{"id":"https://openalex.org/W4401415363","doi":"https://doi.org/10.1109/cec60901.2024.10612116","title":"Two-Level Software Obfuscation with Cooperative Co-Evolutionary Algorithms","display_name":"Two-Level Software Obfuscation with Cooperative Co-Evolutionary Algorithms","publication_year":2024,"publication_date":"2024-06-30","ids":{"openalex":"https://openalex.org/W4401415363","doi":"https://doi.org/10.1109/cec60901.2024.10612116"},"language":"en","primary_location":{"id":"doi:10.1109/cec60901.2024.10612116","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cec60901.2024.10612116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Congress on Evolutionary Computation (CEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012267701","display_name":"Jos\u00e9 Miguel Arag\u00f3n-Jurado","orcid":"https://orcid.org/0000-0002-9835-8793"},"institutions":[{"id":"https://openalex.org/I39147953","display_name":"Universidad de C\u00e1diz","ror":"https://ror.org/04mxxkb11","country_code":"ES","type":"education","lineage":["https://openalex.org/I39147953"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Jos\u00e9 Miguel Arag\u00f3n-Jurado","raw_affiliation_strings":["Higher School of Engineering, University of Cadiz,Cadiz,Spain"],"affiliations":[{"raw_affiliation_string":"Higher School of Engineering, University of Cadiz,Cadiz,Spain","institution_ids":["https://openalex.org/I39147953"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106364768","display_name":"Javier Jare\u00f3o","orcid":null},"institutions":[{"id":"https://openalex.org/I39147953","display_name":"Universidad de C\u00e1diz","ror":"https://ror.org/04mxxkb11","country_code":"ES","type":"education","lineage":["https://openalex.org/I39147953"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Javier Jare\u00f3o","raw_affiliation_strings":["Higher School of Engineering, University of Cadiz,Cadiz,Spain"],"affiliations":[{"raw_affiliation_string":"Higher School of Engineering, University of Cadiz,Cadiz,Spain","institution_ids":["https://openalex.org/I39147953"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102666726","display_name":"Juan Carlos de la Torre","orcid":null},"institutions":[{"id":"https://openalex.org/I39147953","display_name":"Universidad de C\u00e1diz","ror":"https://ror.org/04mxxkb11","country_code":"ES","type":"education","lineage":["https://openalex.org/I39147953"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Juan Carlos De la Torre","raw_affiliation_strings":["Higher School of Engineering, University of Cadiz,Cadiz,Spain"],"affiliations":[{"raw_affiliation_string":"Higher School of Engineering, University of Cadiz,Cadiz,Spain","institution_ids":["https://openalex.org/I39147953"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000488528","display_name":"Patricia Ruiz","orcid":"https://orcid.org/0000-0001-5891-0646"},"institutions":[{"id":"https://openalex.org/I39147953","display_name":"Universidad de C\u00e1diz","ror":"https://ror.org/04mxxkb11","country_code":"ES","type":"education","lineage":["https://openalex.org/I39147953"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Patricia Ruiz","raw_affiliation_strings":["Higher School of Engineering, University of Cadiz,Cadiz,Spain"],"affiliations":[{"raw_affiliation_string":"Higher School of Engineering, University of Cadiz,Cadiz,Spain","institution_ids":["https://openalex.org/I39147953"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061059522","display_name":"Bernab\u00e8 Dorronsoro","orcid":"https://orcid.org/0000-0003-0481-790X"},"institutions":[{"id":"https://openalex.org/I39147953","display_name":"Universidad de C\u00e1diz","ror":"https://ror.org/04mxxkb11","country_code":"ES","type":"education","lineage":["https://openalex.org/I39147953"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Bernab\u00e9 Dorronsoro","raw_affiliation_strings":["Higher School of Engineering, University of Cadiz,Cadiz,Spain"],"affiliations":[{"raw_affiliation_string":"Higher School of Engineering, University of Cadiz,Cadiz,Spain","institution_ids":["https://openalex.org/I39147953"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012267701"],"corresponding_institution_ids":["https://openalex.org/I39147953"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13791627,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7448336482048035},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7260276079177856},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46991339325904846},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3399786949157715},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12388187646865845},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09497100114822388}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7448336482048035},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7260276079177856},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46991339325904846},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3399786949157715},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12388187646865845},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09497100114822388}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cec60901.2024.10612116","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cec60901.2024.10612116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Congress