{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:15:38Z","timestamp":1767183338468,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MSIT","award":["2019-0-01343"],"award-info":[{"award-number":["2019-0-01343"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3450321","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"309-311","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["OBFUS"],"prefix":"10.1145","author":[{"given":"Seoyeon","family":"Kang","sequence":"first","affiliation":[{"name":"Chungnam National University, Daejeon, Republic of Korea"}]},{"given":"Sujeong","family":"Lee","sequence":"additional","affiliation":[{"name":"Chungnam National University, Daejeon, Republic of Korea"}]},{"given":"Yumin","family":"Kim","sequence":"additional","affiliation":[{"name":"Chungnam National University, Daejeon, Republic of Korea"}]},{"given":"Seong-Kyun","family":"Mok","sequence":"additional","affiliation":[{"name":"Chungnam National University, Daejeon, Republic of Korea"}]},{"given":"Eun-Sun","family":"Cho","sequence":"additional","affiliation":[{"name":"Chungnam National University, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Sebastian S. Malgaonkar S. Shah P. Kapoor M. & Parekhji T. 2016. A Study & Review on Code Obfuscation World Conference on Futuristic Trends in Research and Innovation for Social Welfare Coimbatore Tamilnadu India.  Sebastian S. Malgaonkar S. Shah P. Kapoor M. & Parekhji T. 2016. A Study & Review on Code Obfuscation World Conference on Futuristic Trends in Research and Innovation for Social Welfare Coimbatore Tamilnadu India.","DOI":"10.1109\/STARTUP.2016.7583913"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"David R. Coniglio L. & Ceccato M. 2020. QSynth - A Program Synthesis based Approach for Binary Code Deobfuscation Workshop on Binary Analysis Research  David R. Coniglio L. & Ceccato M. 2020. QSynth - A Program Synthesis based Approach for Binary Code Deobfuscation Workshop on Binary Analysis Research","DOI":"10.14722\/bar.2020.23009"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813617"},{"volume-title":"VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification Proceedings of the 2018 ACM SIG-SAC Conference on Computer and Communications Security,(CCS '18)","author":"Xu D.","key":"e_1_3_2_2_4_1","unstructured":"Xu , D. , Ming , J. , Fu , Y. , & Wu , D. 2018. VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification Proceedings of the 2018 ACM SIG-SAC Conference on Computer and Communications Security,(CCS '18) . Association for Computing Machinery , New York, NY, USA , 442--458 Xu, D., Ming, J., Fu, Y., & Wu, D. 2018. VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification Proceedings of the 2018 ACM SIG-SAC Conference on Computer and Communications Security,(CCS '18). Association for Computing Machinery, New York, NY, USA, 442--458"},{"key":"e_1_3_2_2_5_1","unstructured":"Elshatanoufy S. & O'Farrell W. 2011. A guide to inline assembly for C and C++. https:\/\/www.ibm.com\/developerworks\/rational\/library\/inline-assembly-c-cpp-guide\/index.html  Elshatanoufy S. & O'Farrell W. 2011. A guide to inline assembly for C and C++. https:\/\/www.ibm.com\/developerworks\/rational\/library\/inline-assembly-c-cpp-guide\/index.html"},{"key":"e_1_3_2_2_6_1","unstructured":"ANTLR (ANother Tool for Language Recognition). http:\/\/www.antlr.org  ANTLR (ANother Tool for Language Recognition). http:\/\/www.antlr.org"},{"key":"e_1_3_2_2_7_1","unstructured":"LLVM. https:\/\/llvm.org\/  LLVM. https:\/\/llvm.org\/"},{"key":"e_1_3_2_2_8_1","unstructured":"RetDec (Retargetable Decompiler). https:\/\/retdec.com\/  RetDec (Retargetable Decompiler). https:\/\/retdec.com\/"},{"key":"e_1_3_2_2_9_1","first-page":"3","volume-title":"Proceedings of the IEEE\/ACM 1st International Workshop on Software Protection, SPRO'15","author":"Pascal J.","year":"2015","unstructured":"Pascal , J. Julien , R. Johan , W. , & Julie , M. 2015 . Obfuscator-LLVM -- Software Protection for the Masses . In Proceedings of the IEEE\/ACM 1st International Workshop on Software Protection, SPRO'15 , Firenze, Italy, May 19th , 2015 (pp. 3 -- 9 ). IEEE. Pascal, J. Julien, R. Johan, W., & Julie, M. 2015. Obfuscator-LLVM -- Software Protection for the Masses. In Proceedings of the IEEE\/ACM 1st International Workshop on Software Protection, SPRO'15, Firenze, Italy, May 19th, 2015 (pp. 3--9). IEEE."},{"key":"e_1_3_2_2_10_1","unstructured":"ADVobfuscator. https:\/\/github.com\/andrivet\/ADVobfuscator  ADVobfuscator. https:\/\/github.com\/andrivet\/ADVobfuscator"},{"key":"e_1_3_2_2_11_1","unstructured":"Laszlo T. & Kiss A. 2009. OBFUSCATING C++ PROGRAMS VIA CONTROL FLOW FLATTENING  Laszlo T. & Kiss A. 2009. OBFUSCATING C++ PROGRAMS VIA CONTROL FLOW FLATTENING"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3450321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3450321"}},"subtitle":["An Obfuscation Tool for Software Copyright and Vulnerability Protection"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":11,"alternative-id":["10.1145\/3422337.3450321","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3450321","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}