{"id":"https://openalex.org/W4388638626","doi":"https://doi.org/10.1142/s0218194023500663","title":"Function-Level Code Obfuscation Detection Through Self-Attention-Guided Multi-Representation Fusion","display_name":"Function-Level Code Obfuscation Detection Through Self-Attention-Guided Multi-Representation Fusion","publication_year":2023,"publication_date":"2023-11-13","ids":{"openalex":"https://openalex.org/W4388638626","doi":"https://doi.org/10.1142/s0218194023500663"},"language":"en","primary_location":{"id":"doi:10.1142/s0218194023500663","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218194023500663","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049436913","display_name":"Zhenzhou Tian","orcid":"https://orcid.org/0000-0001-7608-8908"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenzhou Tian","raw_affiliation_strings":["School of Computer Science and Technology, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, Shaanxi 710121, P. R. China","Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing, Xi\u2019an, Shaanxi 710121, P. R. China","Xi\u2019an Key Laboratory of Big Data and Intelligent Computing, Xi\u2019an, Shaanxi 710121, P. R. China","School of Computer Science and Technology, Xi'an University of Posts and Telecommunications, Xi'an, Shaanxi 710121, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, Shaanxi 710121, P. R. China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing, Xi\u2019an, Shaanxi 710121, P. R. China","institution_ids":[]},{"raw_affiliation_string":"Xi\u2019an Key Laboratory of Big Data and Intelligent Computing, Xi\u2019an, Shaanxi 710121, P. R. China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi'an University of Posts and Telecommunications, Xi'an, Shaanxi 710121, P. R. China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103258803","display_name":"Ruikang He","orcid":"https://orcid.org/0009-0005-6051-063X"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruikang He","raw_affiliation_strings":["School of Computer Science and Technology, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, Shaanxi 710121, P. R. China","School of Computer Science and Technology, Xi'an University of Posts and Telecommunications, Xi'an, Shaanxi 710121, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, Shaanxi 710121, P. R. China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi'an University of Posts and Telecommunications, Xi'an, Shaanxi 710121, P. R. China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103186249","display_name":"Zhao Hong-liang","orcid":"https://orcid.org/0009-0000-6659-3505"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongliang Zhao","raw_affiliation_strings":["School of Computer Science and Technology, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, Shaanxi 710121, P. R. China","School of Computer Science and Technology, Xi'an University of Posts and Telecommunications, Xi'an, Shaanxi 710121, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, Shaanxi 710121, P. R. China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi'an University of Posts and Telecommunications, Xi'an, Shaanxi 710121, P. R. China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017524689","display_name":"Lingwei Chen","orcid":"https://orcid.org/0000-0003-1550-6170"},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lingwei Chen","raw_affiliation_strings":["Department of Computer Science and Engineering, Wright State University, Dayton 45435, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Wright State University, Dayton 45435, OH, USA","institution_ids":["https://openalex.org/I19648265"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5049436913"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.1964,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.46604824,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"34","issue":"04","first_page":"651","last_page":"673"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9642000198364258,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9613000154495239,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9697654247283936},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8210846185684204},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5369790196418762},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48254793882369995},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4310908615589142},{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.4166450500488281},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.33808204531669617},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3317423164844513},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20824655890464783},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11163938045501709},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.09409767389297485}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9697654247283936},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8210846185684204},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5369790196418762},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48254793882369995},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4310908615589142},{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.4166450500488281},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.33808204531669617},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3317423164844513},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20824655890464783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11163938045501709},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.09409767389297485}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218194023500663","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218194023500663","pdf_url":null,"source":{"id":"https://openalex.org/S131442419","display_name":"International