{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:10:21Z","timestamp":1770279021263,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359812","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"177-189","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)"],"prefix":"10.1145","author":[{"given":"Mathilde","family":"Ollivier","sequence":"first","affiliation":[{"name":"CEA, LIST, Paris-Saclay, France"}]},{"given":"S\u00e9bastien","family":"Bardin","sequence":"additional","affiliation":[{"name":"CEA, LIST, Paris-Saclay, France"}]},{"given":"Richard","family":"Bonichon","sequence":"additional","affiliation":[{"name":"CEA, LIST, Paris-Saclay, France"}]},{"given":"Jean-Yves","family":"Marion","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Lorraine, France"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Tigress challenge. http:\/\/tigress.cs.arizona.edu\/challenges.html.  Tigress challenge. http:\/\/tigress.cs.arizona.edu\/challenges.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"e_1_3_2_1_3_1","volume-title":"Sang Kil Cha, and David Brumley. Enhancing symbolic execution with veritesting. Commun. ACM, 59(6)","author":"Avgerinos Thanassis","year":"2016","unstructured":"Thanassis Avgerinos , Alexandre Rebert , Sang Kil Cha, and David Brumley. Enhancing symbolic execution with veritesting. Commun. ACM, 59(6) , 2016 . Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley. Enhancing symbolic execution with veritesting. Commun. ACM, 59(6), 2016."},{"key":"e_1_3_2_1_4_1","first-page":"32","article-title":"WYSINWYX: what you see is not what you execute","author":"Balakrishnan Gogul","year":"2010","unstructured":"Gogul Balakrishnan and Thomas W. Reps . WYSINWYX: what you see is not what you execute . ACM Trans. Program. Lang. Syst. , 32 , 2010 . Gogul Balakrishnan and Thomas W. Reps. WYSINWYX: what you see is not what you execute. ACM Trans. Program. Lang. Syst., 32, 2010.","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991114"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security Symposium","author":"Banescu Sebastian","year":"2017","unstructured":"Sebastian Banescu , Christian S. Collberg , and Alexander Pretschner . Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning . In USENIX Security Symposium , 2017 . Sebastian Banescu, Christian S. Collberg, and Alexander Pretschner. Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_7_1","volume-title":"Advances in Cryptology - CRYPTO","author":"Barak Boaz","year":"2001","unstructured":"Boaz Barak , Oded Goldreich , Russell Impagliazzo , Steven Rudich , Amit Sahai , Salil P. Vadhan , and Ke Yang . On the (im)possibility of obfuscating programs . In Advances in Cryptology - CRYPTO , 2001 . Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, and Ke Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology - CRYPTO, 2001."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.36"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10575-8_11"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1550723"},{"key":"e_1_3_2_1_11_1","first-page":"70","article-title":"Effectiveness of synthesis in concolic deobfuscation","author":"Biondi Fabrizio","year":"2017","unstructured":"Fabrizio Biondi , S\u00e9bastien Josse , Axel Legay , and Thomas Sirvent . Effectiveness of synthesis in concolic deobfuscation . Computers & Security , 70 , 2017 . Fabrizio Biondi, S\u00e9bastien Josse, Axel Legay, and Thomas Sirvent. Effectiveness of synthesis in concolic deobfuscation. Computers & Security, 70, 2017.","journal-title":"Computers & Security"},{"key":"e_1_3_2_1_12_1","volume-title":"Conference on Computer and Communications Security","author":"Bonfante Guillaume","year":"2015","unstructured":"Guillaume Bonfante , Jos\u00e9 M. Fernandez , Jean-Yves Marion , Benjamin Rouxel , Fabrice Sabatier , and Aur\u00e9lien Thierry . Codisasm : Medium scale concatic disassembly of self-modifying binaries with overlapping instructions . In Conference on Computer and Communications Security , 2015 . Guillaume Bonfante, Jos\u00e9 M. Fernandez, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, and Aur\u00e9lien Thierry. Codisasm: Medium scale concatic disassembly of self-modifying binaries with overlapping instructions. In Conference on Computer and Communications Security, 2015."},{"key":"e_1_3_2_1_13_1","series-title":"Advances in Information Security","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-0-387-68768-1_4","volume-title":"Botnet Detection: Countering the Largest Security Threat","author":"Brumley David","year":"2008","unstructured":"David Brumley , Cody Hartwig , Zhenkai Liang , James Newsome , Dawn Xiaodong Song, and Heng Yin. Automatically identifying trigger-based behavior in malware . In Wenke Lee, Cliff Wang, and David Dagon, editors, Botnet Detection: Countering the Largest Security Threat , volume 36 of Advances in Information Security , pages 65 -- 88 . Springer , 2008 . David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, and Heng Yin. Automatically identifying trigger-based behavior in malware. In Wenke Lee, Cliff Wang, and David Dagon, editors, Botnet Detection: Countering the Largest Security Threat, volume 36 of Advances in Information Security, pages 65--88. Springer, 2008."