{"id":"https://openalex.org/W2964399413","doi":"https://doi.org/10.1145/3359789.3359812","title":"How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)","display_name":"How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)","publication_year":2019,"publication_date":"2019-11-22","ids":{"openalex":"https://openalex.org/W2964399413","doi":"https://doi.org/10.1145/3359789.3359812","mag":"2964399413"},"language":"en","primary_location":{"id":"doi:10.1145/3359789.3359812","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3359789.3359812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1908.01549","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018029230","display_name":"Mathilde Ollivier","orcid":"https://orcid.org/0009-0008-6495-2330"},"institutions":[{"id":"https://openalex.org/I2738703131","display_name":"Commissariat \u00e0 l'\u00c9nergie Atomique et aux \u00c9nergies Alternatives","ror":"https://ror.org/00jjx8s55","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131"]},{"id":"https://openalex.org/I4210085861","display_name":"Laboratoire d'Int\u00e9gration des Syst\u00e8mes et des Technologies","ror":"https://ror.org/000dbcc61","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131","https://openalex.org/I2738703131","https://openalex.org/I277688954","https://openalex.org/I4210085861","https://openalex.org/I4210117989"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Mathilde Ollivier","raw_affiliation_strings":["CEA, LIST, Paris-Saclay, France"],"affiliations":[{"raw_affiliation_string":"CEA, LIST, Paris-Saclay, France","institution_ids":["https://openalex.org/I4210085861","https://openalex.org/I2738703131"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018746962","display_name":"S\u00e9bastien Bardin","orcid":"https://orcid.org/0000-0002-6509-3506"},"institutions":[{"id":"https://openalex.org/I4210085861","display_name":"Laboratoire d'Int\u00e9gration des Syst\u00e8mes et des Technologies","ror":"https://ror.org/000dbcc61","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131","https://openalex.org/I2738703131","https://openalex.org/I277688954","https://openalex.org/I4210085861","https://openalex.org/I4210117989"]},{"id":"https://openalex.org/I2738703131","display_name":"Commissariat \u00e0 l'\u00c9nergie Atomique et aux \u00c9nergies Alternatives","ror":"https://ror.org/00jjx8s55","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"S\u00e9bastien Bardin","raw_affiliation_strings":["CEA, LIST, Paris-Saclay, France"],"affiliations":[{"raw_affiliation_string":"CEA, LIST, Paris-Saclay, France","institution_ids":["https://openalex.org/I4210085861","https://openalex.org/I2738703131"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029642238","display_name":"Richard Bonichon","orcid":null},"institutions":[{"id":"https://openalex.org/I2738703131","display_name":"Commissariat \u00e0 l'\u00c9nergie Atomique et aux \u00c9nergies Alternatives","ror":"https://ror.org/00jjx8s55","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131"]},{"id":"https://openalex.org/I4210085861","display_name":"Laboratoire d'Int\u00e9gration des Syst\u00e8mes et des Technologies","ror":"https://ror.org/000dbcc61","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131","https://openalex.org/I2738703131","https://openalex.org/I277688954","https://openalex.org/I4210085861","https://openalex.org/I4210117989"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Richard Bonichon","raw_affiliation_strings":["CEA, LIST, Paris-Saclay, France"],"affiliations":[{"raw_affiliation_string":"CEA, LIST, Paris-Saclay, France","institution_ids":["https://openalex.org/I4210085861","https://openalex.org/I2738703131"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106028817","display_name":"Jean-Yves Marion","orcid":"https://orcid.org/0009-0002-8262-3887"},"institutions":[{"id":"https://openalex.org/I90183372","display_name":"Universit\u00e9 de Lorraine","ror":"https://ror.org/04vfs2w97","country_code":"FR","type":"education","lineage":["https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Yves Marion","raw_affiliation_strings":["Universit\u00e9 de Lorraine, France","Universit\u00e9 de Lorraine (France)"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 de Lorraine, France","institution_ids":["https://openalex.org/I90183372"]},{"raw_affiliation_string":"Universit\u00e9 de Lorraine (France)","institution_ids":["https://openalex.org/I90183372"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5018029230"],"corresponding_institution_ids":["https://openalex.org/I2738703131","https://openalex.org/I4210085861"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06999024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"177","last_page":"189"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8867180347442627},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7073962092399597},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.6949352622032166},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6599031686782837},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5950267910957336},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5728781819343567},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5602073073387146},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5149412751197815},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.5083999037742615},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44459256529808044},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.4351634681224823},{"id":"https://openalex.org/keywords/intellectual-property","display_name":"Intellectual