{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:40:02Z","timestamp":1755862802522,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T00:00:00Z","timestamp":1701993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,8]]},"DOI":"10.1145\/3659211.3659272","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:22:21Z","timestamp":1716999741000},"page":"350-358","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Improved OLLVM Based on Code Rearrangement Architecture"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6748-9253","authenticated-orcid":false,"given":"Yuxuan","family":"Xiao","sequence":"first","affiliation":[{"name":"University of information Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8499-9402","authenticated-orcid":false,"given":"Jinlong","family":"Fei","sequence":"additional","affiliation":[{"name":"University of information Engineering, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"B. Coppens, and B. D. J. A. Sutter. \"Flexible Software Protection\"[J]","author":"J.","year":"2020","unstructured":"J. V. d. Broeck, B. Coppens, and B. D. J. A. Sutter. \"Flexible Software Protection\"[J], 2020, vol. abs\/2012.12603."},{"key":"e_1_3_2_1_2_1","volume-title":"o. t. t. W. o. S. Sutter, Protection, and R. Engineering[J]. \"Tightly-coupled self-debugging software protection","author":"Abrath B.","year":"2016","unstructured":"B. Abrath, B. Coppens, S. Volckaert B. D. J. P. o. t. t. W. o. S. Sutter, Protection, and R. Engineering[J]. \"Tightly-coupled self-debugging software protection\", 2016."},{"key":"e_1_3_2_1_3_1","first-page":"283","article-title":"chapter Five-A Tutorial on Software[J]. Obfuscation","volume":"108","author":"Banescu Sebastian","year":"2018","unstructured":"Sebastian Banescu and Alexander Pretschner. chapter Five-A Tutorial on Software[J]. Obfuscation, Advances in Computers. Technische Universit\u00e4t M\u00fcnchen. Volume 108, 2018, Pages 283-353.","journal-title":"Advances in Computers. Technische Universit\u00e4t M\u00fcnchen."},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE Transactions on Systems, Man, and Cybernetics","author":"Motavalli S","year":"1985","unstructured":"S Motavalli. (1985) IEEE Transactions on Systems, Man, and Cybernetics. The University of Alabama in Birmingham, 1985, Volume, SMC-15, Issue: 2."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.10.114"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_19"},{"key":"e_1_3_2_1_7_1","volume-title":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare. Mukesh Patel School of Technology Management & Engineering","author":"Sebastian Savio Antony","year":"2016","unstructured":"Savio Antony Sebastian, Saurabh Malgaonkar and Paulami Shah. A study & review on code obfuscation[C]. 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare. Mukesh Patel School of Technology Management & Engineering, 2016."},{"key":"e_1_3_2_1_8_1","volume-title":"LLVM: A Compilation Framework for Lifelong Program Analysis and Transformation [C]. Lifelong Program Analysis & Transformation. university of Illinois at Urbana-Champaign","author":"Lattner Chris","year":"2004","unstructured":"Chris Lattner and Vikram Adve. LLVM: A Compilation Framework for Lifelong Program Analysis and Transformation [C]. Lifelong Program Analysis & Transformation. university of Illinois at Urbana-Champaign, 2004, 0-7695-2102-9."},{"key":"e_1_3_2_1_9_1","volume-title":"Formalizing the LLVM intermediate representation for verified program transformations. The 39th annual ACM SIGPLAN-SIGACT Symposium on Principles[C]","author":"Zhao Jianzhou","year":"2012","unstructured":"Jianzhou Zhao, Santosh Nagarakatte, and Milo M.K. Martin. Formalizing the LLVM intermediate representation for verified program transformations. The 39th annual ACM SIGPLAN-SIGACT Symposium on Principles[C]. University of Pennsylvania, 2012, Pages 427-440."