{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T06:41:25Z","timestamp":1767076885917,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministero dell'Universit\u00e0 e della Ricerca","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733817.3762702","type":"proceedings-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:47:28Z","timestamp":1766594848000},"page":"29-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessing the Effectiveness of the Tigress Obfuscator Against MOPSA and BinaryNinja"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6422-6986","authenticated-orcid":false,"given":"Nicol\u00f2","family":"Altamura","sequence":"first","affiliation":[{"name":"University of Verona, Verona, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2107-1040","authenticated-orcid":false,"given":"Enrico","family":"Bragastini","sequence":"additional","affiliation":[{"name":"University of Verona, Verona, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1099-3494","authenticated-orcid":false,"given":"Marco","family":"Campion","sequence":"additional","affiliation":[{"name":"INRIA &amp; ENS Paris | Universit\u00e9 PSL, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2761-4347","authenticated-orcid":false,"given":"Mila","family":"Dalla Preda","sequence":"additional","affiliation":[{"name":"University of Verona, Verona, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Mohsen Ahmadvand Alexander Pretschner and Florian Kelbert. 2019. Chapter Eight - A Taxonomy of Software Integrity Protection Techniques. Adv. Comput. 112 (2019) 413\u2013486. 10.1016\/BS.ADCOM.2017.12.007","DOI":"10.1016\/BS.ADCOM.2017.12.007"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2995306.2995310"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Marco Campion Mila Dalla Preda and Roberto Giacobazzi. 2022. Partial (In)Completeness in abstract interpretation: limiting the imprecision in program analysis. Proc. ACM Program. Lang. 6 POPL (2022) 1\u201331. 10.1145\/3498721","DOI":"10.1145\/3498721"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-44245-2_7"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1999.777758"},{"key":"e_1_3_3_2_7_2","volume-title":"Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection","author":"Collberg Christian","year":"2009","unstructured":"Christian Collberg and Jasvir Nagra. 2009. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison Wesley Professional."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Graeme Gange Jorge\u00a0A. Navas Peter Schachte Harald S\u00f8ndergaard and Peter\u00a0J. Stuckey. 2014. Interval Analysis and Machine Arithmetic: Why Signedness Ignorance Is Bliss. ACM Trans. Program. Lang. Syst. 37 1 (2014) 1:1\u20131:35. 10.1145\/2651360","DOI":"10.1145\/2651360"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_52"},{"key":"e_1_3_3_2_12_2","volume-title":"Hacker\u2019s Delight, Second Edition","author":"Jr. Henry S.\u00a0Warren","year":"2013","unstructured":"Henry S.\u00a0Warren Jr.2013. Hacker\u2019s Delight, Second Edition. Pearson Education. http:\/\/www.hackersdelight.org\/"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Antoine Min\u00e9. 2017. Tutorial on Static Inference of Numeric Invariants by Abstract Interpretation. Foundations and Trends in Programming Languages 4 3-4 (2017) 120\u2013372. 10.1561\/2500000034","DOI":"10.1561\/2500000034"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30820-8_37"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.21"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Ronald\u00a0L Rivest. 2001. Permutation polynomials modulo 2w. Finite fields and their applications 7 2 (2001) 287\u2013292. 10.1006\/ffta.2000.0282","DOI":"10.1006\/ffta.2000.0282"},{"key":"e_1_3_3_2_18_2","first-page":"3055","volume-title":"31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022","author":"Schloegel Moritz","year":"2022","unstructured":"Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, and Ali Abbasi. 2022. Loki: Hardening Code Obfuscation Against Automated Attacks. In 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, Kevin R.\u00a0B. Butler and Kurt Thomas (Eds.). USENIX Association, 3055\u20133073. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/schloegel"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Sebastian Schrittwieser Stefan Katzenbeisser Johannes Kinder Georg Merzdovnik and Edgar\u00a0R. Weippl. 2016. Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Comput. Surv. 49 1 (2016) 4:1\u20134:37. 10.1145\/2886012","DOI":"10.1145\/2886012"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Bjorn\u00a0De Sutter. 2025. A New Framework of Software Obfuscation Evaluation Criteria. arxiv:https:\/\/arXiv.org\/abs\/2502.14093\u00a0[cs.SE] https:\/\/arxiv.org\/abs\/2502.14093","DOI":"10.2139\/ssrn.5147457"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","unstructured":"Bjorn\u00a0De Sutter Christian\u00a0S. Collberg Mila Dalla Preda and Brecht Wyseur. 2019. Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331). Dagstuhl Reports 9 8 (2019) 1\u201325. 10.4230\/DagRep.9.8.1","DOI":"10.4230\/DagRep.9.8.1"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"Bjorn\u00a0De Sutter Sebastian Schrittwieser Bart Coppens and Patrick Kochberger. 2025. Evaluation Methodologies in Software Protection Research. ACM Comput. Surv. 57 4 (2025) 86:1\u201386:41. 10.1145\/3702314","DOI":"10.1145\/3702314"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884620"},{"key":"e_1_3_3_2_24_2","unstructured":"Tigress. [n. d.]. The Tigress C Obfuscator \u2014 tigress.wtf. https:\/\/tigress.wtf."},{"key":"e_1_3_3_2_25_2","unstructured":"Vector35. [n. d.]. Binary Ninja \u2014 binary.ninja. https:\/\/binary.ninja."},{"key":"e_1_3_3_2_26_2","unstructured":"Chenxi Wang. 2001. A security architecture for survivability mechanisms. Ph.\u00a0D. Dissertation. University of Virginia."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.21236\/ada592678"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77535-5_5"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/1173462818"}],"event":{"name":"CheckMATE '25: Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CheckMATE '25"},"container-title":["Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733817.3762702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T06:37:13Z","timestamp":1767076633000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733817.3762702"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":28,"alternative-id":["10.1145\/3733817.3762702","10.1145\/3733817"],"URL":"https:\/\/doi.org\/10.1145\/3733817.3762702","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-12-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}