{"id":"https://openalex.org/W2614917062","doi":"https://doi.org/10.1109/uic-atc.2017.8397540","title":"Exploit dynamic data flows to protect software against semantic attacks","display_name":"Exploit dynamic data flows to protect software against semantic attacks","publication_year":2017,"publication_date":"2017-08-01","ids":{"openalex":"https://openalex.org/W2614917062","doi":"https://doi.org/10.1109/uic-atc.2017.8397540","mag":"2614917062"},"language":"en","primary_location":{"id":"doi:10.1109/uic-atc.2017.8397540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uic-atc.2017.8397540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE SmartWorld, Ubiquitous Intelligence &amp; Computing, Advanced &amp; Trusted Computed, Scalable Computing &amp; Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://eprints.lancs.ac.uk/id/eprint/86306/1/UIC_2017_paper_80.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002236153","display_name":"Kaiyuan Kuang","orcid":null},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaiyuan Kuang","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, P.R. China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069158506","display_name":"Zhanyong Tang","orcid":"https://orcid.org/0000-0002-4333-2334"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhanyong Tang","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, P.R. China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060096608","display_name":"Xiaoqing Gong","orcid":"https://orcid.org/0000-0003-4896-8849"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoqing Gong","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, P.R. China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065103224","display_name":"Dingyi Fang","orcid":"https://orcid.org/0000-0002-5816-6922"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dingyi Fang","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, P.R. China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100322143","display_name":"Xiaojiang Chen","orcid":"https://orcid.org/0000-0002-1180-6806"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojiang Chen","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, P.R. China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100373159","display_name":"Heng Zhang","orcid":"https://orcid.org/0000-0003-2159-9705"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heng Zhang","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, P.R. China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100454135","display_name":"Jie Liu","orcid":"https://orcid.org/0000-0002-7305-5569"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Liu","raw_affiliation_strings":["Tencent Technology (Shenzhen) LI"],"affiliations":[{"raw_affiliation_string":"Tencent Technology (Shenzhen) LI","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401045","display_name":"Zheng Wang","orcid":"https://orcid.org/0000-0001-6157-0662"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zheng Wang","raw_affiliation_strings":["School of Computing and Communications, Lancaster University, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing and Communications, Lancaster University, UK","institution_ids":["https://openalex.org/I67415387"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5002236153"],"corresponding_institution_ids":["https://openalex.org/I37802460"],"apc_list":null,"apc_paid":null,"fwci":1.1193,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78498944,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.8883498907089233},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8789252042770386},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8045533895492554},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7123855948448181},{"id":"https://openalex.org/keywords/dynamic-program-analysis","display_name":"Dynamic program analysis","score":0.6446387767791748},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.548689067363739},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.5074796080589294},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4953228533267975},{"id":"https://openalex.org/keywords/data-flow-analysis","display_name":"Data-flow analysis","score":0.4882676601409912},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.4879907965660095},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.4779241681098938},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.47673070430755615},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4688141345977783},{"id":"https://openalex.org/keywords/machine-code","display_name":"Machine code","score":0.4515284299850464},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4510941505432129},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4459635317325592},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.4373275637626648},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.38621169328689575},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33464232087135315},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3198603689670563},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.29432809352874756},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.24356037378311157},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.24159634113311768},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.22196340560913086},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.17319434881210327}],"concepts":[{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.8883498907089233},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8789252042770386},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8045533895492554},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7123855948448181},{"id":"https://openalex.org/C140006998","wikidata":"https://www.wikidata.org/wiki/Q2499307","display_name":"Dynamic program