{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:25Z","timestamp":1750221145666,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1563555"],"award-info":[{"award-number":["CNS-1563555"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,18]]},"DOI":"10.1145\/3211346.3211352","type":"proceedings-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T19:49:37Z","timestamp":1528400977000},"page":"20-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Obfuscation resilient search through executable classification"],"prefix":"10.1145","author":[{"given":"Fang-Hsiang","family":"Su","sequence":"first","affiliation":[{"name":"Columbia University, USA"}]},{"given":"Jonathan","family":"Bell","sequence":"additional","affiliation":[{"name":"George Mason University, USA"}]},{"given":"Gail","family":"Kaiser","sequence":"additional","affiliation":[{"name":"Columbia University, USA"}]},{"given":"Baishakhi","family":"Ray","sequence":"additional","affiliation":[{"name":"Columbia University, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"unstructured":"Macneto. 2018. Macneto repository. (2018). https:\/\/github.com\/ Programming-Systems-Lab\/macneto_release  Macneto. 2018. Macneto repository. (2018). https:\/\/github.com\/ Programming-Systems-Lab\/macneto_release","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/3088525.3088527"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/2635868.2635883"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/source.android.com\/source\/ build-numbers","author":"Source Project Android Open","year":"2018","unstructured":"Android Open Source Project . 2018. Android Codenames , Tags, and Build Numbers . ( 2018 ). https:\/\/source.android.com\/source\/ build-numbers Android Open Source Project. 2018. Android Codenames, Tags, and Build Numbers. (2018). https:\/\/source.android.com\/source\/ build-numbers"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/s10664-014-9350-8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2594291.2594299"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.5555\/2818754.2818808"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2976749.2978333"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 2011 International Conference on Unsupervised and Transfer Learning Workshop -","volume":"27","author":"Baldi Pierre","year":"2011","unstructured":"Pierre Baldi . 2011 . Autoencoders, Unsupervised Learning and Deep Architectures . In Proceedings of the 2011 International Conference on Unsupervised and Transfer Learning Workshop - Volume 27 (UTLW\u201911). JMLR.org, Washington, USA, 37\u201350. http:\/\/dl.acm.org\/citation.cfm? id=3045796.3045801 Pierre Baldi. 2011. Autoencoders, Unsupervised Learning and Deep Architectures. In Proceedings of the 2011 International Conference on Unsupervised and Transfer Learning Workshop - Volume 27 (UTLW\u201911). JMLR.org, Washington, USA, 37\u201350. http:\/\/dl.acm.org\/citation.cfm? id=3045796.3045801"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2976749.2978422"},{"unstructured":"Bob Pan. 2018. Dex2Jar Tools to work with android .dex and java .class files. (2018). https:\/\/github.com\/pxb1988\/dex2jar  Bob Pan. 2018. Dex2Jar Tools to work with android .dex and java .class files. (2018). https:\/\/github.com\/pxb1988\/dex2jar","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/ICSM.2015.7332450"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_3_2_1_15_1","volume-title":"https: \/\/github.com\/matachi\/geometri-destroyer","author":"Jonsson Daniel","year":"2013","unstructured":"Daniel \"MaTachi\" Jonsson . 2013. Geometri Destroyer . ( 2013 ). https: \/\/github.com\/matachi\/geometri-destroyer Daniel \"MaTachi\" Jonsson. 2013. Geometri Destroyer. (2013). https: \/\/github.com\/matachi\/geometri-destroyer"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.14722\/ndss.2016.23185"},{"key":"e_1_3_2_1_17_1","volume-title":"https: \/\/f-droid.org\/","author":"Limited Droid","year":"2018","unstructured":"F- Droid Limited and Contributors. 2018. F-Droid. ( 2018 ). https: \/\/f-droid.org\/ F-Droid Limited and Contributors. 2018. F-Droid. (2018). https: \/\/f-droid.org\/"},{"volume-title":"https:\/\/www.guardsquare.com\/ en\/proguard","year":"2018","unstructured":"GuardSquare. 2018. ProGuard. ( 2018 ). https:\/\/www.guardsquare.com\/ en\/proguard GuardSquare. 2018. ProGuard. (2018). https:\/\/www.guardsquare.com\/ en\/proguard","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1007\/978-3-642-03013-0_14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2505515.2505665"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/1572272.1572283"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/CSMR.2010.33"},{"volume-title":"Keras: The Python Deep Learning library.","year":"2018","unstructured":"Keras. 2018 . Keras: The Python Deep Learning library. (2018). https: \/\/keras.io\/ Keras. 