{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:35:52Z","timestamp":1730205352820,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/cec60901.2024.10612116","type":"proceedings-article","created":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T17:55:15Z","timestamp":1723139715000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Two-Level Software Obfuscation with Cooperative Co-Evolutionary Algorithms"],"prefix":"10.1109","author":[{"given":"Jos\u00e9 Miguel","family":"Arag\u00f3n-Jurado","sequence":"first","affiliation":[{"name":"Higher School of Engineering, University of Cadiz,Cadiz,Spain"}]},{"given":"Javier","family":"Jare\u00f3o","sequence":"additional","affiliation":[{"name":"Higher School of Engineering, University of Cadiz,Cadiz,Spain"}]},{"given":"Juan Carlos","family":"De la Torre","sequence":"additional","affiliation":[{"name":"Higher School of Engineering, University of Cadiz,Cadiz,Spain"}]},{"given":"Patricia","family":"Ruiz","sequence":"additional","affiliation":[{"name":"Higher School of Engineering, University of Cadiz,Cadiz,Spain"}]},{"given":"Bernab\u00e9","family":"Dorronsoro","sequence":"additional","affiliation":[{"name":"Higher School of Engineering, University of Cadiz,Cadiz,Spain"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.07.007"},{"article-title":"A tool for teaching reverse engineering","volume-title":"2016 USENIX Workshop on Advances in Security Education (ASE 16)","author":"Taylor","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18409-3_18"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzae069"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103704"},{"volume-title":"The LLVM Compiler Infrastructure","key":"ref7"},{"key":"ref8","article-title":"A taxonomy of obfuscating transformations","author":"Collberg","year":"1997","journal-title":"The University of Auckland, New Zealand, Tech. Rep."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.10.114"},{"volume-title":"Surreptitious Software: Obfuscation, Water-marking, and Tamperprooling for Software Protection, 1st","year":"2009","author":"Collberg","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-020-00049-3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCL.1998.674154"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e91-a.1.316"},{"key":"ref14","first-page":"152","article-title":"Applications of homomor-phic functions to software obfuscation","volume-title":"International Workshop on Intelligence and Security Informatics","author":"Zhu"},{"key":"ref15","article-title":"Novel obfuscation algorithms for software security","volume-title":"Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP","volume":"5","author":"Ertaul","year":"2005"},{"key":"ref16","first-page":"343","article-title":"Statistical deob-fuscation of android applications","volume-title":"Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, 2016","author":"Bichsel"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/332084.332092"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-016-0282-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00066-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/11961635_26"},{"key":"ref22","first-page":"133","article-title":"Jhide-a tool kit for code obfuscation","volume-title":"lASTED Conf. on Software Engineering and Applications","author":"Ertaul","year":"2004"},{"volume-title":"Practical Reverse Engineering: x86, x64, ARM, Windows Kernel Reversing Tools, and Obfuscation","year":"2014","author":"Dang","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2013.234"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2908961.2931689"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1093\/oed\/1750571973"},{"journal-title":"Implementation and evaluation of some platform independent obfuscating transformations","year":"2013","author":"AHLIN","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3124452"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_17"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3243127.3243131"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3338503.3357719"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3338503.3357721"},{"key":"ref34","article-title":"Quantitative measures for code obfuscation security","volume-title":"Ph.D. dissertation, ICL","author":"Mohsen","year":"2016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/947825.947829"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58484-6_269"},{"key":"ref38","volume-title":"Cellular Genetic Algorithms, ser. Operations Research\/Computer Science Interfaces","volume":"42","author":"Alba","year":"2008"},{"volume-title":"Polybench\/c - homepage of louis-noel pouchet","year":"2010","author":"Pouchet","key":"ref39"},{"journal-title":"BEEBS: open benchmarks for energy measurements on embedded platforms","year":"2013","author":"Pallister","key":"ref40"},{"journal-title":"Collective benchmark (cbench), a collection of open-source programs with multiple datasets assembled by the community to en-able realistic benchmarking and research on program and architecture optimization","year":"2010","author":"Fursin","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.100598"}],"event":{"name":"2024 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2024,6,30]]},"location":"Yokohama, Japan","end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 IEEE Congress on Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10609966\/10611750\/10612116.pdf?arnumber=10612116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T04:25:33Z","timestamp":1723350333000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10612116\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/cec60901.2024.10612116","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}