{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:24:58Z","timestamp":1775053498005,"version":"3.50.1"},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2009,6,1]],"date-time":"2009-06-01T00:00:00Z","timestamp":1243814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/tifs.2008.2011077","type":"journal-article","created":{"date-parts":[[2009,2,19]],"date-time":"2009-02-19T21:48:03Z","timestamp":1235080083000},"page":"257-267","source":"Crossref","is-referenced-by-count":19,"title":["A Graph Approach to Quantitative Analysis of Control-Flow Obfuscating Transformations"],"prefix":"10.1109","volume":"4","author":[{"family":"Hsin-Yi Tsai","sequence":"first","affiliation":[]},{"family":"Yu-Lun Huang","sequence":"additional","affiliation":[]},{"given":"D.","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2006.335944"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FITS.2003.1264939"},{"key":"ref13","author":"toyofuku","year":"2005","journal-title":"Program obfuscation scheme using random numbers to complicate control flow"},{"key":"ref14","first-page":"15","article-title":"obfuscating c++ programs via control flow flattening","author":"lszl","year":"2008","journal-title":"Annales Universitatis Scientiarum de Rolando Etvs NominataeSectio Computatorica"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1102546.1102561"},{"key":"ref16","first-page":"275","article-title":"binary obfuscation using signals","author":"popov","year":"2007","journal-title":"Proc 16th USENIX Security Symp"},{"key":"ref17","author":"cota","year":"1989","journal-title":"Automatic Lookahead computation for conservative distributed simulation"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.1994.717382"},{"key":"ref19","year":"2008","journal-title":"Chilling effects clearinghourse"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816009"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","article-title":"tamper-resistant software: an implementation","volume":"1174","author":"aucsmith","year":"1996","journal-title":"Proc 1st Int Workshop Informaiton Hiding"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20050010"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1049\/cp:20020413","article-title":"security enhancements for a5\/1 without loosing hardware efficiency in future mobile systems","author":"komninos","year":"2002","journal-title":"Third International Conference on 3G Mobile Communication Technologies"},{"key":"ref8","author":"low","year":"1998","journal-title":"Java control flow obfuscation"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2005.13"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2006.875650"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MP.2006.1649003"},{"key":"ref9","author":"collberg","year":"1997","journal-title":"A Taxonomy of Obfuscating Transformations"},{"key":"ref20","first-page":"255","volume":"19","author":"bunke","year":"1998","journal-title":"A Graph Distance Metric Based on the Maximal Common Subgraph"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1515\/9783110866087","author":"zuse","year":"1991","journal-title":"Software Complexity Measures and Methods"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(01)00022-8"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/4957614\/04783097.pdf?arnumber=4783097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T03:05:43Z","timestamp":1684897543000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4783097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":22,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2008.2011077","relation":{},"ISSN":["1556-6013"],"issn-type":[{"value":"1556-6013","type":"print"}],"subject":[],"published":{"date-parts":[[2009,6]]}}}