{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:26:40Z","timestamp":1740144400499,"version":"3.37.3"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272423","61300242"],"award-info":[{"award-number":["61272423","61300242"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin","doi-asserted-by":"publisher","award":["14JCYBJC15300","15JCQNJC41500"],"award-info":[{"award-number":["14JCYBJC15300","15JCQNJC41500"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Basic Research Program of China","award":["2013CB834204"],"award-info":[{"award-number":["2013CB834204"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["65121012"],"award-info":[{"award-number":["65121012"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/tifs.2016.2555287","type":"journal-article","created":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T14:22:33Z","timestamp":1461162153000},"page":"2322-2337","source":"Crossref","is-referenced-by-count":7,"title":["Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation"],"prefix":"10.1109","volume":"11","author":[{"given":"Haoyu","family":"Ma","sequence":"first","affiliation":[]},{"given":"Ruiqi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoxu","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Chunfu","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"journal-title":"Scikit-Learn","year":"2015","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2006.07.025"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2001.934374"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237724"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186041"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_15"},{"article-title":"Discovery over application: A case study of misaligned incentives in software engineering","year":"2015","author":"rizzi","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.20"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996856"},{"key":"ref40","first-page":"274","article-title":"Software watermarking through register allocation: Implementation, analysis, and attacks","author":"myles","year":"2003","journal-title":"Proc Int Conf Inf Secur Cryptol (ICISC)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1286821.1286826"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484315"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_25"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642977"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898885"},{"key":"ref16","first-page":"321","article-title":"Impeding Malware analysis using conditional code obfuscation","author":"sharif","year":"2008","journal-title":"Proc 16th Annu Netw Distrib Syst Secur Symp (NDSS)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/72.728352"},{"key":"ref18","first-page":"51","article-title":"On the complexity of rule extraction from neural networks and network querying","author":"golea","year":"1996","journal-title":"Proc Rule Extraction From Trained Artificial Neural Networks Workshop (Society for the Study of Artificial Intelligence and Simulation of Behavior Workshop Series (AISB))"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BF00993103"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2008.04.007"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.34"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_12"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_38"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/78.229903"},{"key":"ref5","first-page":"1","article-title":"BitBlaze: A new approach to computer security via binary analysis","author":"song","year":"2008","journal-title":"Proc Int Conf Inf Syst Security (ICISS)"},{"key":"ref8","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455522"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.309"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24591-9_23"},{"key":"ref1","first-page":"287","article-title":"Control flow obfuscation using neural network to fight concolic testing","author":"ma","year":"2014","journal-title":"Proc Int Conf Sec Privacy Commun Netw (Securecomm)"},{"key":"ref46","first-page":"321","article-title":"Binary obfuscation using signals","author":"popov","year":"2007","journal-title":"Proc 16th Conf USENIX Secur Symp (USENIX Security)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BF02551274"},{"article-title":"A taxonomy of obfuscation transformations","year":"1997","author":"collberg","key":"ref45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(91)90009-T"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_12"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2106163"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292569"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1142\/S0129065711002821"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-006-6955-z"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2012.06.042"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7509003\/07454752.pdf?arnumber=7454752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:43:52Z","timestamp":1641987832000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7454752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":46,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2555287","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2016,10]]}}}