analysis","level":3,"score":0.6446387767791748},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.548689067363739},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.5074796080589294},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4953228533267975},{"id":"https://openalex.org/C88468194","wikidata":"https://www.wikidata.org/wiki/Q1172416","display_name":"Data-flow analysis","level":3,"score":0.4882676601409912},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.4879907965660095},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.4779241681098938},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.47673070430755615},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4688141345977783},{"id":"https://openalex.org/C115168132","wikidata":"https://www.wikidata.org/wiki/Q55813","display_name":"Machine code","level":3,"score":0.4515284299850464},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4510941505432129},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4459635317325592},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.4373275637626648},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.38621169328689575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33464232087135315},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3198603689670563},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.29432809352874756},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.24356037378311157},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.24159634113311768},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.22196340560913086},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.17319434881210327},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/uic-atc.2017.8397540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uic-atc.2017.8397540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE SmartWorld, Ubiquitous Intelligence &amp; Computing, Advanced &amp; Trusted Computed, Scalable Computing &amp; Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.lancs.ac.uk:86306","is_oa":true,"landing_page_url":null,"pdf_url":"https://eprints.lancs.ac.uk/id/eprint/86306/1/UIC_2017_paper_80.pdf","source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"pmh:oai:eprints.lancs.ac.uk:86306","is_oa":true,"landing_page_url":null,"pdf_url":"https://eprints.lancs.ac.uk/id/eprint/86306/1/UIC_2017_paper_80.pdf","source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G3056170115","display_name":null,"funder_award_id":"EP/M01567X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G369688390","display_name":null,"funder_award_id":"EP/M015793/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2614917062.pdf","grobid_xml":"https://content.openalex.org/works/W2614917062.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W9193867","https://openalex.org/W1538186256","https://openalex.org/W1567046609","https://openalex.org/W1975157166","https://openalex.org/W2000507036","https://openalex.org/W2002348316","https://openalex.org/W2003857944","https://openalex.org/W2007172558","https://openalex.org/W2016784934","https://openalex.org/W2049629426","https://openalex.org/W2128389850","https://openalex.org/W2140747479","https://openalex.org/W2146567535","https://openalex.org/W2166462894","https://openalex.org/W4245435048","https://openalex.org/W6652286063"],"related_works":["https://openalex.org/W2992753978","https://openalex.org/W2168933008","https://openalex.org/W4225920890","https://openalex.org/W4285662085","https://openalex.org/W1978737550","https://openalex.org/W4287267953","https://openalex.org/W3174560274","https://openalex.org/W2234288835","https://openalex.org/W2969365378","https://openalex.org/W2614917062"],"abstract_inverted_index":{"Unauthorized":[0],"code":[1,17,33,73,147,207],"modification":[2],"based":[3,16],"on":[4],"reverse":[5],"engineering":[6],"is":[7,19,55,86,122,173],"a":[8,22,51,70,108,150,176],"serious":[9],"threat":[10],"for":[11,25,124],"software":[12,26,189],"industry.":[13],"Virtual":[14,31],"machine":[15,32],"obfuscation":[18,74,208],"emerging":[20],"as":[21],"powerful":[23],"technique":[24],"protection.":[27],"However,":[28],"the":[29,59,78,94,97,113,117,125,129,138,141,145,166,194],"current":[30],"protection":[34],"are":[35],"vulnerable":[36],"under":[37],"semantic":[38,81,191],"attacks":[39,192],"which":[40],"use":[41],"dynamic":[42,89],"profiling":[43],"to":[44,49,58,64,76,87,92,106,127,164,203],"transform":[45],"an":[46],"obfuscated":[47,60],"program":[48,53,61,98,118,130,142,167],"construct":[50],"simpler":[52],"that":[54,115,184],"functionally":[56],"equivalent":[57],"but":[62],"easier":[63],"analyze.":[65],"This":[66],"paper":[67],"presents":[68],"DSA-VMP,":[69],"novel":[71],"VM-based":[72,206],"technique,":[75],"address":[77],"issue":[79],"of":[80,96,140,178,196],"attacks.":[82],"Our":[83,100,171],"design":[84],"goal":[85],"exploit":[88],"data":[90,152],"flows":[91],"increase":[93,137],"diversity":[95,139],"behaviour.":[99],"approach":[101,172],"uses":[102],"multiple":[103,155],"bytecode":[104,110],"handlers":[105],"interpret":[107],"single":[109],"and":[111,160],"hides":[112],"logics":[114],"determine":[116],"execution":[119,131,143,168],"path":[120],"(it":[121],"difficult":[123],"attacker":[126],"anticipate":[128],"flow).":[132],"These":[133],"two":[134,204],"techniques":[135],"greatly":[136],"where":[144],"protected":[146],"regions":[148],"exhibit":[149],"complex":[151],"flow":[153],"across":[154],"runs,":[156],"making":[157],"it":[158],"harder":[159],"more":[161],"time":[162],"consuming":[163],"trace":[165],"through":[169],"profiling.":[170],"evaluated":[174],"using":[175],"set":[177],"real-world":[179],"applications.":[180],"Experimental":[181],"results":[182],"show":[183],"DSA-VMP":[185],"can":[186],"well":[187],"protect":[188],"against":[190],"at":[193],"cost":[195],"little":[197],"extra":[198],"runtime":[199],"overhead":[200],"when":[201],"compared":[202],"commercial":[205],"tools.":[209]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
