak, J., Cho, K., Koo, H.: A transformer-based function symbol name inference model from an assembly language for binary reversing. In: Asia-CCS, pp. 951\u2013965 (2023)","DOI":"10.1145\/3579856.3582823"},{"key":"14_CR25","unstructured":"Kocetkov, D., et al.: The stack: 3 TB of permissively licensed source code. arXiv preprint (2022)"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Lacomis, J., et al.: DIRE: a neural approach to decompiled identifier naming. In: ASE, pp. 628\u2013639. IEEE (2019)","DOI":"10.1109\/ASE.2019.00064"},{"key":"14_CR27","unstructured":"L\u00e1szl\u00f3, T., Kiss, \u00c1.: Obfuscating C++ programs via control flow flattening (2009)"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Lehmann, D., Pradel, M.: Finding the Dwarf: recovering precise types from WebAssembly binaries. In: PLDI, pp. 410\u2013425 (2022)","DOI":"10.1145\/3519939.3523449"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Liang, M., Li, Z., Zeng, Q., Fang, Z.: Deobfuscation of virtualization-obfuscated code through symbolic execution and compilation optimization. In: ICICS 2017. Springer (2018)","DOI":"10.1007\/978-3-319-89500-0_28"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Miceli-Barone, A.V., Barez, F., Cohen, S.B., Konstas, I.: The larger they are, the harder they fail: language models do not recognize identifier swaps in Python. In: ACL 2023 (2023)","DOI":"10.18653\/v1\/2023.findings-acl.19"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Nitin, V., Saieva, A., Ray, B., Kaiser, G.: DIRECT: a transformer-based model for decompiled variable name recovery. In: NLP4Prog 2021, p.\u00a048 (2021)","DOI":"10.18653\/v1\/2021.nlp4prog-1.6"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Pal, K.K., et\u00a0al.: Len or index or count, anything but v1: predicting variable names in decompilation output with transfer learning. In: 2024 IEEE Symposium on Security and Privacy (SP), p. 152 (2024)","DOI":"10.1109\/SP54263.2024.00152"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Quionero-Candela, J., Sugiyama, M., Schwaighofer, A., Lawrence, N.D.: Dataset Shift in Machine Learning. The MIT Press (2009)","DOI":"10.7551\/mitpress\/9780262170055.001.0001"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Spinellis, D., Kotti, Z., Mockus, A.: A dataset for GitHub repository deduplication. In: International Conference Mining Software Repositories, pp. 523\u2013527 (2020)","DOI":"10.1145\/3379597.3387496"},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Tofighi-Shirazi, R., Christofi, M., Elbaz-Vincent, P., Le, T.H.: DoSE: deobfuscation based on semantic equivalence. In: SSPREW, pp. 1\u201312 (2018)","DOI":"10.1145\/3289239.3289243"},{"key":"14_CR36","unstructured":"Vaswani, A., et al.: Attention is all you need. NeurIPS 30 (2017)"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Votipka, D., Rabin, S., Micinski, K., Foster, J.S., Mazurek, M.L.: An observational investigation of reverse engineers\u2019 process and mental models. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, pp.\u00a01\u20136 (2019)","DOI":"10.1145\/3290607.3313040"},{"key":"14_CR38","unstructured":"Votipka, D., Rabin, S., Micinski, K., Foster, J.S., Mazurek, M.L.: An observational investigation of reverse engineers\u2019 processes. In: 29th USENIX Security Symposium, pp. 1875\u20131892 (2020)"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Wang, C., Davidson, J., Hill, J., Knight, J.: Protection of software-based survivability mechanisms. In: DSN, pp. 193\u2013202. IEEE (2001)","DOI":"10.21236\/ADA466288"},{"key":"14_CR40","doi-asserted-by":"publisher","unstructured":"Wolf, T., et al.: Transformers: state-of-the-art natural language processing (2020).https:\/\/doi.org\/10.5281\/zenodo.7391177","DOI":"10.5281\/zenodo.7391177"},{"key":"14_CR41","doi-asserted-by":"crossref","unstructured":"Xiong, J., Chen, G., Chen, K., Gao, H., Cheng, S., Zhang, W.: Hext5: unified pre-training for stripped binary code information inference. In: ASE, pp. 774\u2013786. IEEE (2023)","DOI":"10.1109\/ASE56229.2023.00099"},{"key":"14_CR42","doi-asserted-by":"publisher","first-page":"61426","DOI":"10.1109\/ACCESS.2022.3181373","volume":"10","author":"G You","year":"2022","unstructured":"You, G., Kim, G., Han, S., Park, M., Cho, S.J.: Deoptfuscator: defeating advanced control-flow obfuscation using android runtime (ART). IEEE Access 10, 61426\u201361440 (2022)","journal-title":"IEEE Access"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Zhang, Z., et al.: OSPREY: recovery of variable and data structure via probabilistic analysis for stripped binary. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 813\u2013832. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00051"},{"key":"14_CR44","unstructured":"Zhu, C., et\u00a0al.: TYGR: type inference on stripped binaries using graph neural networks. In: 33rd USENIX Security Symposium, pp. 4283\u20134300 (2024)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97620-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T01:53:18Z","timestamp":1757209998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97620-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031976193","9783031976209"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97620-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva.org\/dimva2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}