2018. Keras: The Python Deep Learning library. (2018). https: \/\/keras.io\/","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Jimmy Ba . 2014 . Adam : A Method for Stochastic Optimization. CoRR abs\/1412.6980 (2014), 1\u201315. arXiv: 1412.6980 http:\/\/arxiv.org\/abs\/1412.6980 Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. CoRR abs\/1412.6980 (2014), 1\u201315. arXiv: 1412.6980 http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_1_25_1","volume-title":"Towards Generic Deobfuscation of Windows API Calls. In Workshop on Binary Analysis Research","volume":"1802","author":"Kotov Vadim","year":"2018","unstructured":"Vadim Kotov and Michael Wojnowicz . 2018 . Towards Generic Deobfuscation of Windows API Calls. In Workshop on Binary Analysis Research , Vol. abs\/ 1802 .04466. Network and Distributed System Security Symposium (NDSS), San Diego CA, 1\u201311. arXiv : 1802.04466 http:\/\/arxiv.org\/abs\/1802.04466 Vadim Kotov and Michael Wojnowicz. 2018. Towards Generic Deobfuscation of Windows API Calls. In Workshop on Binary Analysis Research, Vol. abs\/1802.04466. Network and Distributed System Security Symposium (NDSS), San Diego CA, 1\u201311. arXiv: 1802.04466 http:\/\/arxiv.org\/abs\/1802.04466"},{"volume-title":"2013 20th Working Conference on Reverse Engineering (WCRE). IEEE, Piscataway NJ, 489\u2013490","author":"Krutz D. E.","unstructured":"D. E. Krutz and E. Shihab . 2013. CCCD: Concolic code clone detection . In 2013 20th Working Conference on Reverse Engineering (WCRE). IEEE, Piscataway NJ, 489\u2013490 . D. E. Krutz and E. Shihab. 2013. CCCD: Concolic code clone detection. In 2013 20th Working Conference on Reverse Engineering (WCRE). IEEE, Piscataway NJ, 489\u2013490.","key":"e_1_3_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/ICPC.2006.51"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/2889160.2889204"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 18th Workshop on the Psychology of Programming Interest Group","author":"Liblit Ben","year":"2006","unstructured":"Ben Liblit , Andrew Begel , and Eve Sweetser . 2006 . Cognitive Perspectives on the Role of Naming in Computer Programs . In Proceedings of the 18th Workshop on the Psychology of Programming Interest Group . University of Sussex, Brighton, UK, 53\u201367. Ben Liblit, Andrew Begel, and Eve Sweetser. 2006. Cognitive Perspectives on the Role of Naming in Computer Programs. In Proceedings of the 18th Workshop on the Psychology of Programming Interest Group. University of Sussex, Brighton, UK, 53\u201367."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1007\/s10664-012-9230-z"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/332084.332092"},{"key":"e_1_3_2_1_32_1","volume-title":"Clean Code: A Handbook of Agile Software Craftsmanship. Pearson Education, White Plains NY.","author":"Martin Robert C","year":"2009","unstructured":"Robert C Martin . 2009 . Clean Code: A Handbook of Agile Software Craftsmanship. Pearson Education, White Plains NY. Robert C Martin. 2009. Clean Code: A Handbook of Agile Software Craftsmanship. Pearson Education, White Plains NY."},{"key":"e_1_3_2_1_33_1","volume-title":"McCulloch and Walter Pitts","author":"Warren","year":"1943","unstructured":"Warren S. McCulloch and Walter Pitts . 1943 . A logical calculus of the ideas immanent in nervous activity. The bulletin of mathematical biophysics 5, 4 (01 Dec 1943), 115\u2013133. Warren S. McCulloch and Walter Pitts. 1943. A logical calculus of the ideas immanent in nervous activity. The bulletin of mathematical biophysics 5, 4 (01 Dec 1943), 115\u2013133."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.5555\/2337223.2337267"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/2931037.2931043"},{"unstructured":"OW2 Consortium. 2017. ASM Framework. http:\/\/asm.ow2.org\/index. html . (2017).  OW2 Consortium. 2017. ASM Framework. http:\/\/asm.ow2.org\/index. html . (2017).","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1080\/14786440109462720"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_39_1","volume-title":"Similarity of Source Code in the Presence of Pervasive Modifications. In 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, Raleigh NC, 117\u2013126","author":"Ragkhitwetsagul Chaiyong","year":"2016","unstructured":"Chaiyong Ragkhitwetsagul , Jens Krinke , and David Clark . 2016 . Similarity of Source Code in the Presence of Pervasive Modifications. In 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, Raleigh NC, 117\u2013126 . Chaiyong Ragkhitwetsagul, Jens Krinke, and David Clark. 2016. Similarity of Source Code in the Presence of Pervasive Modifications. In 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, Raleigh NC, 117\u2013126."},{"volume-title":"Mining of Massive Datasets","author":"Rajaraman Anand","unstructured":"Anand Rajaraman and Jeffrey David Ullman . 