{"id":"https://openalex.org/W2124307915","doi":"https://doi.org/10.1145/2430553.2430554","title":"Software protection for dynamically-generated code","display_name":"Software protection for dynamically-generated code","publication_year":2013,"publication_date":"2013-01-26","ids":{"openalex":"https://openalex.org/W2124307915","doi":"https://doi.org/10.1145/2430553.2430554","mag":"2124307915"},"language":"en","primary_location":{"id":"doi:10.1145/2430553.2430554","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2430553.2430554","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048494221","display_name":"Sudeep Ghosh","orcid":"https://orcid.org/0000-0003-1699-1390"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sudeep Ghosh","raw_affiliation_strings":["University of Virginia, Charlottesville, VA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086514103","display_name":"Jason D. Hiser","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jason Hiser","raw_affiliation_strings":["University of Virginia, Charlottesville, VA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068264173","display_name":"Jack W. Davidson","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jack W. Davidson","raw_affiliation_strings":["University of Virginia, Charlottesville, VA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048494221"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":2.8854,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.91752998,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8101712465286255},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.683033287525177},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.673745334148407},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6128969788551331},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6074419021606445},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5904978513717651},{"id":"https://openalex.org/keywords/unreachable-code","display_name":"Unreachable code","score":0.48093172907829285},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.45491552352905273},{"id":"https://openalex.org/keywords/dead-code","display_name":"Dead code","score":0.4374280273914337},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4264037013053894},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42168113589286804},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42140066623687744},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.3238976001739502},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.29000788927078247},{"id":"https://openalex.org/keywords/redundant-code","display_name":"Redundant code","score":0.2897584140300751},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24428430199623108},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12291097640991211}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8101712465286255},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.683033287525177},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.673745334148407},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6128969788551331},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6074419021606445},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5904978513717651},{"id":"https://openalex.org/C50951305","wikidata":"https://www.wikidata.org/wiki/Q2482534","display_name":"Unreachable code","level":5,"score":0.48093172907829285},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.45491552352905273},{"id":"https://openalex.org/C47434764","wikidata":"https://www.wikidata.org/wiki/Q1770035","display_name":"Dead code","level":5,"score":0.4374280273914337},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4264037013053894},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42168113589286804},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42140066623687744},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.3238976001739502},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.29000788927078247},{"id":"https://openalex.org/C151578736","wikidata":"https://www.wikidata.org/wiki/Q1251793","display_name":"Redundant code","level":4,"score":0.2897584140300751},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24428430199623108},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12291097640991211},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2430553.2430554","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2430553.2430554","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G103421803","display_name":null,"funder_award_id":"CNS-0811689","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G3641626992","display_name":null,"funder_award_id":"W911-10-0131","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8118441363","display_name":null,"funder_award_id":"FA8650-10-C-7025","funder_id":"https://openalex.org/F4320338294","funder_display_name":"Air Force Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"},{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W119062149","https://openalex.org/W122591841","https://openalex.org/W322670599","https://openalex.org/W1488058190","https://openalex.org/W1515664404","https://openalex.org/W1522250664","https://openalex.org/W1541744005","https://openalex.org/W1543331277","https://openalex.org/W1549737115","https://openalex.org/W1567046609","https://openalex.org/W1580417272","https://openalex.org/W1953268564","https://openalex.org/W1964173930","https://openalex.org/W1988374166","https://openalex.org/W2047194322","https://openalex.org/W2050937543","https://openalex.org/W2055336607","https://openalex.org/W2064435654","https://openalex.org/W2078243195","https://openalex.org/W2103380811","https://openalex.org/W2104948281","https://openalex.org/W2108255910","https://openalex.org/W2113181828","https://openalex.org/W2117115928","https://openalex.org/W2120342118","https://openalex.org/W2123022206","https://openalex.org/W2126851641","https://openalex.org/W2131266495","https://openalex.org/W2131726714","https://openalex.org/W2144882558","https://openalex.org/W2148865465","https://openalex.org/W2149886445","https://openalex.org/W2150709728","https://openalex.org/W2153478046","https://openalex.org/W2161992906","https://openalex.org/W2166004296","https://openalex.org/W2166462894","https://openalex.org/W2168851767","https://openalex.org/W2169633417","https://openalex.org/W2264014029","https://openalex.org/W2339669378","https://openalex.org/W2532550198","https://openalex.org/W4206314719","https://openalex.org/W4206796831","https://openalex.org/W4239813889","https://openalex.org/W4244704438","https://openalex.org/W4300807510","https://openalex.org/W6604435517","https://openalex.org/W6604936284"],"related_works":["https://openalex.org/W116913286","https://openalex.org/W2160620982","https://openalex.org/W128871440","https://openalex.org/W4235592786","https://openalex.org/W1493727516","https://openalex.org/W2369241479","https://openalex.org/W4229813677","https://openalex.org/W632311702","https://openalex.org/W2123574549","https://openalex.org/W1777501891"],"abstract_inverted_index":{"Process-level":[0],"Virtual":[1],"machines":[2],"(PVMs)":[3],"often":[4],"play":[5],"a":[6,44],"crucial":[7],"role":[8],"in":[9,43],"program":[10],"protection.":[11],"In":[12],"particular,":[13],"virtualization-based":[14],"tools":[15,39],"like":[16],"VMProtect":[17],"and":[18,32,54],"CodeVirtualizer":[19],"have":[20],"been":[21,66],"shown":[22],"to":[23,30,59],"provide":[24],"desirable":[25],"obfuscation":[26],"properties":[27],"(i.e.,":[28],"resistance":[29],"disassembly":[31],"code":[33,42,45,48],"analysis).":[34],"To":[35],"be":[36,57],"efficient,":[37],"many":[38],"cache":[40],"frequently-executed":[41],"cache.":[46],"This":[47],"is":[49],"run":[50],"directly":[51],"on":[52],"hardware":[53],"consequently":[55],"may":[56],"susceptible":[58],"unintended,":[60],"malicious":[61],"modification":[62],"after":[63],"it":[64],"has":[65],"generated.":[67]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
