{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:41:39Z","timestamp":1743126099326,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813347052"},{"type":"electronic","value":"9789813347069"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-33-4706-9_1","type":"book-chapter","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T06:03:03Z","timestamp":1606716183000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices"],"prefix":"10.1007","author":[{"given":"Anjali J.","family":"Suresh","sequence":"first","affiliation":[]},{"given":"Sriram","family":"Sankaran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,1]]},"reference":[{"key":"1_CR1","unstructured":"OLLVM Github. https:\/\/github.com\/obfuscator-llvm\/obfuscator"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11532378_2","volume-title":"Languages and Compilers for High Performance Computing","author":"C Lattner","year":"2005","unstructured":"Lattner, C., Adve, V.: The LLVM compiler framework and infrastructure tutorial. In: Eigenmann, R., Li, Z., Midkiff, S.P. (eds.) LCPC 2004. LNCS, vol. 3602, pp. 15\u201316. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11532378_2"},{"key":"1_CR3","unstructured":"Banescu, S., et al.: Code obfuscation against symbolic execution attacks. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, 5\u20139 December 2016, pp. 189\u2013200 (2016). http:\/\/dl.acm.org\/citation.cfm?id=2991114"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1016\/j.procs.2015.10.114","volume":"70","author":"CK Behera","year":"2015","unstructured":"Behera, C.K., Bhaskari, D.L.: Different obfuscation techniques for code protection. Procedia Comput. Sci. 70, 757\u2013763 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"1_CR5","unstructured":"Balakrishnan, A., Schulze, C.: Code obfuscation literature survey. CS701 Construction of compilers, 19 (2005)"},{"key":"1_CR6","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-030-01701-9_10","volume-title":"Security and Privacy in Communication Networks","author":"S Dong","year":"2018","unstructured":"Dong, S., et al.: Understanding android obfuscation techniques: a large-scale investigation in the wild. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds.) SecureComm 2018. LNICST, vol. 254, pp. 172\u2013192. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01701-9_10"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Junod, P., et al.: Obfuscator-LLVM - software protection for the masses. In: Wyseur, B. (ed.) Proceedings of the IEEE\/ACM 1st International Workshop on Software Protection, SPRO 2015, Firenze, Italy, 19 May 2015, pp. 3\u20139. IEEE. https:\/\/doi.org\/10.1109\/SPRO.2015.10","DOI":"10.1109\/SPRO.2015.10"},{"issue":"8","key":"1_CR8","first-page":"654","volume":"38","author":"Y Piao","year":"2013","unstructured":"Piao, Y., Jung, J., Yi, J.H.: Structural and functional analyses of ProGuard obfuscation tool. J. Korean Inst. Commun. Inf. Sci. 38(8), 654\u2013662 (2013)","journal-title":"J. Korean Inst. Commun. Inf. Sci."},{"key":"1_CR9","unstructured":"Allatori Java obfuscator. http:\/\/www.allatori.com\/"},{"key":"1_CR10","unstructured":"Dasho - preemptive solutions. http:\/\/www.preemptive.com\/products\/dasho"},{"key":"1_CR11","unstructured":"Zelix klassmaster. http:\/\/www.zelix.com\/klassmaster\/"},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"305","DOI":"10.13052\/jcsm2245-1439.444","volume":"4","author":"HP Joshi","year":"2015","unstructured":"Joshi, H.P., Dhanasekaran, A., Dutta, R.: Trading off a vulnerability: does software obfuscation increase the risk of ROP attacks. J. Cyber Secur. Mobil. 4(4), 305\u2013324 (2015)","journal-title":"J. Cyber Secur. Mobil."},{"key":"1_CR13","unstructured":"Scrinzi, F.: Behavioral analysis of obfuscated code. Master\u2019s thesis, University of Twente (2015)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Khan, S., et al.: Using predictive modeling for cross-program design space exploration in multicore systems. In: 16th International Conference on Parallel Architecture and Compilation Techniques (PACT 2007), pp. 327\u2013338. IEEE (2007)","DOI":"10.1109\/PACT.2007.4336223"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Sankaran, S.: Predictive modeling based power estimation for embedded multicore systems. In: Proceedings of the ACM International Conference on Computing Frontiers, pp. 370\u2013375 (2016)","DOI":"10.1145\/2903150.2911714"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Sankaran, S., Sridhar, R.: Energy modeling for mobile devices using performance counters. In: 2013 IEEE 56th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 441\u2013444. IEEE (2013)","DOI":"10.1109\/MWSCAS.2013.6674680"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Grech, N., et al.: Static energy consumption analysis of LLVM IR programs. Comput. Res. Repos., 1\u201312 (2014)","DOI":"10.1145\/2764967.2764974"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"\u0110ukovi\u0107, M., Varga, E.: Load profile-based efficiency metrics for code obfuscators. Acta Polytechnica Hungarica 12(5) (2015)","DOI":"10.12700\/APH.12.5.2015.5.11"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Sankaran, S., Gupta, M.: Game theoretic modeling of power-performance trade-offs for mobile devices. In: 2018 8th International Symposium on Embedded Computing and System Design (ISED), pp. 220\u2013224. IEEE (2018)","DOI":"10.1109\/ISED.2018.8704081"},{"issue":"7","key":"1_CR20","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1002\/smr.1762","volume":"28","author":"C Sahin","year":"2016","unstructured":"Sahin, C., et al.: How does code obfuscation impact energy usage? J. Softw. Evol. Process. 28(7), 565\u2013588 (2016)","journal-title":"J. Softw. Evol. Process."},{"key":"1_CR21","unstructured":"Raj, A., Jithish, J., Sankaran, S.: Modelling the impact of code obfuscation on energy usage. In: DIAS\/EDUDM@ ISEC (2017)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Viticchi\u00e9, A., et al.: Assessment of source code obfuscation techniques. In: 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 11\u201320. IEEE (2016)","DOI":"10.1109\/SCAM.2016.17"},{"key":"1_CR23","unstructured":"Banescu, S., Collberg, C., Pretschner, A.: Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning. In: 26th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 17), pp. 661\u2013678 (2017)"},{"key":"1_CR24","unstructured":"Wu, Y., et al.: A framework for measuring the security of obfuscated software. In: Proceedings of 2010 International Conference on Test and Measurement (2010)"},{"key":"1_CR25","unstructured":"Powerstat. http:\/\/manpages.ubuntu.com\/manpages\/xenial\/man8\/powerstat.8.html"},{"key":"1_CR26","unstructured":"Guthaus, M.R., et al.: MiBench: a free, commercially representative embedded benchmark suite. In: Proceedings of the Fourth Annual IEEE International Workshop on Workload Characterization. WWC-4 (Cat. No. 01EX538), pp. 3\u201314. IEEE (2001)"},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/978-3-540-30144-8_36","volume-title":"Information Security","author":"K Heffner","year":"2004","unstructured":"Heffner, K., Collberg, C.: The obfuscation executive. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 428\u2013440. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30144-8_36"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-4706-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T01:26:23Z","timestamp":1619313983000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-33-4706-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813347052","9789813347069"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-4706-9_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brisbane, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.atis2020.conferences.academy\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}