},{"issue":"12","key":"e_1_3_2_1_10_1","first-page":"201","article-title":"Type-safe Runtime Code Generation: Accelerate to LLVM.ACM SIGPLAN Notices[C]","volume":"50","author":"McDonell Trevor L.","year":"2020","unstructured":"Trevor L. McDonell, Manuel M. T. Chakravarty, and Vinod Grover. Type-safe Runtime Code Generation: Accelerate to LLVM.ACM SIGPLAN Notices[C]. Utrecht University, 2020, 50(12):201-212.","journal-title":"Utrecht University"},{"key":"e_1_3_2_1_11_1","volume-title":"2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering, 2021","author":"Hongwei Zhou","year":"2020","unstructured":"Zhou Hongwei, Zhang Yuchen, Qie Guanlin Transform: Complicating Control Flow by Inserting Confusion Instructions[C]. 2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering, 2021, 20-22 November 2020."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/github.com\/llvm\/llvm-project\/releases","author":"LLVM","year":"2023","unstructured":"LLVM 16.0.6. (2023-6-14). https:\/\/github.com\/llvm\/llvm-project\/releases, 2023."},{"volume-title":"https:\/\/github.com\/llvm\/llvm-project\/releases\/tag\/llvmorg-17.0.3","year":"2023","key":"e_1_3_2_1_13_1","unstructured":"LLVM17.0.3. (2023-10-17). https:\/\/github.com\/llvm\/llvm-project\/releases\/tag\/llvmorg-17.0.3, 2023."},{"volume-title":"https:\/\/github.com\/alax-mx\/ollvm4.0","year":"2022","key":"e_1_3_2_1_14_1","unstructured":"ollvm4.0. (2022-4-27). https:\/\/github.com\/alax-mx\/ollvm4.0, 2022."},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE Security & Privacy","author":"Bakken D.E.","year":"2004","unstructured":"D.E. Bakken, R. Rarameswaran and R. Rarameswaran l. Data obfuscation: anonymity and desensitization of usable data sets.IEEE Security & Privacy[C]. IEEE Security & Privacy, 2004, Volume: 2, Issue: 6, Nov.-Dec."},{"key":"e_1_3_2_1_16_1","volume-title":"2010 International Conference on Broadband, Wireless Computing[C]. Communication and Applications","author":"You Ilsun","year":"2010","unstructured":"Ilsun You, Kangbin Yim Malware Obfuscation Techniques: A Brief Survey, 2010 International Conference on Broadband, Wireless Computing[C]. Communication and Applications. Korean Bible University, 2010, 04-06 November 2010."},{"key":"e_1_3_2_1_17_1","first-page":"72650","volume-title":"Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks","author":"KeySplitWatermark C. Iwendi","year":"2020","unstructured":"C. Iwendi \"KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks,\", 2020, vol. 8, pp. 72650-72660."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.07.007"},{"key":"e_1_3_2_1_19_1","volume-title":"Obfuscation Literature Survey[C].CS701 Construction of Compilers","author":"Balakrishnan Arini","year":"2005","unstructured":"Arini Balakrishnan and Chloe SchulzeCode. Obfuscation Literature Survey[C].CS701 Construction of Compilers, University of Wisconsin, 2005."},{"key":"e_1_3_2_1_20_1","volume-title":"Department of Engineering, 2015 Mobile Systems Technologies Workshop (MST)","author":"Canfora Gerardo","year":"2015","unstructured":"Gerardo Canfora, Andrea Di Sorbo and Francesco Mercald Obfuscation Techniques against Signature-Based Detection: a Case Study[C]. Department of Engineering, 2015 Mobile Systems Technologies Workshop (MST), University of Sannio, Benevento, Italy, 2015, 22-22 May 2015."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_2_1_22_1","volume-title":"A taxonomy of obfuscating transformations [J]. Department of Computer Science","author":"Collberg C.","year":"1997","unstructured":"C. Collberg, C. Thompson, and D. Low. A taxonomy of obfuscating transformations [J]. Department of Computer Science, The University of Auckland, 1997, 1173-3500."},{"issue":"6","key":"e_1_3_2_1_23_1","first-page":"1778","article-title":"Code obfuscation method based on instruction exchange [J]","volume":"30","author":"Yan Pan","year":"2019","unstructured":"Pan Yan, Zhu Yuefei, Lin Wei. Code obfuscation method based on instruction exchange [J]. Journal of Software, 2019, 30(6):1778-1792. (PAN Y, ZHU Y F, LIN W. Code obfuscation based on instructions swapping [J]. Journal of Software, 2019, 30(6):1778-1792. (PAN Y, ZHU Y F, LIN W. Code obfuscation based on instructions swapping [J]. Journal of Software, 2019, 30(6):1778-1792.)","journal-title":"Journal of Software"},{"volume-title":"d810 [EB\/OL]","year":"2021","key":"e_1_3_2_1_24_1","unstructured":"eShard. d810 [EB\/OL], 2021, https: \/\/gitlab. com\/shard\/d810."