{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:32:44Z","timestamp":1762252364103,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2889160.2891040","type":"proceedings-article","created":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T12:27:23Z","timestamp":1463401643000},"page":"680-682","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards better program obfuscation"],"prefix":"10.1145","author":[{"given":"Han","family":"Liu","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The Google Closure Compiler. https:\/\/developers.google.com\/closure\/compiler\/ accessed: 2015-11-28.  The Google Closure Compiler. https:\/\/developers.google.com\/closure\/compiler\/ accessed: 2015-11-28."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_2_1_4_1","unstructured":"M.\n      Allamanis D.\n      Tarlow A. D.\n      Gordon and \n      Y.\n      Wei\n  . \n  Bimodal modelling of source code and natural language\n  . In F. R. Bach and D. M. Blei editors ICML volume \n  37\n   of \n  JMLR Proceedings pages \n  2123\n  --\n  2132\n  . \n  JMLR.\n  org 2015\n  .  M. Allamanis D. Tarlow A. D. Gordon and Y. Wei. Bimodal modelling of source code and natural language. In F. R. Bach and D. M. Blei editors ICML volume 37 of JMLR Proceedings pages 2123--2132. JMLR.org 2015."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020281327116"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704152"},{"key":"e_1_3_2_1_7_1","volume-title":"Technical report 148","author":"Collberg C.","year":"1997","unstructured":"C. Collberg , C. Thomborson , and D. Low . A taxonomy of obfuscating transformations . In Technical report 148 , New Zealand, 1997 . Department of computer science, the University of Auckland . C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. In Technical report 148, New Zealand, 1997. Department of computer science, the University of Auckland."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40164-0_15"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103746.2103761"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33125-1_11"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.60"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337322"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568317"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491458"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486857"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594321"},{"key":"e_1_3_2_1_20_1","first-page":"1019","volume-title":"Computer and Information Science, 2007. ICIS 2007. 6th IEEE\/ACIS International Conference on","author":"D. S., M. A.","year":"2007","unstructured":"D. S., M. A. , and T. C. Slicing aided design of obfuscating transforms . In Computer and Information Science, 2007. ICIS 2007. 6th IEEE\/ACIS International Conference on , pages 1019 -- 1024 , 2007 . D. S., M. A., and T. C. Slicing aided design of obfuscating transforms. In Computer and Information Science, 2007. ICIS 2007. 6th IEEE\/ACIS International Conference on, pages 1019--1024, 2007."},{"key":"e_1_3_2_1_21_1","volume-title":"NDSS","author":"Sharif M.","year":"2008","unstructured":"M. Sharif , A. Lanzi , J. Giffin , and W. Lee . Impeding malware analysis using conditional code obfuscation . In NDSS , 2008 . M. Sharif, A. Lanzi, J. Giffin, and W. Lee. Impeding malware analysis using conditional code obfuscation. In NDSS, 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635875"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"],"location":"Austin Texas","acronym":"ICSE '16"},"container-title":["Proceedings of the 38th International Conference on Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2891040","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2889160.2891040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:54Z","timestamp":1750221534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2891040"}},"subtitle":["optimization via language models"],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":22,"alternative-id":["10.1145\/2889160.2891040","10.1145\/2889160"],"URL":"https:\/\/doi.org\/10.1145\/2889160.2891040","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}