{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:39:51Z","timestamp":1773801591774,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100018833","name":"Agence de l\u2019innovation de D\u00e9fense","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100018833","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"DOI":"10.1007\/s41109-025-00733-8","type":"journal-article","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T10:25:25Z","timestamp":1759227925000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Identifying obfuscated code through graph-based semantic analysis of binary code"],"prefix":"10.1007","volume":"10","author":[{"given":"Roxane","family":"Cohen","sequence":"first","affiliation":[]},{"given":"Robin","family":"David","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Yger","sequence":"additional","affiliation":[]},{"given":"Fabrice","family":"Rossi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,30]]},"reference":[{"key":"733_CR1","doi-asserted-by":"crossref","unstructured":"Akiba T, Sano S, Yanase T, Ohta T, Koyama M (2019) Optuna: a next-generation hyperparameter optimization framework. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, pp 2623\u20132631","DOI":"10.1145\/3292500.3330701"},{"key":"733_CR2","doi-asserted-by":"publisher","unstructured":"Bardin S, David R, Marion J-Y (2017) Backward-bounded dse: targeting infeasibility questions on obfuscated codes. In: 2017 IEEE symposium on security and privacy (SP), pp 633\u2013651 . https:\/\/doi.org\/10.1109\/SP.2017.36","DOI":"10.1109\/SP.2017.36"},{"key":"733_CR3","unstructured":"Blazytko T (2021) Automated detection of obfuscated code. https:\/\/synthesis.to\/2021\/08\/10\/obfuscation_detection.html. Accessed 20 Nov 2023"},{"key":"733_CR4","unstructured":"Blazytko T (2021) Statistical analysis to detect uncommon code. https:\/\/synthesis.to\/2021\/03\/03\/flattening_detection.html. Accessed 20 Nov 2023"},{"key":"733_CR5","unstructured":"Blazytko T (2023) Statistical analysis to detect uncommon code. https:\/\/synthesis.to\/2023\/01\/26\/uncommon_instruction_sequences.html. Accessed 20 Nov 2023"},{"key":"733_CR6","unstructured":"Borgerson M Pypcode. https:\/\/docs.angr.io\/projects\/pypcode\/en\/latest\/. Accessed 05 Aug 2024"},{"key":"733_CR7","doi-asserted-by":"crossref","unstructured":"Cohen R, David R, Mori R, Yger F, Rossi F (2025) Experimental study of binary diffing resilience on obfuscated programs. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer","DOI":"10.1007\/978-3-031-97620-9_13"},{"key":"733_CR8","unstructured":"Collberg C The Tigress C obfuscator. https:\/\/tigress.wtf\/index.html. Accessed 17 Aug 2023"},{"key":"733_CR9","doi-asserted-by":"crossref","unstructured":"David R, Coniglio L, Ceccato M (2020) Qsynth-a program synthesis based approach for binary code deobfuscation. In: BAR 2020 workshop","DOI":"10.14722\/bar.2020.23009"},{"key":"733_CR10","unstructured":"Errica F, Podda M, Bacciu D, Micheli A (2020) A fair comparison of graph neural networks for graph classification. In: International conference on learning representations. https:\/\/openreview.net\/forum?id=HygDF6NFPB"},{"key":"733_CR11","doi-asserted-by":"publisher","unstructured":"Ferrari\u00a0Dacrema M, Cremonesi P, Jannach D (2019) Are we really making much progress? A worrying analysis of recent neural recommendation approaches. In: Proceedings of the 13th ACM conference on recommender systems. RecSys \u201919. ACM. https:\/\/doi.org\/10.1145\/3298689.3347058","DOI":"10.1145\/3298689.3347058"},{"key":"733_CR12","unstructured":"Fey M, Lenssen JE (2019) Fast graph representation learning with PyTorch Geometric. In: ICLR workshop on representation learning on graphs and manifolds"},{"issue":"12","key":"733_CR13","doi-asserted-by":"publisher","first-page":"2549","DOI":"10.3390\/sym14122549","volume":"14","author":"H Gao","year":"2022","unstructured":"Gao H, Zhang T, Chen S, Wang L, Yu F (2022) Fusion: measuring binary function similarity with code-specific embedding and order-sensitive gnn. Symmetry 14(12):2549","journal-title":"Symmetry"},{"key":"733_CR14","unstructured":"Gao H, Ji S (2019) Graph u-nets. In: Chaudhuri K, Salakhutdinov R (eds.) Proceedings of the 36th international conference on machine learning. Proceedings of machine learning research, vol 97, pp 2083\u20132092. PMLR. https:\/\/proceedings.mlr.press\/v97\/gao19a.html"},{"key":"733_CR15","doi-asserted-by":"publisher","unstructured":"Gori M, Monfardini G, Scarselli F (2005) A new model for learning in graph domains. In: Proceedings. 