{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:40:03Z","timestamp":1746132003983,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_32","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"358-369","source":"Crossref","is-referenced-by-count":1,"title":["Differential Execution Analysis for Obfuscation Reduction"],"prefix":"10.1007","author":[{"given":"R.","family":"Reno Robert","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Johnson, N.M., Caballero, J., Chen, K.Z., McCamant, S., Poosankam, P., Reynaud, D., Song, D.: Differential Slicing: Identifying Causal Execution Differences for Security Applications. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, pp. 347\u2013362 (2011)","DOI":"10.1109\/SP.2011.41"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Kemerlis, V.P., Portokalidis, G., Jee, K., Keromytis, A.D.: libdft: Practical Dynamic Data Flow Tracking for Commodity Systems. In: Proceedings of the 8th ACM SIGPLAN\/SIGOPS Conference on Virtual Execution Environments, pp. 121\u2013132 (2012)","DOI":"10.1145\/2151024.2151042"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Clause, J., Li, W., Orso, A.: Dytan: A Generic Dynamic Taint Analysis Framework. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis, pp. 196\u2013206 (2007)","DOI":"10.1145\/1273463.1273490"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Saxena, P., Sekar, R., Puranik, V.: Efficient Fine-Grained Binary Instrumentation with Applications to Taint-Tracking. In: Proceedings of the 6th Annual IEEE\/ACM International Symposium on Code Generation and Optimization, pp. 74\u201383 (2008)","DOI":"10.1145\/1356058.1356069"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Luk, C.-K., Cohn, R., Muth, R., Patil, H., Klauser, A., Wallace, S., Reddi, V.J., Hazelwood, K., Lowney, G.: Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 190\u2013200 (2005)","DOI":"10.1145\/1064978.1065034"},{"key":"32_CR6","unstructured":"PIN, Dynamic Binary Instrumentation Framework by Intel, http:\/\/software.intel.com\/en-us\/articles\/pin-a-dynamic-binary-instrumentation-tool"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware Obfuscation Techniques: A Brief Survey. In: Proceedings of the 2010 IEEE Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297\u2013300 (2010)","DOI":"10.1109\/BWCCA.2010.85"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Linn, C., Debray, S.: Obfuscation of Executable Code to Improve Resistance to Static Disassembly. In: Proceedings of 10th ACM Conference on Computer and Communications Security, pp. 290\u2013299 (2003)","DOI":"10.1145\/948109.948149"},{"key":"32_CR9","unstructured":"Kruegel, C., Robertson, W., Valeur, F., Vigna, G.: Static Disassembly of Obfuscated Binaries. In: Proceedings of the 13th Conference on USENIX Security Symposium, pp. 255\u2013270 (2004)"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Udupa, S.K., Debray, S.K., Madou, M.: Deobfuscation: Reverse Engineering Obfuscated Code. In: Proceedings of the 12th Working Conference on Reverse Engineering, pp. 45\u201354 (2005)","DOI":"10.1109\/WCRE.2005.13"},{"key":"32_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-23644-0_3","volume-title":"Recent Advances in Intrusion Detection","author":"F. Gr\u00f6bert","year":"2011","unstructured":"Gr\u00f6bert, F., Willems, C., Holz, T.: Automated identification of cryptographic primitives in binary programs. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol.\u00a06961, pp. 41\u201360. Springer, Heidelberg (2011)"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Lahiri, S.K., Vaswani, K., Hoare, C.A.R.: Differential Static Analysis: Opportunities, Applications and Challenges. In: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research, pp. 201\u2013204 (2010)","DOI":"10.1145\/1882362.1882405"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:45Z","timestamp":1746130665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_32","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}