{"id":"https://openalex.org/W2010417554","doi":"https://doi.org/10.1145/2810103.2813663","title":"Symbolic Execution of Obfuscated Code","display_name":"Symbolic Execution of Obfuscated Code","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2010417554","doi":"https://doi.org/10.1145/2810103.2813663","mag":"2010417554"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813663","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813663","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079631371","display_name":"Babak Yadegari","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Babak Yadegari","raw_affiliation_strings":["University of Arizona, Tucson, AZ, USA"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108542327","display_name":"Saumya Debray","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saumya Debray","raw_affiliation_strings":["University of Arizona, Tucson, AZ, USA"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079631371"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":9.8429,"has_fulltext":false,"cited_by_count":85,"citation_normalized_percentile":{"value":0.98570444,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"732","last_page":"744"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/citation","display_name":"Citation","score":0.8630580902099609},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6438916921615601},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6273277997970581},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4504944086074829},{"id":"https://openalex.org/keywords/program-code","display_name":"Program code","score":0.41484421491622925},{"id":"https://openalex.org/keywords/library-science","display_name":"Library science","score":0.40609559416770935},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17667672038078308}],"concepts":[{"id":"https://openalex.org/C2778805511","wikidata":"https://www.wikidata.org/wiki/Q1713","display_name":"Citation","level":2,"score":0.8630580902099609},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6438916921615601},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6273277997970581},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4504944086074829},{"id":"https://openalex.org/C2988963302","wikidata":"https://www.wikidata.org/wiki/Q629206","display_name":"Program code","level":2,"score":0.41484421491622925},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.40609559416770935},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17667672038078308},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2810103.2813663","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813663","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.707.3051","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.707.3051","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.arizona.edu/%7Edebray/Publications/ccs2015-symbolic.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W82260615","https://openalex.org/W109909280","https://openalex.org/W238846938","https://openalex.org/W1496704300","https://openalex.org/W1515180657","https://openalex.org/W1515790419","https://openalex.org/W1538186256","https://openalex.org/W1564075167","https://openalex.org/W1849042743","https://openalex.org/W1910686388","https://openalex.org/W1911796317","https://openalex.org/W1972235549","https://openalex.org/W2009489720","https://openalex.org/W2011367000","https://openalex.org/W2041394996","https://openalex.org/W2049629426","https://openalex.org/W2089745089","https://openalex.org/W2096449544","https://openalex.org/W2097444001","https://openalex.org/W2101512909","https://openalex.org/W2102970979","https://openalex.org/W2113864883","https://openalex.org/W2117030266","https://openalex.org/W2117058582","https://openalex.org/W2119251836","https://openalex.org/W2128389850","https://openalex.org/W2134633067","https://openalex.org/W2137530017","https://openalex.org/W2138788987","https://openalex.org/W2142368292","https://openalex.org/W2150795982","https://openalex.org/W2243437504","https://openalex.org/W2401617229","https://openalex.org/W2532550198","https://openalex.org/W4237492309","https://openalex.org/W4239813889","https://openalex.org/W6603368052","https://openalex.org/W6633665954","https://openalex.org/W6639864006"],"related_works":["https://openalex.org/W3142405157","https://openalex.org/W236705921","https://openalex.org/W173415492","https://openalex.org/W2370266886","https://openalex.org/W3127561149","https://openalex.org/W2379638450","https://openalex.org/W2373724792","https://openalex.org/W2145097403","https://openalex.org/W4244014535","https://openalex.org/W801624106"],"abstract_inverted_index":{"Symbolic":[0],"and":[1,28,91,109,124],"concolic":[2,30,125],"execution":[3,126],"find":[4],"important":[5],"applications":[6],"in":[7,60,94,121],"a":[8,70,102],"number":[9],"of":[10,16,38,55,104],"security-related":[11],"program":[12],"analyses,":[13],"including":[14],"analysis":[15,31,108],"malicious":[17,20],"code.":[18],"However,":[19],"code":[21],"tend":[22],"to":[23,42,127],"very":[24],"often":[25],"be":[26,99],"obfuscated,":[27],"current":[29],"tech-niques":[32],"have":[33],"trouble":[34],"dealing":[35],"with":[36],"some":[37],"these":[39,56],"obfuscations,":[40,90],"leading":[41],"imprecision":[43],"and/or":[44],"excessive":[45],"resource":[46],"usage.":[47],"This":[48],"paper":[49],"discusses":[50],"three":[51],"such":[52,89,129],"obfuscations:":[53],"two":[54],"are":[57,85],"al-ready":[58],"found":[59],"obfuscation":[61,76],"tools":[62],"used":[63],"by":[64],"malware,":[65],"while":[66],"the":[67,96],"third":[68],"is":[69,119],"simple":[71],"variation":[72],"on":[73],"an":[74],"existing":[75,82],"tech-nique.":[77],"We":[78],"show":[79],"empirically":[80],"that":[81,116],"symbolic":[83,123],"analyses":[84],"not":[86],"robust":[87],"against":[88],"propose":[92],"ways":[93],"which":[95],"problems":[97],"can":[98],"mitigated":[100],"using":[101],"combination":[103],"fine-grained":[105],"bit-level":[106],"taint":[107],"architecture-aware":[110],"constraint":[111],"generations.":[112],"Experimental":[113],"results":[114],"indicate":[115],"our":[117],"approach":[118],"effective":[120],"allowing":[122],"handle":[128],"obfuscations.":[130]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":18},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
