{"id":"https://openalex.org/W3128730542","doi":"https://doi.org/10.1007/978-3-030-68884-4_6","title":"BinSEAL: Linux Binary Obfuscation Against Symbolic Execution","display_name":"BinSEAL: Linux Binary Obfuscation Against Symbolic Execution","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3128730542","doi":"https://doi.org/10.1007/978-3-030-68884-4_6","mag":"3128730542"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-68884-4_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-68884-4_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000485629","display_name":"Ruizhe Qin","orcid":null},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruizhe Qin","raw_affiliation_strings":["Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, 211106, China","College of Computer Sciences and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, 211106, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Sciences and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101682487","display_name":"Hao Han","orcid":"https://orcid.org/0000-0002-7912-027X"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Han","raw_affiliation_strings":["Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, 211106, China","College of Computer Sciences and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, 211106, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Sciences and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000485629"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03422619,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"65","last_page":"76"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9434820413589478},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8659457564353943},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.7867135405540466},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.7120352983474731},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.6253587603569031},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5261910557746887},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.46887922286987305},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.415809690952301},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.38706162571907043},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3445115089416504},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32190409302711487}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9434820413589478},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8659457564353943},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.7867135405540466},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.7120352983474731},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.6253587603569031},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5261910557746887},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.46887922286987305},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.415809690952301},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.38706162571907043},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3445115089416504},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32190409302711487}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-68884-4_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-68884-4_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1551162551","https://openalex.org/W1558430956","https://openalex.org/W1567046609","https://openalex.org/W1798077826","https://openalex.org/W2008453980","https://openalex.org/W2517358422","https://openalex.org/W2537421194","https://openalex.org/W2799754168","https://openalex.org/W2884512978","https://openalex.org/W2982588003","https://openalex.org/W2985391551","https://openalex.org/W2995488812","https://openalex.org/W3042939035"],"related_works":["https://openalex.org/W2913519194","https://openalex.org/W2007287520","https://openalex.org/W4213243744","https://openalex.org/W4362634109","https://openalex.org/W2055981842","https://openalex.org/W4388820743","https://openalex.org/W2793135307","https://openalex.org/W3134235726","https://openalex.org/W2906395579","https://openalex.org/W128871440"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
