{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:11:41Z","timestamp":1763968301560,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/padsw.2018.8644535","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T23:23:38Z","timestamp":1550791418000},"page":"620-627","source":"Crossref","is-referenced-by-count":7,"title":["Exploiting Code Diversity to Enhance Code Virtualization Protection"],"prefix":"10.1109","author":[{"given":"Chao","family":"Xue","sequence":"first","affiliation":[]},{"given":"Zhanyong","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Guixin","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Guanghui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoqing","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dingyi","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920268"},{"journal-title":"Randomized instruction injection to counter power analysis attacks","year":"2012","author":"ambrose","key":"ref31"},{"journal-title":"Peering Inside the PE A Tour of the Win32 Portable Executable File Format","year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.107"},{"key":"ref11","article-title":"Inside the jaws of Trojan. Clampi","author":"falliere","year":"2009","journal-title":"Rapport technique Symantec Corporation"},{"key":"ref12","article-title":"Unpacking virtualization obfuscators","author":"rolles","year":"2009","journal-title":"Proceedings of the 3rd USENIX Conference on Offensive Technologies"},{"key":"ref13","article-title":"Tdvmp:improved virtual machine-based software protection with time diversity","author":"wang","year":"0","journal-title":"ACM SIGPLAN on Program Protection and Reverse Engineering Workshop"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-24861-0_12","article-title":"Multi-stage binary code obfuscation using improved virtual machine","author":"fang","year":"2011","journal-title":"Information Security"},{"key":"ref15","article-title":"Software protection scheme via nested virtual machine","author":"yang","year":"2011","journal-title":"Journal of Chinese Computer Systems"},{"journal-title":"Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling","year":"2018","author":"kuang","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2017.8397540"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-44993-5_1","article-title":"A white-box des implementation for drm applications","author":"chow","year":"2003","journal-title":"Digital Rights Management"},{"key":"ref28","volume":"27","author":"blazy","year":"2016","journal-title":"Formal verification of control-flow graph flattening"},{"key":"ref4","article-title":"Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection","author":"luo","year":"2014","journal-title":"FSE"},{"journal-title":"Efficiently securing systems from code reuse attacks","year":"2014","author":"kayaalp","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516664"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866368"},{"journal-title":"Pin - A dynamic binary instrumentation tool","year":"0","key":"ref29"},{"key":"ref5","article-title":"Control code obfuscation by abstract interpretation","author":"preda","year":"2005","journal-title":"IEEE International Conference on Software Engineering and Formal Methods"},{"journal-title":"VMProtect Software VMProtect","year":"0","key":"ref8"},{"journal-title":"Oreans Technologies Code Virtualizer","year":"0","key":"ref7"},{"journal-title":"Optimizing obfuscation avoiding barrington's theorem","year":"2014","author":"ananth","key":"ref2"},{"journal-title":"Themida","year":"0","key":"ref9"},{"journal-title":"Protecting software through obfuscation can it keep pace with progress in code analysis?","year":"2016","author":"schrittwieser","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2016.7546449"},{"journal-title":"OllyDbg","year":"0","key":"ref22"},{"journal-title":"Ida pro","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.47"},{"journal-title":"Sysinternals Suite","year":"0","key":"ref23"},{"key":"ref26","article-title":"Applied binary code obfuscation","author":"nicolaou george","year":"2009","journal-title":"Tech Rep"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.246"}],"event":{"name":"2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)","start":{"date-parts":[[2018,12,11]]},"location":"Singapore, Singapore","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8635632\/8644527\/08644535.pdf?arnumber=8644535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:21:44Z","timestamp":1643268104000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8644535\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/padsw.2018.8644535","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}