{"id":"https://openalex.org/W2072426153","doi":"https://doi.org/10.1145/1314276.1314290","title":"Slicing obfuscations","display_name":"Slicing obfuscations","publication_year":2007,"publication_date":"2007-10-29","ids":{"openalex":"https://openalex.org/W2072426153","doi":"https://doi.org/10.1145/1314276.1314290","mag":"2072426153"},"language":"en","primary_location":{"id":"doi:10.1145/1314276.1314290","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1314276.1314290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 ACM workshop on Digital Rights Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088246276","display_name":"Anirban Majumdar","orcid":"https://orcid.org/0000-0003-4793-1892"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Anirban Majumdar","raw_affiliation_strings":["University of Auckland, Auckland, New Zealand","UNIVERSITY OF AUCKLAND, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]},{"raw_affiliation_string":"UNIVERSITY OF AUCKLAND, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024990926","display_name":"Stephen Drape","orcid":null},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Stephen J. Drape","raw_affiliation_strings":["University of Auckland, Auckland, New Zealand","UNIVERSITY OF AUCKLAND, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]},{"raw_affiliation_string":"UNIVERSITY OF AUCKLAND, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089209744","display_name":"Clark Thomborson","orcid":"https://orcid.org/0000-0002-4147-7898"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Clark D. Thomborson","raw_affiliation_strings":["University of Auckland, Auckland, New Zealand","UNIVERSITY OF AUCKLAND, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]},{"raw_affiliation_string":"UNIVERSITY OF AUCKLAND, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088246276"],"corresponding_institution_ids":["https://openalex.org/I154130895"],"apc_list":null,"apc_paid":null,"fwci":2.2157,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.88254831,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"70","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/program-slicing","display_name":"Program slicing","score":0.942764163017273},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8726121187210083},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.8684326410293579},{"id":"https://openalex.org/keywords/slicing","display_name":"Slicing","score":0.8427904844284058},{"id":"https://openalex.org/keywords/program-comprehension","display_name":"Program comprehension","score":0.7877153158187866},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7693253755569458},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6758792996406555},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6039847731590271},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.4863436818122864},{"id":"https://openalex.org/keywords/code-refactoring","display_name":"Code refactoring","score":0.45782196521759033},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4306009113788605},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.43051019310951233},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.4230632185935974},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4139411747455597},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4114789366722107},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3509405851364136},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3025081753730774},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.2049884796142578},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12429895997047424},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.074515700340271}],"concepts":[{"id":"https://openalex.org/C91071405","wikidata":"https://www.wikidata.org/wiki/Q1413145","display_name":"Program slicing","level":3,"score":0.942764163017273},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8726121187210083},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.8684326410293579},{"id":"https://openalex.org/C2776190703","wikidata":"https://www.wikidata.org/wiki/Q488148","display_name":"Slicing","level":2,"score":0.8427904844284058},{"id":"https://openalex.org/C2777561058","wikidata":"https://www.wikidata.org/wiki/Q2652119","display_name":"Program comprehension","level":4,"score":0.7877153158187866},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7693253755569458},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6758792996406555},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6039847731590271},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.4863436818122864},{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.45782196521759033},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4306009113788605},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.43051019310951233},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.4230632185935974},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4139411747455597},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4114789366722107},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3509405851364136},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3025081753730774},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.2049884796142578},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12429895997047424},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.074515700340271},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1314276.1314290","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1314276.1314290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 ACM workshop on Digital Rights Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320316156","display_name":"New Zealand Government","ror":"https://ror.org/04v3jxv31"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W122591841","https://openalex.org/W205613869","https://openalex.org/W303139982","https://openalex.org/W1524838762","https://openalex.org/W1525928249","https://openalex.org/W1567046609","https://openalex.org/W1793588810","https://openalex.org/W1967889788","https://openalex.org/W1982205631","https://openalex.org/W1986810585","https://openalex.org/W1989408643","https://openalex.org/W2032353637","https://openalex.org/W2092483417","https://openalex.org/W2107967474","https://openalex.org/W2120538737","https://openalex.org/W2122358298","https://openalex.org/W2126851641","https://openalex.org/W2127280681","https://openalex.org/W2138130228","https://openalex.org/W2148888468","https://openalex.org/W2162310108","https://openalex.org/W2186601860","https://openalex.org/W2532550198","https://openalex.org/W2556054331","https://openalex.org/W6604936284","https://openalex.org/W6608322956"],"related_works":["https://openalex.org/W87824331","https://openalex.org/W3134694799","https://openalex.org/W2362297705","https://openalex.org/W3217625194","https://openalex.org/W2607843750","https://openalex.org/W2294335143","https://openalex.org/W2127963429","https://openalex.org/W4243636538","https://openalex.org/W2352685139","https://openalex.org/W2005835674"],"abstract_inverted_index":{"The":[0],"goal":[1],"of":[2,41,51,78,132,145],"obfuscation":[3],"is":[4,38,61,83],"to":[5,46,63,85,93,111,121],"transform":[6],"a":[7,39,49,56,65,76,109,125,143],"program,":[8],"without":[9],"affecting":[10],"its":[11],"functionality,":[12],"such":[13],"that":[14,89,117],"some":[15],"secret":[16],"information":[17,105],"within":[18],"the":[19,104],"program":[20,52,58,67,110],"can":[21,102],"be":[22,64,73],"hidden":[23],"for":[24,134],"as":[25,27,75],"long":[26],"possible":[28],"from":[29,107],"an":[30],"adversary":[31],"armed":[32],"with":[33,142],"reverse":[34,42],"engineering":[35,43,154],"tools.":[36],"Slicing":[37],"form":[40],"which":[44],"aims":[45],"abstract":[47],"away":[48],"subset":[50],"code":[53],"based":[54],"on":[55],"particular":[57],"point":[59],"and":[60,129,148],"considered":[62],"potent":[66],"comprehension":[68],"technique.":[69],"Thus,":[70],"slicing":[71,94,108],"could":[72],"used":[74],"way":[77],"attacking":[79],"obfuscated":[80],"programs.":[81],"It":[82],"challenging":[84],"manufacture":[86],"obfuscating":[87,146],"transforms":[88,147],"are":[90,118],"provably":[91],"resilient":[92],"attacks.We":[95],"show":[96],"in":[97,114],"this":[98],"paper":[99],"how":[100],"we":[101,138],"utilise":[103],"gained":[106],"aid":[112],"us":[113],"designing":[115],"obfuscations":[116],"more":[119],"resistant":[120],"slicing.":[122],"We":[123],"extend":[124],"previously":[126],"proposed":[127],"technique":[128],"provide":[130,149],"proofs":[131],"correctness":[133],"our":[135,140],"transforms.":[136],"Finally,":[137],"illustrate":[139],"approach":[141],"number":[144],"empirical":[150],"results":[151],"using":[152],"software":[153],"metrics.":[155]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
