{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:10:18Z","timestamp":1730297418375,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/snpd.2019.8935642","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:36:07Z","timestamp":1576802167000},"page":"495-500","source":"Crossref","is-referenced-by-count":4,"title":["On Preventing Symbolic Execution Attacks by Low Cost Obfuscation"],"prefix":"10.1109","author":[{"given":"Toshiki","family":"Seto","sequence":"first","affiliation":[]},{"given":"Akito","family":"Monden","sequence":"additional","affiliation":[]},{"given":"Zeynep","family":"Yucel","sequence":"additional","affiliation":[]},{"given":"Yuichiro","family":"Kanzaki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.16"},{"key":"ref11","first-page":"no.2j","article-title":"A study on the effectiveness of code obfuscation techniques against automated attacks, (in Japanese)","author":"nishi","year":"2018","journal-title":"Proceedings of IPSJ 80th Annual Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_12"},{"key":"ref13","article-title":"Benchmarking the capability of symbolic execution tools with logic bombs","author":"xu","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref14","article-title":"A graduate course in applied cryptography","author":"boneh","year":"2016","journal-title":"Draft of a book version 0 3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"journal-title":"Homepage","year":"2019","key":"ref18"},{"key":"ref19","first-page":"209","article-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume":"8","author":"cadar","year":"2008","journal-title":"OSDI"},{"article-title":"Obfuscation techniques for enhancing software security","year":"0","author":"collberg","key":"ref4"},{"article-title":"Tamper resistant software encoding","year":"1999","author":"chow","key":"ref3"},{"article-title":"Using exceptions to obstruct analysis of control flow structure","year":"2002","author":"mercaldi","key":"ref6"},{"article-title":"Tamper resistant software-control flow encoding","year":"1999","author":"chow","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Tutorial about how to use klee to break programs obfuscated using tigress: Breaking obfuscated programs with symbolic execution","author":"banescu","year":"2017","journal-title":"Proceedings of 7th Software Security Protection and Reverse Engineering Workshop (SSPREW2017)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991114"},{"key":"ref2","first-page":"125","article-title":"Introducing dynamic name resolution mechanism for obfuscating system-defined names in programs","author":"tamada","year":"2008","journal-title":"Proceedings of International Conference on Software Engineering"},{"journal-title":"Surreptitious Software Obfuscation Watermarking and Tamperproofing for Software Protection","year":"2009","author":"collberg","key":"ref1"},{"key":"ref9","first-page":"297","article-title":"Evaluating obfuscation for symbolic execution, (in Japanese)","author":"stewart","year":"2015","journal-title":"Proceedings of Computer Security Symposium 2015"},{"journal-title":"Klee llvm execution engine","year":"2019","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v008.i14"}],"event":{"name":"2019 20th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2019,7,8]]},"location":"Toyama, Japan","end":{"date-parts":[[2019,7,11]]}},"container-title":["2019 20th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8932629\/8935640\/08935642.pdf?arnumber=8935642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:52:18Z","timestamp":1658155938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8935642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/snpd.2019.8935642","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}