2005 IEEE international joint conference on neural networks, vol 2, pp 729\u20137342 . https:\/\/doi.org\/10.1109\/IJCNN.2005.1555942","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"733_CR16","doi-asserted-by":"publisher","unstructured":"Greco C, Ianni M, Guzzo A, Fortino G (2023) Explaining binary obfuscation, pp 22\u201327 . https:\/\/doi.org\/10.1109\/CSR57506.2023.10224825","DOI":"10.1109\/CSR57506.2023.10224825"},{"key":"733_CR17","unstructured":"Hamilton WL, Ying R, Leskovec J (2017) Inductive representation learning on large graphs. In: Proceedings of the 31st international conference on neural information processing systems. NIPS\u201917, pp. 1025\u20131035. Curran Associates Inc., Red Hook, NY, USA"},{"key":"733_CR18","unstructured":"He H, Lin X, Weng Z, Zhao R, Gan S, Chen L, Ji Y, Wang J, Xue Z (2024) Code is not natural language: unlock the power of semantics-oriented graph representation for binary code similarity detection. In: 33rd USENIX security symposium (USENIX Security 24), PHILADELPHIA, PA"},{"key":"733_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102953","volume":"61","author":"S Jiang","year":"2021","unstructured":"Jiang S, Hong Y, Fu C, Qian Y, Han L (2021) Function-level obfuscation detection method based on graph convolutional networks. J Inf Secur Appl 61:102953. https:\/\/doi.org\/10.1016\/j.jisa.2021.102953","journal-title":"J Inf Secur Appl"},{"key":"733_CR20","doi-asserted-by":"publisher","unstructured":"Junod P, Rinaldini J, Wehrli J, Michielin J (2015) Obfuscator-llvm\u2013software protection for the masses. In: Wyseur, B. (ed.) Proceedings of the IEEE\/ACM 1st international workshop on software protection, SPRO\u201915, Firenze, Italy, May 19th, 2015, pp 3\u20139. IEEE. https:\/\/doi.org\/10.1109\/SPRO.2015.10","DOI":"10.1109\/SPRO.2015.10"},{"key":"733_CR21","doi-asserted-by":"crossref","unstructured":"Kanzaki Y, Monden A, Collberg C (2015) Code artificiality: a metric for the code stealth based on an n-gram model. In: 2015 IEEE\/ACM 1st international workshop on software protection, pp 31\u201337 . IEEE","DOI":"10.1109\/SPRO.2015.14"},{"key":"733_CR22","unstructured":"Kipf TN, Welling M (2017) Semi-supervised classification with graph convolutional networks. In: International conference on learning representations. https:\/\/openreview.net\/forum?id=SJU4ayYgl"},{"issue":"1","key":"733_CR23","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s41109-019-0195-3","volume":"5","author":"NM Kriege","year":"2020","unstructured":"Kriege NM, Johansson FD, Morris C (2020) A survey on graph kernels. Appl Netw Sci 5(1):6. https:\/\/doi.org\/10.1007\/s41109-019-0195-3","journal-title":"Appl Netw Sci"},{"key":"733_CR24","doi-asserted-by":"publisher","unstructured":"Li X, Qu Y, Yin H (2021) Palmtree: Learning an assembly language model for instruction embedding. In: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security. CCS \u201921, pp 3236\u20133251. Association for Computing Machinery, New York, NY, USA . https:\/\/doi.org\/10.1145\/3460120.3484587","DOI":"10.1145\/3460120.3484587"},{"key":"733_CR25","unstructured":"Marcelli A, Graziano M, Ugarte-Pedrero X, Fratantonio Y, Mansouri M, Balzarotti D (2022) How machine learning is solving the binary function similarity problem. In: 31st USENIX security symposium (USENIX Security 22), pp 2099\u20132116"},{"key":"733_CR26","doi-asserted-by":"crossref","unstructured":"Massarelli L, Di\u00a0Luna GA, Petroni F, Querzoni L, Baldoni R et al (2019) Investigating graph embedding neural networks with unsupervised features extraction for binary analysis. In: Proceedings of the 2nd workshop on binary analysis research (BAR), pp 1\u201311","DOI":"10.14722\/bar.2019.23020"},{"key":"733_CR27","volume-title":"Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection: obfuscation, watermarking, and tamperproofing for software protection","author":"J Nagra","year":"2009","unstructured":"Nagra J, Collberg C (2009) Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection: obfuscation, watermarking, and tamperproofing for software protection. Pearson Education, London"},{"key":"733_CR28","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V et al (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"733_CR29","unstructured":"Quarkslab: obfuscation dataset. https:\/\/github.com\/quarkslab\/diffing_obfuscation_dataset. Accessed 09 Jan 2024"},{"key":"733_CR30","volume-title":"Reverse engineering: an industrial perspective","author":"V Raja","year":"2007","unstructured":"Raja V, Fernandes KJ (2007) Reverse engineering: an industrial perspective. Springer, Berlin"},{"key":"733_CR31","doi-asserted-by":"crossref","unstructured":"Salem A, Banescu S (2016) Metadata recovery from obfuscated programs using machine learning. In: Proceedings of the 6th workshop on software security, protection, and reverse engineering, pp 1\u201311","DOI":"10.1145\/3015135.3015136"},{"key":"733_CR32","doi-asserted-by":"crossref","unstructured":"Salwan J, Bardin S, Potet M-L (2018) Symbolic deobfuscation: from virtualized code back to the original. