{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T22:59:31Z","timestamp":1771455571757,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1453647, 1757761"],"award-info":[{"award-number":["CNS-1453647, 1757761"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528560","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"140-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["A First Look at Code Obfuscation for WebAssembly"],"prefix":"10.1145","author":[{"given":"Shrenik","family":"Bhansali","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Ahmet","family":"Aris","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"Abbas","family":"Acar","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"Harun","family":"Oz","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"A. Selcuk","family":"Uluagac","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Code obfuscation literature survey. CS701 Construction of compilers","author":"Balakrishnan Arini","year":"2005","unstructured":"Arini Balakrishnan and Chloe Schulze . 2005. Code obfuscation literature survey. CS701 Construction of compilers , Vol. 19 ( 2005 ). Arini Balakrishnan and Chloe Schulze. 2005. Code obfuscation literature survey. CS701 Construction of compilers, Vol. 19 (2005)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.10.114"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380085"},{"key":"e_1_3_2_1_4_1","volume-title":"The Tigress Obfuscator. https:\/\/tigress.wtf. [Online","author":"Collberg Christian","year":"2022","unstructured":"Christian Collberg , Sam Martin , Jonathan Myers , Bill Zimmerman , Petr Krajca , Gabriel Kerneis , Saumya Debray , and Babak Yadegari . 2022. The Tigress Obfuscator. https:\/\/tigress.wtf. [Online ; accessed 4- April - 2022 ]. Christian Collberg, Sam Martin, Jonathan Myers, Bill Zimmerman, Petr Krajca, Gabriel Kerneis, Saumya Debray, and Babak Yadegari. 2022. The Tigress Obfuscator. https:\/\/tigress.wtf. [Online; accessed 4-April-2022]."},{"key":"e_1_3_2_1_5_1","unstructured":"Monero Documentation. 2013. CryptoNight. https:\/\/monerodocs.org\/proof-of-work\/cryptonight\/. accessed: 2022-02-12.  Monero Documentation. 2013. CryptoNight. https:\/\/monerodocs.org\/proof-of-work\/cryptonight\/. accessed: 2022-02-12."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243858"},{"key":"e_1_3_2_1_7_1","first-page":"3","article-title":"Obfuscating Cprograms via control flow flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae","volume":"30","author":"L\u00e1szl\u00f3 Timea","year":"2009","unstructured":"Timea L\u00e1szl\u00f3 and \u00c1kos Kiss . 2009 . Obfuscating Cprograms via control flow flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae , Sectio Computatorica , Vol. 30 , 1 (2009), 3 -- 19 . Timea L\u00e1szl\u00f3 and \u00c1kos Kiss. 2009. Obfuscating Cprograms via control flow flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae, Sectio Computatorica, Vol. 30, 1 (2009), 3--19.","journal-title":"Sectio Computatorica"},{"key":"e_1_3_2_1_8_1","volume-title":"29th USENIX Sec. Symp. 217--234","author":"Lehmann Daniel","year":"2020","unstructured":"Daniel Lehmann , Johannes Kinder , and Michael Pradel . 2020 . Everything old is new again: Binary security of webassembly . In 29th USENIX Sec. Symp. 217--234 . Daniel Lehmann, Johannes Kinder, and Michael Pradel. 2020. Everything old is new again: Binary security of webassembly. In 29th USENIX Sec. Symp. 217--234."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304068"},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/developer.mozilla.org\/en-US\/docs\/WebAssembly\/Concepts. [Online","author":"WebAssembly Concepts MDN.","year":"2021","unstructured":"MDN. 2021. WebAssembly Concepts . https:\/\/developer.mozilla.org\/en-US\/docs\/WebAssembly\/Concepts. [Online ; accessed 10- November - 2021 ]. MDN. 2021. WebAssembly Concepts. https:\/\/developer.mozilla.org\/en-US\/docs\/WebAssembly\/Concepts. [Online; accessed 10-November-2021]."},{"key":"e_1_3_2_1_11_1","volume-title":"New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild. In Int. Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment.","author":"Musch Marius","year":"2019","unstructured":"Marius Musch , Christian Wressnegger , Martin Johns , and Konrad Rieck . 2019 . New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild. In Int. Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment. Marius Musch, Christian Wressnegger, Martin Johns, and Konrad Rieck. 2019. New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild. In Int. Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24444"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"F. Naseem A. Aris L. Babun E. Tekiner and A. S. Uluagac. 2021 b. MINOS: A Lightweight Real-Time Cryptojacking Detection System. In NDSS.  F. Naseem A. Aris L. Babun E. Tekiner and A. S. Uluagac. 2021 b. MINOS: A Lightweight Real-Time Cryptojacking Detection System. In NDSS.","DOI":"10.14722\/ndss.2021.24444"},{"key":"e_1_3_2_1_14_1","volume-title":"A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Comput. Surv. (jan","author":"Oz Harun","year":"2022","unstructured":"Harun Oz , Ahmet Aris , Albert Levi , and A. Selcuk Uluagac . 2022. A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Comput. Surv. (jan 2022 ). https:\/\/doi.org\/10.1145\/3514229 10.1145\/3514229 Harun Oz, Ahmet Aris, Albert Levi, and A. Selcuk Uluagac. 2022. A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Comput. Surv. (jan 2022). https:\/\/doi.org\/10.1145\/3514229"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833626"},{"key":"e_1_3_2_1_16_1","volume-title":"SECRYPT","volume":"96435","author":"Sarwar Golam","year":"2013","unstructured":"Golam Sarwar , Olivier Mehani , Roksana Boreli , and Mohamed Ali Kaafar . 2013 . On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices .. In SECRYPT , Vol. 96435 . Golam Sarwar, Olivier Mehani, Roksana Boreli, and Mohamed Ali Kaafar. 2013. On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.. In SECRYPT, Vol. 96435."},{"key":"e_1_3_2_1_17_1","volume-title":"Int. workshop on information hiding. Springer.","author":"Schrittwieser S.","unstructured":"S. Schrittwieser and S. Katzenbeisser . 2011. Code obfuscation against static and dynamic reverse engineering . In Int. workshop on information hiding. Springer. S. Schrittwieser and S. Katzenbeisser. 2011. Code obfuscation against static and dynamic reverse engineering. In Int. workshop on information hiding. Springer."},{"key":"e_1_3_2_1_18_1","volume-title":"In-Browser Cryptomining for Good: An Untold Story. In 2021 IEEE Int. Conf. on Decentralized Applications and Infrastructures (DAPPS). 20--29","author":"Tekiner E.","unstructured":"E. Tekiner , A. Acar , A. S. Uluagac , E. Kirda , and A. A. Selcuk . 2021 a . In-Browser Cryptomining for Good: An Untold Story. In 2021 IEEE Int. Conf. on Decentralized Applications and Infrastructures (DAPPS). 20--29 . E. Tekiner, A. Acar, A. S. Uluagac, E. Kirda, and A. A. Selcuk. 2021 a. In-Browser Cryptomining for Good: An Untold Story. In 2021 IEEE Int. Conf. on Decentralized Applications and Infrastructures (DAPPS). 20--29."},{"key":"e_1_3_2_1_19_1","volume-title":"SoK: Cryptojacking Malware. In 2021 IEEE European Symposium on Security and Privacy.","author":"Tekiner E.","unstructured":"E. Tekiner , A. Acar , A. S. Uluagac , E. Kirda , and A. A. Selcuk . 2021 b . SoK: Cryptojacking Malware. In 2021 IEEE European Symposium on Security and Privacy. E. Tekiner, A. Acar, A. S. Uluagac, E. Kirda, and A. A. Selcuk. 2021 b. SoK: Cryptojacking Malware. In 2021 IEEE European Symposium on Security and Privacy."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167082"},{"key":"e_1_3_2_1_21_1","volume-title":"Cosine similarity measures for intuitionistic fuzzy sets and their applications. Mathematical and computer modelling","author":"Jun Ye.","year":"2011","unstructured":"Jun Ye. 2011. Cosine similarity measures for intuitionistic fuzzy sets and their applications. Mathematical and computer modelling , Vol. 53 , 1--2 ( 2011 ), 91--97. Jun Ye. 2011. Cosine similarity measures for intuitionistic fuzzy sets and their applications. Mathematical and computer modelling, Vol. 53, 1--2 (2011), 91--97."}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528560","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3507657.3528560","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528560","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:15Z","timestamp":1750183815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528560"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":21,"alternative-id":["10.1145\/3507657.3528560","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528560","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}