{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:41:28Z","timestamp":1725763288278},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/uic-atc.2017.8397540","type":"proceedings-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T18:34:27Z","timestamp":1530210867000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Exploit dynamic data flows to protect software against semantic attacks"],"prefix":"10.1109","author":[{"given":"Kaiyuan","family":"Kuang","sequence":"first","affiliation":[]},{"given":"Zhanyong","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Xiaoqing","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Dingyi","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Heng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TSE.2002.1027797"},{"year":"0","journal-title":"Ida pro","key":"ref11"},{"year":"0","journal-title":"OllyDbg","key":"ref12"},{"year":"0","journal-title":"Sysinternals Suite","key":"ref13"},{"year":"1997","author":"collberg","journal-title":"A Taxonomy of Obfuscating Transformations","key":"ref14"},{"year":"0","journal-title":"The PIN tool","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/948148.948149"},{"year":"0","journal-title":"Execryptor","key":"ref17"},{"year":"0","journal-title":"Upx","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/1866307.1866368"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/CIS.2013.107"},{"year":"2011","author":"fang","journal-title":"Multi-stage binary code obfuscation using improved virtual machine","key":"ref3"},{"key":"ref6","article-title":"Truly-protect: An efficient vm-based software protection","author":"averbuch","year":"2011","journal-title":"IEEE Systems Journal"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2556464.2556468"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SP.2009.27"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2046707.2046739"},{"year":"0","journal-title":"Code Virtualizer","key":"ref2"},{"year":"0","journal-title":"VMProtect Software Protection","key":"ref1"},{"year":"2015","author":"yadegari","journal-title":"A generic approach to automatic deob-fuscation of executable code","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/CISIS.2014.20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/1102546.1102561"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/1375696.1375702"}],"event":{"name":"2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)","start":{"date-parts":[[2017,8,4]]},"location":"San Francisco, CA","end":{"date-parts":[[2017,8,8]]}},"container-title":["2017 IEEE SmartWorld, Ubiquitous Intelligence &amp; Computing, Advanced &amp; Trusted Computed, Scalable Computing &amp; Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8386711\/8397387\/08397540.pdf?arnumber=8397540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:46:30Z","timestamp":1643190390000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8397540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/uic-atc.2017.8397540","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}