2011. Mining of Massive Datasets . Cambridge University Press, New York, NY , USA. Anand Rajaraman and Jeffrey David Ullman. 2011. Mining of Massive Datasets. Cambridge University Press, New York, NY, USA.","key":"e_1_3_2_1_40_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/TIFS.2013.2290431"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/2676726.2677009"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1145\/1321631.1321672"},{"unstructured":"Smardec Inc. 2018. Allatori Java Obfuscator. (2018). http:\/\/www. allatori.com\/  Smardec Inc. 2018. Allatori Java Obfuscator. (2018). http:\/\/www. allatori.com\/","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems -","volume":"1","author":"Socher Richard","unstructured":"Richard Socher , Milind Ganjoo , Christopher D. Manning , and Andrew Y. Ng . 2013. Zero-shot Learning Through Cross-modal Transfer . In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 1 (NIPS\u201913). Curran Associates Inc., USA, 935\u2013943. http:\/\/dl.acm.org\/citation.cfm?id=2999611.2999716 Richard Socher, Milind Ganjoo, Christopher D. Manning, and Andrew Y. Ng. 2013. Zero-shot Learning Through Cross-modal Transfer. In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 1 (NIPS\u201913). Curran Associates Inc., USA, 935\u2013943. http:\/\/dl.acm.org\/citation.cfm?id=2999611.2999716"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1145\/2950290.2950321"},{"key":"e_1_3_2_1_47_1","volume-title":"Identifying Functionally Similar Code in Complex Codebases. In 24th IEEE International Conference on Program Comprehension (ICPC). IEEE Computer Society","author":"Su Fang-Hsiang","year":"2016","unstructured":"Fang-Hsiang Su , Jonathan Bell , Gail Kaiser , and Simha Sethumadhavan . 2016 . Identifying Functionally Similar Code in Complex Codebases. In 24th IEEE International Conference on Program Comprehension (ICPC). IEEE Computer Society , Washington, DC, USA, 1\u201310. Fang-Hsiang Su, Jonathan Bell, Gail Kaiser, and Simha Sethumadhavan. 2016. Identifying Functionally Similar Code in Complex Codebases. In 24th IEEE International Conference on Program Comprehension (ICPC). IEEE Computer Society, Washington, DC, USA, 1\u201310."},{"key":"e_1_3_2_1_48_1","first-page":"143","article-title":"The effects of comments and identifier names on program comprehensibility: an experimental investigation","volume":"4","author":"Takang Armstrong A","year":"1996","unstructured":"Armstrong A Takang , Penny A Grubb , and Robert D Macredie . 1996 . The effects of comments and identifier names on program comprehensibility: an experimental investigation . J. Prog. Lang. 4 , 3 (1996), 143 \u2013 167 . Armstrong A Takang, Penny A Grubb, and Robert D Macredie. 1996. The effects of comments and identifier names on program comprehensibility: an experimental investigation. J. Prog. Lang. 4, 3 (1996), 143\u2013167.","journal-title":"J. Prog. Lang."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the IASTED International Conference on Software Engineering. IASTED, Calgary Canada, 569\u2013575","author":"Tamada Haruaki","year":"2004","unstructured":"Haruaki Tamada , Masahide Nakamura , and Akito Monden . 2004 . Design and Evaluation of Birthmarks for Detecting Theft of Java Programs . In Proceedings of the IASTED International Conference on Software Engineering. IASTED, Calgary Canada, 569\u2013575 . Haruaki Tamada, Masahide Nakamura, and Akito Monden. 2004. Design and Evaluation of Birthmarks for Detecting Theft of Java Programs. In Proceedings of the IASTED International Conference on Software Engineering. IASTED, Calgary Canada, 569\u2013575."},{"unstructured":"TensorFlow. 2018. TensorFlow An open-source machine learning framework for everyone. (2018). https:\/\/www.tensorflow.org\/  TensorFlow. 2018. TensorFlow An open-source machine learning framework for everyone. (2018). https:\/\/www.tensorflow.org\/","key":"e_1_3_2_1_50_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.1109\/SP.2015.47"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.5555\/2818754.2818793"}],"event":{"sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"acronym":"PLDI '18","name":"PLDI '18: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Philadelphia PA USA"},"container-title":["Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3211346.3211352","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3211346.3211352","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3211346.3211352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:14Z","timestamp":1750208894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3211346.3211352"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":52,"alternative-id":["10.1145\/3211346.3211352","10.1145\/3211346"],"URL":"https:\/\/doi.org\/10.1145\/3211346.3211352","relation":{},"subject":[],"published":{"date-parts":[[2018,6,18]]},"assertion":[{"value":"2018-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}