Journal of Software Engineering and Knowledge Engineering","issn_l":"0218-1940","issn":["0218-1940","1793-6403"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Software Engineering and Knowledge Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.5099999904632568}],"awards":[{"id":"https://openalex.org/G2123794166","display_name":null,"funder_award_id":"62272387","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6374429771","display_name":null,"funder_award_id":"61702414","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1491081130","https://openalex.org/W1538186256","https://openalex.org/W2008453980","https://openalex.org/W2049629426","https://openalex.org/W2194609298","https://openalex.org/W2314464932","https://openalex.org/W2532550198","https://openalex.org/W2533383364","https://openalex.org/W2708742135","https://openalex.org/W2734558754","https://openalex.org/W2740220421","https://openalex.org/W2806540472","https://openalex.org/W2868191876","https://openalex.org/W2885072546","https://openalex.org/W2891539454","https://openalex.org/W2912248945","https://openalex.org/W2914961791","https://openalex.org/W2953998016","https://openalex.org/W2962830343","https://openalex.org/W2985244210","https://openalex.org/W2992467173","https://openalex.org/W3014829096","https://openalex.org/W3089412163","https://openalex.org/W3194285038","https://openalex.org/W4200401132","https://openalex.org/W4285271823","https://openalex.org/W4287848938","https://openalex.org/W4288057729","https://openalex.org/W4295950666","https://openalex.org/W4382119048","https://openalex.org/W4385208592","https://openalex.org/W4387191003"],"related_works":["https://openalex.org/W3211159634","https://openalex.org/W4388157251","https://openalex.org/W3126761238","https://openalex.org/W4214835142","https://openalex.org/W2947729775","https://openalex.org/W2008514616","https://openalex.org/W4254029842","https://openalex.org/W2790499426","https://openalex.org/W2810872891","https://openalex.org/W3081644756"],"abstract_inverted_index":{"Malware":[0],"developers":[1],"often":[2],"employ":[3],"code":[4,52,92,112,148,257],"obfuscation":[5,35,44,86,103,190,197,204,236,240],"techniques":[6,24,38],"to":[7,15,49,159,180],"conceal":[8],"their":[9],"malicious":[10],"functionality,":[11],"making":[12],"it":[13],"challenging":[14],"detect":[16],"and":[17,37,65,82,121,134,199,232,239,259],"analyze":[18],"such":[19],"software.":[20],"While":[21],"various":[22],"de-obfuscation":[23],"exist,":[25],"the":[26,34,42,50,80,89,129,181,217,235,250,260,263],"majority":[27],"of":[28,33,55,85,101,183,202,224,230,253,262],"them":[29],"require":[30],"prior":[31],"knowledge":[32,64],"tools":[36,45,198],"in":[39],"use.":[40],"Identifying":[41],"specific":[43],"or":[46,99],"algorithms":[47,87,104,205],"applied":[48],"obfuscated":[51],"is":[53,154,169,192],"thus":[54],"vital":[56],"importance,":[57],"which,":[58],"however,":[59],"typically":[60],"demands":[61],"in-depth":[62],"expert":[63],"substantial":[66],"efforts.":[67],"Therefore,":[68],"this":[69],"paper":[70],"presents":[71],"DeObA,":[72,225],"a":[73,150,173,184,188,200,220],"deep":[74],"learning":[75],"(DL)":[76],"driven":[77],"approach":[78],"for":[79,177],"precise":[81],"efficient":[83],"detection":[84,222,238,242],"on":[88,109,156,206,216,234],"fine-grained":[90],"function-level":[91],"snippets.":[93],"To":[94],"comprehensively":[95],"capture":[96],"unique":[97],"patterns":[98],"features":[100,141,158],"different":[102,196],"from":[105,146],"code,":[106],"DeObA":[107],"works":[108],"multiple":[110,255],"distinct":[111,256],"views,":[113],"encompassing":[114],"token":[115],"sequences,":[116],"abstract":[117],"syntax":[118],"trees":[119],"(AST)":[120],"program":[122],"dependency":[123],"graphs":[124],"(PDG),":[125],"which":[126,226],"will":[127],"reflect":[128],"code\u2019s":[130],"lexical":[131],"morphology,":[132],"syntactic":[133],"structural":[135],"aspects.":[136],"After":[137],"individually":[138],"collecting":[139],"obfuscation-indicative":[140],"with":[142,194],"well-matched":[143],"DL":[144],"encoder":[145],"each":[147],"view,":[149],"self-attention-based":[151,265],"fusion":[152,266],"strategy":[153],"performed":[155],"these":[157],"produce":[160],"an":[161],"integrated,":[162],"dense,":[163],"yet":[164],"feature-rich":[165],"vector.":[166],"This":[167],"vector":[168],"then":[170],"fed":[171],"into":[172],"softmax":[174],"classification":[175],"layer":[176],"prediction.":[178],"Due":[179],"lack":[182],"moderately":[185],"sized":[186],"dataset,":[187],"large":[189],"corpus":[191],"curated":[193],"7":[195],"total":[201],"12":[203],"39,070":[207],"C/C[Formula:":[208],"see":[209],"text]":[210],"functions.":[211],"The":[212,245],"experimental":[213],"evaluations":[214],"conducted":[215],"dataset":[218],"exhibit":[219],"distinguished":[221],"performance":[223],"achieve":[227],"accuracy":[228],"rates":[229],"99.90%":[231],"99.19%":[233],"tool":[237],"algorithm":[241],"tasks,":[243],"respectively.":[244],"ablation":[246],"study":[247],"also":[248],"confirms":[249],"active":[251],"role":[252],"considering":[254],"views":[258],"effectiveness":[261],"designed":[264],"strategy.":[267]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
