{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:13:27Z","timestamp":1772039607939,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046739","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"275-284","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":83,"title":["Deobfuscation of virtualization-obfuscated software"],"prefix":"10.1145","author":[{"given":"Kevin","family":"Coogan","sequence":"first","affiliation":[{"name":"University of Arizona, Tucson, AZ, USA"}]},{"given":"Gen","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Arizona, Tucson, AZ, USA"}]},{"given":"Saumya","family":"Debray","sequence":"additional","affiliation":[{"name":"University of Arizona, Tucson, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"VX Heavens 2011. http:\/\/vx.netlux.org\/.  VX Heavens 2011. http:\/\/vx.netlux.org\/."},{"key":"e_1_3_2_1_2_1","volume-title":"phCompilers -- Principles, Techniques, and Tools","author":"Aho A. V.","year":"1985","unstructured":"A. V. Aho , R. Sethi , and J. D. Ullman . phCompilers -- Principles, Techniques, and Tools . Addison-Wesley , Reading, Mass ., 1985 . A. V. Aho, R. Sethi, and J. D. Ullman. phCompilers -- Principles, Techniques, and Tools. Addison-Wesley, Reading, Mass., 1985."},{"key":"e_1_3_2_1_3_1","first-page":"41","volume-title":"FREENIX Track","author":"Bellard F.","year":"2005","unstructured":"F. Bellard . QEMU, a fast and portable dynamic translator. In phUSENIX Annual Technical Conference , FREENIX Track , pages 41 -- 46 . USENIX, 2005 . F. Bellard. QEMU, a fast and portable dynamic translator. In phUSENIX Annual Technical Conference, FREENIX Track, pages 41--46. USENIX, 2005."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.15"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_6_1","volume-title":"Symantec Corp.","author":"Falliere N.","year":"2009","unstructured":"N. Falliere . Inside the jaws of Trojan.Clampi. Technical report , Symantec Corp. , Nov. 2009 . N. Falliere. Inside the jaws of Trojan.Clampi. Technical report, Symantec Corp., Nov. 2009."},{"key":"e_1_3_2_1_7_1","volume-title":"phPartial Evaluation and Automatic Program Generation","author":"Jones N. D.","year":"1993","unstructured":"N. D. Jones , C. K. Gomard , and P. Sestoft . phPartial Evaluation and Automatic Program Generation . Prentice Hall , 1993 . N. D. Jones, C. K. Gomard, and P. Sestoft. phPartial Evaluation and Automatic Program Generation. Prentice Hall, 1993."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.120"},{"key":"e_1_3_2_1_9_1","volume-title":"Second CARO Workshop on Packers, Decryptors, and Obfuscators","author":"Lau B.","year":"2008","unstructured":"B. Lau . Dealing with virtualization packer . In Second CARO Workshop on Packers, Decryptors, and Obfuscators , May 2008 . B. Lau. Dealing with virtualization packer. In Second CARO Workshop on Packers, Decryptors, and Obfuscators, May 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"e_1_3_2_1_11_1","volume-title":"Dec.","author":"Technologies Oreans","year":"2008","unstructured":"Oreans Technologies . Code virtualizer: Total obfuscation against reverse engineering , Dec. 2008 . http:\/\/www.oreans.com\/codevirtualizer.php. Oreans Technologies. Code virtualizer: Total obfuscation against reverse engineering, Dec. 2008. http:\/\/www.oreans.com\/codevirtualizer.php."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. 3rd USENIX Workshop on Offensive Technologies (WOOT '09)","author":"Rolles R.","year":"2009","unstructured":"R. Rolles . Unpacking virtualization obfuscators . In Proc. 3rd USENIX Workshop on Offensive Technologies (WOOT '09) , Aug. 2009 . R. Rolles. Unpacking virtualization obfuscators. In Proc. 3rd USENIX Workshop on Offensive Technologies (WOOT '09), Aug. 2009."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.27"},{"key":"e_1_3_2_1_14_1","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"Tip F.","year":"1995","unstructured":"F. Tip . A survey of program slicing techniques . Journal of Programming Languages , 3 : 121 -- 189 , 1995 . F. Tip. A survey of program slicing techniques. Journal of Programming Languages, 3: 121--189, 1995.","journal-title":"Journal of Programming Languages"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.13"},{"key":"e_1_3_2_1_16_1","volume-title":"Vmprotect software protection","author":"Software Protect","year":"2008","unstructured":"VM Protect Software . Vmprotect software protection , 2008 . http:\/\/vmpsoft.com\/. VMProtect Software. Vmprotect software protection, 2008. http:\/\/vmpsoft.com\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/647882.738073"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046739","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046739"}},"subtitle":["a semantics-based approach"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":17,"alternative-id":["10.1145\/2046707.2046739","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046739","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}