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Xinlei Yao Jianmin Pang Yichi Zhang A Method and Implementation of Control Flow Obfuscation Using SHE[C]. 2012 Fourth International Conference on Multimedia Information Networking and Security.National Digital Switching System Engineering and National Digital Switching System Engineering and Technological R&D Centre 2012.","DOI":"10.1109\/MINES.2012.25"},{"volume-title":"ECCWS 2019 18th European Conference on Cyber Warfare and Security ,2019","author":"Algawi A","key":"e_1_3_2_1_26_1","unstructured":"A Algawi, M Kiperberg, Roee Leon, Using hypervisors to overcome Structured Exception Handler attacks [J]. ECCWS 2019 18th European Conference on Cyber Warfare and Security ,2019."},{"key":"e_1_3_2_1_27_1","first-page":"3447","volume-title":"2008 Annual Computer Security Applications Conference (ACSAC). computer science and engineering from the Pennsylvania State University","author":"Wang Xinran","year":"2008","unstructured":"Xinran Wang, Yoon-Chan Jhi, Sencun Zhu STILL: Exploit Code Detection via Static Taint and Initialisation Analyses[C]. 2008 Annual Computer Security Applications Conference (ACSAC). computer science and engineering from the Pennsylvania State University, 2008, 978-0-7695-3447-3."},{"key":"e_1_3_2_1_28_1","volume-title":"Lucas Davi and Razvan Deaconescu XiOS: Extended Application Sandboxing on iOS[C].10th ACM Symposium on Information, Computer and Communications","author":"Bucicoiu Mihai","year":"2015","unstructured":"Mihai Bucicoiu, Lucas Davi and Razvan Deaconescu XiOS: Extended Application Sandboxing on iOS[C].10th ACM Symposium on Information, Computer and Communications. Security University POLITEHNICA of Bucharest, 2015, Pages 43-54."},{"key":"e_1_3_2_1_29_1","volume-title":"HALY: AUTOMATED EVALUATION OF HARDENING TECHNIQUES IN ANDROID AND IOS APPS[C]. EEMCS: Electrical Engineering, Mathematics, and Computer Science","author":"A.C.W.","year":"2023","unstructured":"Beijnum, A.C.W. HALY: AUTOMATED EVALUATION OF HARDENING TECHNIQUES IN ANDROID AND IOS APPS[C]. EEMCS: Electrical Engineering, Mathematics, and Computer Science, 2023."},{"key":"e_1_3_2_1_30_1","volume-title":"2008 International Symposium on Computer Science and Computational Technology. Beijing University of Posts and Telecommunications, 2008","author":"Qin Jiancheng","year":"2008","unstructured":"Jiancheng Qin, Zhongying Bai, and Yuan Bairandom Polymorphic Algorithm of JavaScript Code Protection[C]. 2008 International Symposium on Computer Science and Computational Technology. Beijing University of Posts and Telecommunications, 2008, 10.1109\/ISCSCT.2008.48."},{"key":"e_1_3_2_1_31_1","volume-title":"Monirul Sharif and Roberto Perdisci Polymorphic Blending Attacks","author":"Fogla Prahlad","year":"2006","unstructured":"Prahlad Fogla, Monirul Sharif and Roberto Perdisci Polymorphic Blending Attacks, College of Computing, USENIX Association[C]. Georgia Institute of Technology, 2006, 241-256."},{"key":"e_1_3_2_1_32_1","volume-title":"Security And Privacy In Computing And Communications","author":"Zobernig Lukas","year":"2019","unstructured":"Lukas Zobernig, Steven D. Galbraith and Giovanni Russello When are Opaque Predicates Useful? [C].2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. University of Auckland, Auckland, 2019, 10.1109\/TrustCom\/BigDataSE.2019.00031."},{"volume-title":"Proceedings of the 29th Australasian Computer Science, Department of Computer Science The University of Auckland, 2006, Conference-Volume 48 (pp. . 187-196)","author":"Majumdar Anirban","key":"e_1_3_2_1_33_1","unstructured":"Anirban Majumdar and Clark Thomborson, Manufacturing Opaque Predicates in Distributed Systems for Code Obfuscation[J]. In Proceedings of the 29th Australasian Computer Science, Department of Computer Science The University of Auckland, 2006, Conference-Volume 48 (pp. . 187-196)."},{"key":"e_1_3_2_1_34_1","volume-title":"Attack and Defence in Obfuscated Binary Code[J]","author":"Opaque Predicate Xu D.","year":"2018","unstructured":"Xu D. Opaque Predicate: Attack and Defence in Obfuscated Binary Code[J], 2018."