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 372\u2013392","DOI":"10.1007\/978-3-319-93411-2_17"},{"key":"733_CR33","doi-asserted-by":"crossref","unstructured":"Schrittwieser S, Wimmer E, Mallinger K, Kochberger P, Lawitschka C, Raubitzek S, Weippl ER (2023) Modeling obfuscation stealth through code complexity. In: European symposium on research in computer security. Springer, pp 392\u2013408","DOI":"10.1007\/978-3-031-54129-2_23"},{"key":"733_CR34","unstructured":"Sharif MI, Lanzi A, Giffin JT, Lee W (2008) Impeding malware analysis using conditional code obfuscation. In: NDSS"},{"key":"733_CR35","unstructured":"Tarekegn AN, Ullah M, Cheikh FA (2024) Deep learning for multi-label learning: a comprehensive survey . https:\/\/arxiv.org\/abs\/2401.16549"},{"key":"733_CR36","doi-asserted-by":"publisher","unstructured":"Tofighi-Shirazi R, As\u0103voae IM, Elbaz-Vincent P (2019) Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoning. In: Proceedings of the 9th workshop on software security, protection, and reverse engineering. SSPREW9 \u201919. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3371307.3371313","DOI":"10.1145\/3371307.3371313"},{"key":"733_CR37","doi-asserted-by":"crossref","unstructured":"Tofighi-Shirazi R, Asavoae I-M, Elbaz-Vincent P, Le T-H (2019) Defeating opaque predicates statically through machine learning and binary analysis. In: Proceedings of the 3rd ACM workshop on software protection, pp 3\u201314","DOI":"10.1145\/3338503.3357719"},{"issue":"9","key":"733_CR38","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TSE.2021.3093926","volume":"48","author":"S Ullah","year":"2021","unstructured":"Ullah S, Oh H (2021) Bindiff nn: learning distributed representation of assembly for robust binary diffing against semantic differences. IEEE Trans Softw Eng 48(9):3442\u20133466","journal-title":"IEEE Trans Softw Eng"},{"key":"733_CR39","unstructured":"Vel\u010dkovi\u0107 P, Cucurull G, Casanova A, Romero A, Li\u00f2 P, Bengio Y (2018) Graph attention networks. In: International conference on learning representations . https:\/\/openreview.net\/forum?id=rJXMpikCZ"},{"key":"733_CR40","volume-title":"A security architecture for survivability mechanisms","author":"C Wang","year":"2001","unstructured":"Wang C (2001) A security architecture for survivability mechanisms. University of Virginia, Virginia"},{"issue":"1","key":"733_CR41","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2021","unstructured":"Wu Z, Pan S, Chen F, Long G, Zhang C, Yu P (2021) A comprehensive survey on graph neural networks. IEEE Trans Neural Netw Learn Syst 32(1):4\u201324. https:\/\/doi.org\/10.1109\/TNNLS.2020.2978386","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"733_CR42","unstructured":"Xu K, Hu W, Leskovec J, Jegelka S (2019) How powerful are graph neural networks? In: International conference on learning representations. https:\/\/openreview.net\/forum?id=ryGs6iA5Km"},{"key":"733_CR43","doi-asserted-by":"publisher","unstructured":"Yadegari B, Johannesmeyer B, Whitely B, Debray S (2015) A generic approach to automatic deobfuscation of executable code. In: 2015 IEEE symposium on security and privacy, pp 674\u2013691 . https:\/\/doi.org\/10.1109\/SP.2015.47","DOI":"10.1109\/SP.2015.47"},{"key":"733_CR44","doi-asserted-by":"crossref","unstructured":"Zhou Y, Main A, Gu YX, Johnson H (2007) Information hiding in software with mixed boolean-arithmetic transforms. In: International workshop on information security applications. Springer, pp 61\u201375","DOI":"10.1007\/978-3-540-77535-5_5"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00733-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-025-00733-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00733-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T10:25:42Z","timestamp":1759227942000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-025-00733-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,30]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["733"],"URL":"https:\/\/doi.org\/10.1007\/s41109-025-00733-8","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,30]]},"assertion":[{"value":"31 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The artifacts related to this work are available at","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}],"article-number":"49"}}