{"id":"https://openalex.org/W4385532509","doi":"https://doi.org/10.1109/sera57763.2023.10197775","title":"Identifying Code Tampering Using A Bytecode Comparison Analysis Tool","display_name":"Identifying Code Tampering Using A Bytecode Comparison Analysis Tool","publication_year":2023,"publication_date":"2023-05-23","ids":{"openalex":"https://openalex.org/W4385532509","doi":"https://doi.org/10.1109/sera57763.2023.10197775"},"language":"en","primary_location":{"id":"doi:10.1109/sera57763.2023.10197775","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/sera57763.2023.10197775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100389578","display_name":"Young Lee","orcid":"https://orcid.org/0000-0003-0126-3112"},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Young Lee","raw_affiliation_strings":["Texas A&amp;M University-San Antonio,Dept. of Computing and Cyber Security,San Antonio,TX,USA","Dept. of Computing and Cyber Security, Texas A&M University-San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University-San Antonio,Dept. of Computing and Cyber Security,San Antonio,TX,USA","institution_ids":["https://openalex.org/I1335518801"]},{"raw_affiliation_string":"Dept. of Computing and Cyber Security, Texas A&M University-San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I1335518801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088090349","display_name":"Arlen P. McDonald","orcid":null},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arlen McDonald","raw_affiliation_strings":["Texas A&amp;M University-San Antonio,Dept. of Computing and Cyber Security,San Antonio,TX,USA","Dept. of Computing and Cyber Security, Texas A&M University-San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University-San Antonio,Dept. of Computing and Cyber Security,San Antonio,TX,USA","institution_ids":["https://openalex.org/I1335518801"]},{"raw_affiliation_string":"Dept. of Computing and Cyber Security, Texas A&M University-San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I1335518801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005953559","display_name":"Jeong Yang","orcid":"https://orcid.org/0000-0002-3819-3544"},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeong Yang","raw_affiliation_strings":["Texas A&amp;M University-San Antonio,Dept. of Computing and Cyber Security,San Antonio,TX,USA","Dept. of Computing and Cyber Security, Texas A&M University-San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Texas A&amp;M University-San Antonio,Dept. of Computing and Cyber Security,San Antonio,TX,USA","institution_ids":["https://openalex.org/I1335518801"]},{"raw_affiliation_string":"Dept. of Computing and Cyber Security, Texas A&M University-San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I1335518801"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100389578"],"corresponding_institution_ids":["https://openalex.org/I1335518801"],"apc_list":null,"apc_paid":null,"fwci":0.2033,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.42980535,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.9349364042282104},{"id":"https://openalex.org/keywords/variable","display_name":"Variable (mathematics)","score":0.8042697906494141},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7576742172241211},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.7046293616294861},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5830644965171814},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.5758069753646851},{"id":"https://openalex.org/keywords/java-bytecode","display_name":"Java bytecode","score":0.5612251162528992},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5103995203971863},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.46922311186790466},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4631222188472748},{"id":"https://openalex.org/keywords/variables","display_name":"Variables","score":0.4473407566547394},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3721245527267456},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.32185599207878113},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.19442442059516907},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.1120460033416748},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10689437389373779},{"id":"https://openalex.org/keywords/java-applet","display_name":"Java applet","score":0.09106001257896423}],"concepts":[{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.9349364042282104},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.8042697906494141},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7576742172241211},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.7046293616294861},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5830644965171814},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.5758069753646851},{"id":"https://openalex.org/C2777472213","wikidata":"https://www.wikidata.org/wiki/Q137496","display_name":"Java bytecode","level":5,"score":0.5612251162528992},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5103995203971863},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.46922311186790466},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4631222188472748},{"id":"https://openalex.org/C27574286","wikidata":"https://www.wikidata.org/wiki/Q320723","display_name":"Variables","level":2,"score":0.4473407566547394},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3721245527267456},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.32185599207878113},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.19442442059516907},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.1120460033416748},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10689437389373779},{"id":"https://openalex.org/C15524039","wikidata":"https://www.wikidata.org/wiki/Q865817","display_name":"Java applet","level":3,"score":0.09106001257896423},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C168702491","wikidata":"https://www.wikidata.org/wiki/Q567345","display_name":"Java annotation","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sera57763.2023.10197775","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/sera57763.2023.10197775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2248229973","https://openalex.org/W2765813656","https://openalex.org/W2945001297","https://openalex.org/W2955183140","https://openalex.org/W2967772953","https://openalex.org/W4206466268"],"related_works":["https://openalex.org/W1509153591","https://openalex.org/W2027642766","https://openalex.org/W20625830","https://openalex.org/W2130413583","https://openalex.org/W2537112085","https://openalex.org/W2884975599","https://openalex.org/W1536265389","https://openalex.org/W2160283408","https://openalex.org/W2170708539","https://openalex.org/W2406445318"],"abstract_inverted_index":{"The":[0,26,69,88,132,165],"issues":[1],"related":[2],"to":[3,32,34,48,79,128,171,178,195],"SolarWinds":[4],"attacks":[5],"point":[6],"out":[7],"a":[8,42,59,64,107,123],"large":[9],"concern":[10],"with":[11,22,56,63,106],"modern":[12],"software":[13],"development":[14],"projects":[15],"in":[16,84,99,145,199],"that":[17,66,91,109],"there":[18],"are":[19],"fundamental":[20],"flaws":[21],"existing":[23],"security":[24],"infrastructure.":[25],"purpose":[27],"of":[28,94,150],"this":[29],"research":[30],"is":[31,67,97,144,168,189,204],"investigate":[33],"what":[35],"extent":[36],"can":[37,183],"the":[38,81,92,95,101,136,142,146,151,156,162,172,179,185],"SootDiff":[39],"analysis":[40,186],"tool,":[41,45],"bytecode":[43],"comparison":[44],"be":[46],"used":[47],"determine":[49],"if":[50,202],"an":[51],"application":[52],"has":[53],"been":[54],"tampered":[55],"by":[57],"comparing":[58],"known":[60],"good":[61],"version":[62,65],"unknown.":[68],"compiled":[70],"and":[71,135,174],"decompiled":[72],"bytecodes":[73],"as":[74,159],"Jimple":[75],"representations":[76],"were":[77],"compared":[78],"analyze":[80],"unique":[82],"differences":[83],"identifying":[85,192],"code":[86,200],"tempering.":[87],"results":[89],"showed":[90],"scope":[93,108],"variable":[96,134,138,167],"important":[98],"whether":[100],"change":[102],"was":[103,110],"detected.":[104],"Variables":[105],"entirely":[111],"contained":[112],"within":[113],"one":[114],"method":[115,152,173],"could":[116,130],"have":[117],"their":[118],"names":[119],"changed":[120],"without":[121],"triggering":[122],"warning,":[124],"but":[125],"global":[126,163],"variables":[127],"objects":[129],"not.":[131],"parameter":[133,143],"local":[137,166],"behave":[139],"differently.":[140],"Since":[141],"publicly":[147],"available":[148,177],"part":[149],"Java":[153],"treats":[154],"it":[155,160,203],"same":[157],"way":[158],"does":[161],"variable.":[164],"strictly":[169],"private":[170],"not":[175],"made":[176],"outside.":[180],"Such":[181],"findings":[182],"support":[184],"tool":[187],"which":[188],"useful":[190],"for":[191],"potential":[193],"breaches":[194],"detect":[196],"meaningful":[197],"changes":[198],"even":[201],"decompiled.":[205]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