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_16"},{"key":"e_1_3_2_1_15_1","volume-title":"VMCAI","author":"Bruni Roberto","year":"2018","unstructured":"Roberto Bruni , Roberto Giacobazzi , and Roberta Gori . Code obfuscation against abstract model checking attacks. In Verification, Model Checking, and Abstract Interpretation - 19th International Conference , VMCAI , 2018 . Roberto Bruni, Roberto Giacobazzi, and Roberta Gori. Code obfuscation against abstract model checking attacks. In Verification, Model Checking, and Abstract Interpretation - 19th International Conference, VMCAI, 2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803205"},{"key":"e_1_3_2_1_17_1","volume-title":"8th USENIX Symposium on Operating Systems Design and Implementation, OSDI","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson R. Engler . KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs . In 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI , 2008 . Cristian Cadar, Daniel Dunbar, and Dawson R. Engler. KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI, 2008."},{"key":"e_1_3_2_1_18_1","volume-title":"Symbolic execution for software testing: three decades later. Commun. ACM, 56(2)","author":"Cadar Cristian","year":"2013","unstructured":"Cristian Cadar and Koushik Sen . Symbolic execution for software testing: three decades later. Commun. ACM, 56(2) , 2013 . Cristian Cadar and Koushik Sen. Symbolic execution for software testing: three decades later. Commun. ACM, 56(2), 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9625-6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_21_1","volume-title":"Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection","author":"Collberg Christian","year":"2009","unstructured":"Christian Collberg and Jasvir Nagra . Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection . Addison-Wesley Professional , 1 st edition, 2009 . Christian Collberg and Jasvir Nagra. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley Professional, 1st edition, 2009.","edition":"1"},{"key":"e_1_3_2_1_22_1","volume-title":"A taxonomy of obfuscating transformations","author":"Collberg Christian","year":"1997","unstructured":"Christian Collberg , Clark Thomborson , and Douglas Low . A taxonomy of obfuscating transformations , 1997 . Christian Collberg, Clark Thomborson, and Douglas Low. A taxonomy of obfuscating transformations, 1997."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420997"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046739"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931048"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.43"},{"key":"e_1_3_2_1_27_1","volume-title":"TACAS","author":"de Moura Leonardo Mendon\u00e7a","year":"2008","unstructured":"Leonardo Mendon\u00e7a de Moura and Nikolaj Bj\u00f8rner . Z3 : an efficient SMT solver. In Tools and Algorithms for the Construction and Analysis of Systems , TACAS , 2008 . Leonardo Mendon\u00e7a de Moura and Nikolaj Bj\u00f8rner. Z3: an efficient SMT solver. In Tools and Algorithms for the Construction and Analysis of Systems, TACAS, 2008."},{"key":"e_1_3_2_1_28_1","volume-title":"Working Conference on Reverse Engineering, WCRE","author":"Saumya","year":"2010","unstructured":"Saumya K. Debray and Jay Patel. Reverse engineering self-modifying code: Unpacker extraction . In Working Conference on Reverse Engineering, WCRE , 2010 . Saumya K. Debray and Jay Patel. Reverse engineering self-modifying code: Unpacker extraction. In Working Conference on Reverse Engineering, WCRE, 2010."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995306.2995308"},{"key":"e_1_3_2_1_30_1","volume-title":"SAGE: whitebox fuzzing for security testing. Commun. ACM, 55(3)","author":"Godefroid Patrice","year":"2012","unstructured":"Patrice Godefroid , Michael Y. Levin , and David A. Molnar . SAGE: whitebox fuzzing for security testing. Commun. ACM, 55(3) , 2012 . Patrice Godefroid, Michael Y. Levin, and David A. Molnar. SAGE: whitebox fuzzing for security testing. Commun. ACM, 55(3), 2012."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503279"},{"key":"e_1_3_2_1_32_1","volume-title":"ACM Workshop Recurring Malcode (WORM). ACM","author":"Kang Min Gyung","year":"2007","unstructured":"Min Gyung Kang , Pongsin Poosankam , and Heng Yin . Renovo : a hidden code extractor for packed executables . In ACM Workshop Recurring Malcode (WORM). ACM , 2007 . Min Gyung Kang, Pongsin Poosankam, and Heng Yin. Renovo: a hidden code extractor for packed executables. In ACM Workshop Recurring Malcode (WORM). ACM, 2007."