{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:48:50Z","timestamp":1743054530912,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_202","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T06:22:45Z","timestamp":1513664565000},"page":"1269-1274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Building the De-obfuscation Platform Based on LLVM"],"prefix":"10.1007","author":[{"given":"JiHun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kwangman","family":"Ko","sequence":"additional","affiliation":[]},{"given":"Jonghee M.","family":"Youn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"202_CR1","unstructured":"Gartner. http:\/\/www.gartner.com\/newsroom\/id\/3323017"},{"key":"202_CR2","unstructured":"Dexguard. https:\/\/www.guardsquare.com\/dexguard"},{"key":"202_CR3","unstructured":"Proguard. http:\/\/developer.android.com\/tools\/help\/proguard.html"},{"key":"202_CR4","doi-asserted-by":"crossref","unstructured":"Piao, Y., Jung, J.H., Yi, J.H.: Server based code obfuscation scheme for APK tamper detection. Secur. Commun. Netw. (2014)","DOI":"10.1002\/sec.936"},{"key":"202_CR5","unstructured":"Schulz, H., Titze, D., Schutte, J., Kittel, T., Eckert, C.: Automated de-obfuscation of Android bytecode. Department of Computer Science, The University of Munchen, Germany, July"},{"key":"202_CR6","unstructured":"Bremer, J.: Automated Analysis and Deobfuscation of Android Apps & Malware, Freelance Security Researcher (2013)"},{"key":"202_CR7","unstructured":"Simplify. https:\/\/github.com\/CalebFenton\/simplify"},{"key":"202_CR8","unstructured":"Dexoracle. https:\/\/github.com\/CalebFenton\/dex-oracle"},{"key":"202_CR9","unstructured":"Dexprotector. https:\/\/dexprotector.com"},{"issue":"5","key":"202_CR10","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.13089\/JKIISC.2015.25.5.1201","volume":"25","author":"SY Lee","year":"2015","unstructured":"Lee, S.Y., Park, J.H., Chan Park, M., Suk, J.H., Lee, D.H.: A study on deobfuscation method of Android and implementation of automatic analysis tool. J. Korea Inst. Inf. Secur. Cryptol. 25(5), 1201\u20131215 (2015)","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."},{"key":"202_CR11","unstructured":"LLVM overview. http:\/\/www.aosabook.org\/en\/llvm.html#fig.llvm.rtc"},{"issue":"2","key":"202_CR12","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1145\/103135.103136","volume":"13","author":"MN Wegman","year":"1991","unstructured":"Wegman, M.N., Zadeck, F.K.: Constant propagation with conditional branches. ACM Trans. Program. Lang. Syst. 13(2), 181\u2013210 (1991)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"2","key":"202_CR13","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1145\/201059.201061","volume":"17","author":"C Click","year":"1995","unstructured":"Click, C., Cooper, K.: Combining analyses, combining optimizations. ACM Trans. Programm. Lang. Syst. 17(2), 181\u2013196 (1995)","journal-title":"ACM Trans. Programm. Lang. Syst."},{"issue":"3","key":"202_CR14","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/0096-0551(78)90009-7","volume":"3","author":"K Kennedy","year":"1978","unstructured":"Kennedy, K.: Use-definition chains with applications. Comput. Lang. Arch. 3(3), 163\u2013179 (1978)","journal-title":"Comput. Lang. Arch."}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T03:27:33Z","timestamp":1570505253000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_202","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}