{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:35Z","timestamp":1763499035785,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-20-CE25-0009-TAVA"],"award-info":[{"award-number":["ANR-20-CE25-0009-TAVA"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485337","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"2384-2386","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Search-Based Local Black-Box Deobfuscation"],"prefix":"10.1145","author":[{"given":"Gr\u00e9goire","family":"Menguy","sequence":"first","affiliation":[{"name":"Universit\u00e9 Paris-Saclay, CEA, List, Palaiseau, France"}]},{"given":"S\u00e9bastien","family":"Bardin","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Paris-Saclay, CEA, List, Palaiseau, France"}]},{"given":"Richard","family":"Bonichon","sequence":"additional","affiliation":[{"name":"Nomadic Labs, Paris, France"}]},{"given":"Cauim de Souza","family":"Lima","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Paris-Saclay, CEA, List, Palaiseau, France"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"FMCAD 2013","author":"Alur Rajeev","year":"2013","unstructured":"Rajeev Alur, Rastislav Bod\u00edk, Garvit Juniwal, Milo M. K. Martin, Mukund Raghothaman, Sanjit A. Seshia, Rishabh Singh, Armando Solar-Lezama, Emina Torlak, and Abhishek Udupa. 2013. Syntax-guided synthesis. In Formal Methods in Computer-Aided Design, FMCAD 2013, Portland, OR, USA, October 20--23, 2013. IEEE."},{"key":"e_1_3_2_1_2_1","unstructured":"Rajeev Alur Dana Fisman Saswat Padhi Rishabh Singh and Abhishek Udupa. 2019. SyGuS-Comp 2018: Results and Analysis. (2019). http:\/\/arxiv.org\/abs\/1904.07146"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991114"},{"key":"e_1_3_2_1_4_1","volume-title":"Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes. In 2017 IEEE Symposium on Security and Privacy, SP 2017","author":"Bardin S\u00e9bastien","year":"2017","unstructured":"S\u00e9bastien Bardin, Robin David, and Jean-Yves Marion. 2017. Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_14"},{"key":"e_1_3_2_1_6_1","volume-title":"Syntia: Synthesizing the Semantics of Obfuscated Code. In Usenix Security.","author":"Blazytko Tim","year":"2017","unstructured":"Tim Blazytko, Moritz Contag, Cornelius Aschermann, and Thorsten Holz. 2017. Syntia: Synthesizing the Semantics of Obfuscated Code. In Usenix Security."},{"key":"e_1_3_2_1_7_1","volume-title":"Syntia: Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis. Black Hat Asia","author":"Blazytko Tim","year":"2018","unstructured":"Tim Blazytko, Moritz Contag, Cornelius Aschermann, and Thorsten Holz. 2018. Syntia: Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis. Black Hat Asia (2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2012.2186810"},{"key":"e_1_3_2_1_9_1","volume-title":"Dawn Xiaodong Song, and Heng Yin","author":"Brumley David","year":"2008","unstructured":"David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, and Heng Yin. 2008. Automatically Identifying Trigger-based Behavior in Malware. In Botnet Detection: Countering the Largest Security Threat. Springer."},{"key":"e_1_3_2_1_10_1","unstructured":"C. Collberg S. Martin J. Myers and B. Zimmerman. [n.d.]. The Tigress C Diversifier\/Obfuscator. http:\/\/tigress.cs.arizona.edu\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection.","author":"Collberg Christian","year":"2009","unstructured":"Christian Collberg and Jasvir Nagra. 2009. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection."},{"key":"e_1_3_2_1_12_1","unstructured":"Christian Collberg Clark Thomborson and Douglas Low. 1997. A taxonomy of obfuscating transformations."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2020.23009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Sumit Gulwani Oleksandr Polozov Rishabh Singh et al. 2017. Program synthesis. Foundations and Trends\u00ae in Programming Languages (2017).","DOI":"10.1561\/9781680832938"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806833"},{"key":"e_1_3_2_1_17_1","volume-title":"Towards Static Analysis of Virtualization-Obfuscated Binaries. In 19th Working Conference on Reverse Engineering, WCRE.","author":"Kinder Johannes","year":"2012","unstructured":"Johannes Kinder. 2012. Towards Static Analysis of Virtualization-Obfuscated Binaries. In 19th Working Conference on Reverse Engineering, WCRE."},{"volume-title":"Handbook of metaheuristics","author":"Louren\u00e7o Helena Ramalhinho","key":"e_1_3_2_1_18_1","unstructured":"Helena Ramalhinho Louren\u00e7o, Olivier C Martin, and Thomas St\u00fctzle. 2019. Iterated local search: Framework and applications. In Handbook of metaheuristics. Springer."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359812"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371307.3371309"},{"key":"e_1_3_2_1_21_1","unstructured":"Oreans Technologies. 2020. Themida -- Advanced Windows Software Protection System. http:\/\/oreans.com\/themida.php."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_17"},{"key":"e_1_3_2_1_23_1","volume-title":"Stochastic superoptimization. ACM SIGARCH Computer Architecture News","author":"Schkufza Eric","year":"2013","unstructured":"Eric Schkufza, Rahul Sharma, and Alex Aiken. 2013. Stochastic superoptimization. ACM SIGARCH Computer Architecture News (2013)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Sebastian Schrittwieser Stefan Katzenbeisser Johannes Kinder Georg Merzdovnik and Edgar Weippl. 2016. Protecting Software Through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Comput. Surv. (2016).","DOI":"10.1145\/2886012"},{"key":"e_1_3_2_1_25_1","volume-title":"Probabilistic Obfuscation Through Covert Channels. In 2018 IEEE European Symposium on Security and Privacy, EuroS&P","author":"Stephens Jon","year":"2018","unstructured":"Jon Stephens, Babak Yadegari, Christian S. Collberg, Saumya Debray, and Carlos Scheidegger. 2018. Probabilistic Obfuscation Through Covert Channels. In 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470496916"},{"key":"e_1_3_2_1_27_1","unstructured":"VM Protect Software. 2020. VMProtect Software Protection. http:\/\/vmpsoft.com."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813663"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.47"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784964.1784971"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:46:58Z","timestamp":1763498818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485337"}},"subtitle":["Understand, Improve and Mitigate (Poster)"],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":30,"alternative-id":["10.1145\/3460120.3485337","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485337","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}