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Joonhyung Hwang and Taisook Han. Identifying Input-Dependent Jumps from Obfuscated Execution using Dynamic Data Flow Graphs[J]. the 8th Software Security Protection and Reverse Engineering Workshop. Korea Advanced I stitute of Science and Technology 2018 Article No. 3Pages 1-12.","DOI":"10.1145\/3289239.3291460"},{"key":"e_1_3_2_1_36_1","volume-title":"The 22nd ACM Conference on Computer and Communications Security, The Association for Computing Machinery","author":"Yadegari Babak","year":"2015","unstructured":"Babak Yadegari and Saumya Debray, Symbolic Execution of Obfuscated Code[C]. The 22nd ACM Conference on Computer and Communications Security, The Association for Computing Machinery, 2015, October 12 - 16."},{"key":"e_1_3_2_1_37_1","volume-title":"2011 IEEE International Workshop on Information Forensics and Security, School of Computer Engineering","author":"Balachandran Vivek","year":"2012","unstructured":"Vivek Balachandran and Sabu Emmanuel, Software code obfuscation by hiding control flow information in stack[C], 2011 IEEE International Workshop on Information Forensics and Security, School of Computer Engineering, Nanyang Technological University, 2012, 10.1109\/WIFS.2011.6123121."},{"key":"e_1_3_2_1_38_1","volume-title":"Code obfuscation against symbolic execution attacks [C] \/\/ Proceedings of the 32nd Annual Conference on Computer Security Applications. new York: ACM","author":"BANESCU S, COLLBERG C S, GANESH","year":"2016","unstructured":"BANESCU S, COLLBERG C S, GANESH V, Code obfuscation against symbolic execution attacks [C] \/\/ Proceedings of the 32nd Annual Conference on Computer Security Applications. new York: ACM, 2016, 189-200."},{"issue":"5","key":"e_1_3_2_1_39_1","first-page":"358","article-title":"Fraser , Code compression [J], ACM SIGPLAN Notices, University of Arizona","volume":"32","author":"Ernst Jens","year":"1997","unstructured":"Jens Ernst, William Evans and Christopher W. Fraser , Code compression [J], ACM SIGPLAN Notices, University of Arizona, Dept of Computer Science, 1997, Volume 32Issue 5, pp 358-365.","journal-title":"Dept of Computer Science"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/543552.512542"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-2171.2012.00180.x"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094517"},{"key":"e_1_3_2_1_43_1","volume-title":"The state machine approach: a tutorial[J]. Fault-tolerant distributed computing","author":"Schneider F","year":"2005","unstructured":"Schneider F B. The state machine approach: a tutorial[J]. Fault-tolerant distributed computing, 2005, 18-41."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.533956"},{"key":"e_1_3_2_1_45_1","first-page":"80","volume-title":"IEEE","author":"Reilly","year":"2021","unstructured":"Reilly D, Fan L. A comparative evaluation of differentially private image obfuscation[C]\/\/2021 Third IEEE International Conference on Trust, Privacy, and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 2021, 80-89."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz033"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.11.005"}],"event":{"name":"BDEIM 2023: 2023 4th International Conference on Big Data Economy and Information Management","acronym":"BDEIM 2023","location":"Zhengzhou China"},"container-title":["Proceedings of the 2023 4th International Conference on Big Data Economy and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3659211.3659272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3659211.3659272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:02:37Z","timestamp":1755860557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3659211.3659272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,8]]},"references-count":47,"alternative-id":["10.1145\/3659211.3659272","10.1145\/3659211"],"URL":"https:\/\/doi.org\/10.1145\/3659211.3659272","relation":{},"subject":[],"published":{"date-parts":[[2023,12,8]]},"assertion":[{"value":"2024-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}