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.16"},{"key":"e_1_3_2_1_34_1","volume-title":"4th International Conference, ICISS","author":"King Dave","year":"2008","unstructured":"Dave King , Boniface Hicks , Michael Hicks , and Trent Jaeger . Implicit flows : Can't live with 'em, can't live without 'em. In Information Systems Security , 4th International Conference, ICISS , 2008 . Dave King, Boniface Hicks, Michael Hicks, and Trent Jaeger. Implicit flows: Can't live with 'em, can't live without 'em. In Information Systems Security, 4th International Conference, ICISS, 2008."},{"key":"e_1_3_2_1_35_1","volume-title":"14th European Conference on Software Maintenance and Reengineering, CSMR","author":"Liu Yin","year":"2010","unstructured":"Yin Liu and Ana Milanova . Static information flow analysis with handling of implicit flows and a study on effects of implicit flows vs explicit flows . In 14th European Conference on Software Maintenance and Reengineering, CSMR , 2010 . Yin Liu and Ana Milanova. Static information flow analysis with handling of implicit flows and a study on effects of implicit flows vs explicit flows. In 14th European Conference on Software Maintenance and Reengineering, CSMR, 2010."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72308-2_8"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_17"},{"key":"e_1_3_2_1_38_1","volume-title":"SSTIC","author":"Saudel Florent","year":"2015","unstructured":"Florent Saudel and Jonathan Salwan . Triton : Framework d'ex\u00c3l'cution concolique . In SSTIC , 2015 . Florent Saudel and Jonathan Salwan. Triton : Framework d'ex\u00c3l'cution concolique. In SSTIC, 2015."},{"key":"e_1_3_2_1_39_1","volume-title":"Protecting software through obfuscation: Can it keep pace with progress in code analysis? ACM Comput. Surv., 49(1)","author":"Schrittwieser Sebastian","year":"2016","unstructured":"Sebastian Schrittwieser , Stefan Katzenbeisser , Johannes Kinder , Georg Merzdovnik , and Edgar Weippl . Protecting software through obfuscation: Can it keep pace with progress in code analysis? ACM Comput. Surv., 49(1) , 2016 . Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik, and Edgar Weippl. Protecting software through obfuscation: Can it keep pace with progress in code analysis? ACM Comput. Surv., 49(1), 2016."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_42_1","volume-title":"Network and Distributed System Security Symposium, NDSS","author":"Sharif Monirul I.","year":"2008","unstructured":"Monirul I. Sharif , Andrea Lanzi , Jonathon T. Giffin , and Wenke Lee . Impeding malware analysis using conditional code obfuscation . In Network and Distributed System Security Symposium, NDSS , 2008 . Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffin, and Wenke Lee. Impeding malware analysis using conditional code obfuscation. In Network and Distributed System Security Symposium, NDSS, 2008."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2016. ACM.","author":"Srinivasan Venkatesh","unstructured":"Venkatesh Srinivasan and Thomas W. Reps . An improved algorithm for slicing machine code . In Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2016. ACM. Venkatesh Srinivasan and Thomas W. Reps. An improved algorithm for slicing machine code. In Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2016. ACM."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00025"},{"key":"e_1_3_2_1_46_1","volume-title":"6th USENIX Workshop on Offensive Technologies, WOOT'12","author":"Vanegue Julien","year":"2012","unstructured":"Julien Vanegue and Sean Heelan . SMT solvers in software security . In 6th USENIX Workshop on Offensive Technologies, WOOT'12 , 2012 . Julien Vanegue and Sean Heelan. SMT solvers in software security. In 6th USENIX Workshop on Offensive Technologies, WOOT'12, 2012."},{"key":"e_1_3_2_1_47_1","volume-title":"USA","author":"Wang Chenxi","year":"2000","unstructured":"Chenxi Wang , Jonathan Hill , John Knight , and Jack Davidson . Software tamper resistance: Obstructing static analysis of programs. Technical report, Charlottesville, VA , USA , 2000 . Chenxi Wang, Jonathan Hill, John Knight, and Jack Davidson. Software tamper resistance: Obstructing static analysis of programs. Technical report, Charlottesville, VA, USA, 2000."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA466288"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_12"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813663"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.47"},{"key":"e_1_3_2_1_52_1","volume-title":"WISA","author":"Zhou Yongxin","year":"2007","unstructured":"Yongxin Zhou , Alec Main , Yuan Xiang Gu , and Harold Johnson . Information hiding in software with mixed boolean-arithmetic transforms. In Information Security Applications , WISA , 2007 . Yongxin Zhou, Alec Main, Yuan Xiang Gu, and Harold Johnson. Information hiding in software with mixed boolean-arithmetic transforms. In Information Security Applications, WISA, 2007."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359812","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359812"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":52,"alternative-id":["10.1145\/3359789.3359812","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359812","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}