property","score":0.43470945954322815},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.32944124937057495},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.23270002007484436},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12158915400505066},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10674241185188293}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8867180347442627},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7073962092399597},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.6949352622032166},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6599031686782837},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5950267910957336},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5728781819343567},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5602073073387146},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5149412751197815},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.5083999037742615},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44459256529808044},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.4351634681224823},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.43470945954322815},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32944124937057495},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.23270002007484436},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12158915400505066},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10674241185188293},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1145/3359789.3359812","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3359789.3359812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1908.01549","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1908.01549","pdf_url":"https://arxiv.org/pdf/1908.01549","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2964399413","is_oa":true,"landing_page_url":"https://arxiv.org/abs/1908.01549","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:HAL:hal-02564103v1","is_oa":true,"landing_page_url":"https://hal.univ-lorraine.fr/hal-02564103","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACSAC '19: 2019 Annual Computer Security Applications Conference, Dec 2019, San Juan, Puerto Rico, United States. pp.177-189, &#x27E8;10.1145/3359789.3359812&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:zenodo.org:3980714","is_oa":true,"landing_page_url":"https://zenodo.org/record/3980714","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"},{"id":"doi:10.48550/arxiv.1908.01549","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1908.01549","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1908.01549","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1908.01549","pdf_url":"https://arxiv.org/pdf/1908.01549","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W109909280","https://openalex.org/W174339829","https://openalex.org/W1481397690","https://openalex.org/W1496704300","https://openalex.org/W1514023947","https://openalex.org/W1514687127","https://openalex.org/W1515180657","https://openalex.org/W1538186256","https://openalex.org/W1543331277","https://openalex.org/W1567046609","https://openalex.org/W1579437898","https://openalex.org/W1613776191","https://openalex.org/W1710734607","https://openalex.org/W1820253543","https://openalex.org/W1979345446","https://openalex.org/W1989310296","https://openalex.org/W2010417554","https://openalex.org/W2012737144","https://openalex.org/W2030906223","https://openalex.org/W2042033151","https://openalex.org/W2049629426","https://openalex.org/W2069123635","https://openalex.org/W2098492867","https://openalex.org/W2107147876","https://openalex.org/W2113864883","https://openalex.org/W2131266495","https://openalex.org/W2138788987","https://openalex.org/W2148595118","https://openalex.org/W2148888468","https://openalex.org/W2159702664","https://openalex.org/W2162800072","https://openalex.org/W2295903414","https://openalex.org/W2314464932","https://openalex.org/W2401003083","https://openalex.org/W2401312886","https://openalex.org/W2408027109","https://openalex.org/W2465649794","https://openalex.org/W2514974017","https://openalex.org/W2535644961","https://openalex.org/W2538979179","https://openalex.org/W2560252021","https://openalex.org/W2620363344","https://openalex.org/W2708742135","https://openalex.org/W2751013686","https://openalex.org/W2780799849","https://openalex.org/W2803311659","https://openalex.org/W2806540472","https://openalex.org/W2873938857","https://openalex.org/W2963452421","https://openalex.org/W4253637600","https://openalex.org/W6634033044","https://openalex.org/W6642836234","https://openalex.org/W6671777941","https://openalex.org/W6728332304","https://openalex.org/W6794698570"],"related_works":["https://openalex.org/W2990227674","https://openalex.org/W2995488812","https://openalex.org/W3168612631","https://openalex.org/W1496704300","https://openalex.org/W2892708618","https://openalex.org/W3128730542","https://openalex.org/W3113117201","https://openalex.org/W2229758354","https://openalex.org/W2799754168","https://openalex.org/W3165423879","https://openalex.org/W3120342905","https://openalex.org/W2175884749","https://openalex.org/W3159086519","https://openalex.org/W2125491202","https://openalex.org/W2761145057","https://openalex.org/W2604546184","https://openalex.org/W3200281261","https://openalex.org/W2052426004","https://openalex.org/W2293429812","https://openalex.org/W2896854796"],"abstract_inverted_index":{"Code":[0],"obfuscation":[1,98],"is":[2],"a":[3,68,89,118],"major":[4],"tool":[5],"for":[6],"protecting":[7],"software":[8,37],"intellectual":[9],"property":[10],"from":[11],"attacks":[12,24],"such":[13],"as":[14,75],"reverse":[15],"engineering":[16],"or":[17,52,58],"code":[18],"tampering.":[19],"Yet,":[20],"recently":[21],"proposed":[22],"(automated)":[23],"based":[25],"on":[26],"Dynamic":[27],"Symbolic":[28],"Execution":[29],"(DSE)":[30],"shows":[31],"very":[32,119],"promising":[33],"results,":[34],"hence":[35],"threatening":[36],"integrity.":[38],"Current":[39],"defenses":[40],"are":[41],"not":[42,47],"fully":[43],"satisfactory,":[44],"being":[45,59],"either":[46],"efficient":[48],"against":[49],"symbolic":[50,113],"reasoning,":[51],"affecting":[53],"runtime":[54],"performance":[55],"too":[56,60],"much,":[57],"easy":[61],"to":[62,101],"spot.":[63],"We":[64,87],"present":[65],"and":[66,93],"study":[67],"new":[69],"class":[70,96],"of":[71,82,97],"anti-DSE":[72],"protections":[73,77],"coined":[74],"path-oriented":[76],"targeting":[78],"the":[79],"weakest":[80],"spot":[81],"DSE,":[83],"namely":[84],"path":[85],"exploration.":[86],"propose":[88],"lightweight,":[90],"efficient,":[91],"resistant":[92],"analytically":[94],"proved":[95],"algorithms":[99],"designed":[100],"hinder":[102],"DSE-based":[103],"attacks.":[104],"Extensive":[105],"evaluation":[106],"demonstrates":[107],"that":[108],"these":[109],"approaches":[110],"critically":[111],"counter":[112],"deobfuscation":[114],"while":[115],"yielding":[116],"only":[117],"slight":[120],"overhead.":[121]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
