{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:40:05Z","timestamp":1763343605266,"version":"3.45.0"},"reference-count":35,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062743","type":"journal-article","created":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T06:01:25Z","timestamp":1747116085000},"page":"1545-1565","source":"Crossref","is-referenced-by-count":0,"title":["Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution"],"prefix":"10.32604","volume":"84","author":[{"given":"Yan","family":"Cao","sequence":"first","affiliation":[]},{"given":"Zhizhuang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zhuang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"713","author":"Collberg","year":"2010","journal-title":"Addison-Wesley software security series"},{"key":"ref2","unstructured":"Collberg C, Thomborson C, Low D. A taxonomy of obfuscating transformations. Auckland, New Zealand: The University of Auckland; 1997. Technical Report No: 148."},{"key":"ref3","series-title":"Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES \u201921)","first-page":"75","article-title":"Data hiding using code obfuscation","author":"Rajba","year":"2021 Aug 17\u201320"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1145\/1081706.1081750","author":"Sen","year":"2005 Sep 5\u20139; Lisbon, Portugal","journal-title":"Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/2408776.2408795","article-title":"Symbolic execution for software testing: three decades later","volume":"56","author":"Cadar","year":"2013","journal-title":"Commun ACM"},{"key":"ref6","series-title":"2010 IEEE Symposium on Security and Privacy (SP)","first-page":"317","article-title":"All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)","author":"Schwartz","year":"2010 May 16\u201319"},{"key":"ref7","first-page":"4","article-title":"Protecting software through obfuscation: can it keep pace with progress in code analysis?","volume":"49","author":"Schrittwieser","year":"2016","journal-title":"ACM Comput Surv"},{"key":"ref8","series-title":"Proceedings of the 1st International Workshop on Software Protection (SPRO-15)","first-page":"3","article-title":"Obfuscator-LLVM: software protection for the masses","author":"Junod","year":"2015 May 16\u201324"},{"key":"ref9","series-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation","first-page":"209","article-title":"KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs","author":"Cadar","year":"2008 Dec 8\u201310"},{"key":"ref10","series-title":"2016 IEEE Symposium on Security and Privacy (SP)","first-page":"138","article-title":"SOK: (State of) the art of war: offensive techniques in binary analysis","author":"Shoshitaishvili","year":"2016 May 22\u201326"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/360248.360252","article-title":"Symbolic execution and program testing","volume":"19","author":"King","year":"1976","journal-title":"Commun ACM"},{"key":"ref12","series-title":"2017 IEEE Symposium on Security and Privacy (SP)","first-page":"633","article-title":"Backward-Bounded DSE: targeting infeasibility questions on obfuscated codes","author":"Bardin","year":"2017 May 22\u201326"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/2093548.2093564","article-title":"SAGE: whitebox fuzzing for security testing","volume":"55","author":"Godefroid","year":"2012","journal-title":"Commun ACM"},{"key":"ref14","series-title":"International Symposium on Software Testing and Analysis (ISSTA 2016)","first-page":"36","article-title":"Specification of concretization and symbolization policies in symbolic execution","author":"David","year":"2016 Jul 18\u201320"},{"key":"ref15","series-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security","article-title":"EXE: automatically generating inputs of death","author":"Cadar","year":"2006 Oct 30\u2013Nov 3"},{"key":"ref16","series-title":"Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation","first-page":"213","article-title":"DART: directed automated random testing","author":"Godefroid","year":"2005 Jun 12\u201315"},{"key":"ref17","series-title":"2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","first-page":"181","article-title":"Concolic execution on small-size binaries: challenges and empirical study","author":"Xu","year":"2017 Jun 26\u201329"},{"key":"ref18","series-title":"The 32nd Annual Conference on Computer Security Applications (ACSAC 2016)","first-page":"189","article-title":"Code obfuscation against symbolic execution attacks","author":"Banescu","year":"2016 Dec 5\u20138"},{"key":"ref19","series-title":"International Conference on Computer Aided Verification","first-page":"519","article-title":"A decision procedure for bit-vectors and arrays","author":"Ganesh","year":"2007 Jul 3\u20137"},{"key":"ref20","series-title":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems","first-page":"337","article-title":"Z3: an efficient smt solver","author":"De Moura","year":"2008 Mar 29\u2013Apr 6"},{"key":"ref21","series-title":"The 18th Conference on Computer and Communications Security (CCS)","first-page":"275","article-title":"Deobfuscation of virtualization obfuscated software: a semantics-based approach","author":"Coogan","year":"2011 Oct 17\u201321"},{"key":"ref22","series-title":"5th Conference on Detection of Intrusions and malware & Vulnerability Assessment (DIMVA)","first-page":"372","article-title":"Symbolic deobfuscation: from virtualized code back to the original","author":"Salwan","year":"2018 Jun 28\u201329"},{"key":"ref23","series-title":"2015 Symposium on Security and Privacy (SP)","first-page":"674","article-title":"A generic approach to automatic deobfuscation of executable code","author":"Yadegari","year":"2015 May 17\u201321"},{"key":"ref24","series-title":"Information Security Applications (WISA 2007)","first-page":"61","article-title":"Information hiding in software with mixed boolean-arithmetic transforms","author":"Zhou","year":"2007 Aug 27\u201329"},{"key":"ref25","series-title":"Network and Distributed System Security Symposium (NDSS 2008)","article-title":"Impeding malware analysis using conditional code obfuscation","author":"Sharif","year":"2008 Feb 10\u201313"},{"key":"ref26","unstructured":"Tigress. The tigress diversifying C Obfuscator [Internet]. [cited 2024 Jan 1]. Available from: https:\/\/tigress.wtf\/."},{"key":"ref27","series-title":"Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC\u2019 19); 2019 Dec","first-page":"177","article-title":"How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)","author":"Ollivier","year":"2019"},{"key":"ref28","unstructured":"Dinu D. ObfuscatorDynamic-LLVM: dynamic symbolic execution attack protections for the masses [dissertation]. Philadelphia, PA, USA: Drexel University; 2023."},{"key":"ref29","series-title":"2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","first-page":"666","article-title":"Manufacturing resilient Bi-Opaque predicates against symbolic execution","author":"Xu","year":"2018 Jun 25\u201328"},{"key":"ref30","volume":"526","author":"Hirano","year":"2022","journal-title":"Advances in network-based information systems (NBiS 2022). Lecture notes in networks and systems"},{"key":"ref31","series-title":"Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW)","first-page":"1","article-title":"ROPfuscator: robust obfuscation with ROP","author":"De Pasquale","year":"2023 May 22\u201325"},{"key":"ref32","unstructured":"Bluesadi. DeBogus: automated Deobfuscation Tool [Internet]. [cited 2024 Jan 1]. Available from: https:\/\/github.com\/bluesadi\/debogus."},{"key":"ref33","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s10660-006-6955-z","article-title":"Software watermarking via opaque predicates: implementation, analysis, and attacks","volume":"6","author":"Myles","year":"2006","journal-title":"Electron Commer Res"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11416-008-0084-2","article-title":"Code obfuscation techniques for metamorphic viruses","volume":"4","author":"Borello","year":"2008","journal-title":"J Comput Virol"},{"key":"ref35","unstructured":"Google. CityHash: fast hash functions for strings [Internet]. [cited 2024 Jan 1]. Available from: https:\/\/github.com\/google\/cityhash."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_62743\/TSP_CMC_62743.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:35:30Z","timestamp":1763343330000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062743","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}