on Evolutionary Computation (CEC)","raw_type":"proceedings-article"},{"id":"pmh:oai:rodin.uca.es:10498/33198","is_oa":false,"landing_page_url":"http://hdl.handle.net/10498/33198","pdf_url":null,"source":{"id":"https://openalex.org/S4306400505","display_name":"RODIN (Universidad de C\u00e1diz)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39147953","host_organization_name":"Universidad de C\u00e1diz","host_organization_lineage":["https://openalex.org/I39147953"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Congress on Evolutionary Computation (CEC) 30 June 2024 - 05 July 2024","raw_type":"VoR"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W130272139","https://openalex.org/W182825117","https://openalex.org/W1432164059","https://openalex.org/W1527341092","https://openalex.org/W1555689267","https://openalex.org/W1562133729","https://openalex.org/W1567046609","https://openalex.org/W1793588810","https://openalex.org/W1798077826","https://openalex.org/W1964962870","https://openalex.org/W1979852787","https://openalex.org/W2056878746","https://openalex.org/W2069744690","https://openalex.org/W2093610458","https://openalex.org/W2123834080","https://openalex.org/W2166462894","https://openalex.org/W2175884749","https://openalex.org/W2476300929","https://openalex.org/W2509162308","https://openalex.org/W2751901133","https://openalex.org/W2806540472","https://openalex.org/W2868191876","https://openalex.org/W2888651064","https://openalex.org/W2983318410","https://openalex.org/W2985391551","https://openalex.org/W2987597555","https://openalex.org/W3023495226","https://openalex.org/W4247464060","https://openalex.org/W4308327109","https://openalex.org/W4308469411","https://openalex.org/W4385052629","https://openalex.org/W4390754876","https://openalex.org/W4397007363","https://openalex.org/W6602699596","https://openalex.org/W6634033044","https://openalex.org/W6643217563","https://openalex.org/W6718955358","https://openalex.org/W6728480119","https://openalex.org/W6760268385"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4224216661","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W1819617256","https://openalex.org/W4308699695"],"abstract_inverted_index":{"Computing":[0],"devices":[1],"are":[2,31,75,171,204],"ubiquitous":[3],"nowadays":[4],"and":[5,28,42],"because":[6],"of":[7,10,16,45,103,107,129],"the":[8,14,43,60,104,108,180,188,200],"rise":[9],"new":[11],"paradigms":[12],"as":[13,138,140,173,205,207],"Internet":[15],"Things,":[17],"their":[18,35],"presence":[19],"is":[20,25,49,66,87,151],"continuously":[21],"growing.":[22],"Software":[23],"(SW)":[24],"highly":[26],"exposed,":[27],"SW":[29,165],"companies":[30],"forced":[32],"to":[33,39,53,69,193,197],"protect":[34,54],"products":[36],"from":[37,145,199],"attacks":[38],"prevent":[40],"plagiarism":[41],"detection":[44],"security":[46],"flaws.":[47],"Obfuscation":[48],"a":[50,88,116,122,154,161],"widespread":[51],"technique":[52],"SW.":[55,110],"It":[56],"consists":[57],"in":[58],"making":[59],"code":[61],"unintelligible,":[62],"so":[63],"that":[64,96,126,179],"it":[65,72],"very":[67],"hard":[68],"learn":[70],"how":[71],"works.":[73],"There":[74],"numerous":[76],"obfuscation":[77,94,124,131,169,185],"techniques,":[78],"but":[79],"they":[80],"often":[81],"require":[82],"expert":[83],"hands.":[84],"Therefore,":[85],"there":[86],"clear":[89],"need":[90],"for":[91,121,163],"fully":[92],"automatic":[93,164],"tools":[95],"can":[97],"offer":[98],"high":[99],"quality":[100],"outputs":[101],"independently":[102],"specific":[105],"features":[106],"considered":[109,172],"In":[111],"this":[112],"work,":[113],"we":[114],"define":[115],"novel":[117],"combinatorial":[118],"optimization":[119,142],"problem":[120,150],"two-level":[123],"method":[125],"makes":[127],"use":[128],"typical":[130],"transformations,":[132],"those":[133,144],"provided":[134],"by":[135,191],"Tigress":[136],"framework,":[137],"well":[139],"classical":[141],"ones,":[143],"LLVM":[146],"compilation":[147],"framework.":[148],"The":[149,176],"solved":[152],"with":[153],"cooperative":[155],"co-evolutionary":[156],"cellular":[157],"genetic":[158],"algorithm,":[159],"providing":[160],"tool":[162],"obfuscation.":[166],"Three":[167],"different":[168],"metrics":[170],"fitness":[174],"function.":[175],"results":[177,203],"show":[178],"proposed":[181],"methodology":[182],"offers":[183],"outstanding":[184],"results,":[186],"outperforming":[187],"original":[189],"programs":[190],"up":[192],"6,152,547%.":[194],"Moreover,":[195],"compared":[196],"approaches":[198],"literature,":[201],"these":[202],"much":[206],"405":[208],"times":[209],"better.":[210]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
