{"id":"https://openalex.org/W4228999312","doi":"https://doi.org/10.1145/3507657.3528560","title":"A First Look at Code Obfuscation for WebAssembly","display_name":"A First Look at Code Obfuscation for WebAssembly","publication_year":2022,"publication_date":"2022-05-07","ids":{"openalex":"https://openalex.org/W4228999312","doi":"https://doi.org/10.1145/3507657.3528560"},"language":"en","primary_location":{"id":"doi:10.1145/3507657.3528560","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3528560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Shrenik Bhansali","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shrenik Bhansali","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078506948","display_name":"Ahmet Ar\u0131\u015f","orcid":"https://orcid.org/0000-0003-4114-5321"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmet Aris","raw_affiliation_strings":["Florida International University, Miami, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027087892","display_name":"Abbas Acar","orcid":"https://orcid.org/0000-0002-4891-160X"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abbas Acar","raw_affiliation_strings":["Florida International University, Miami, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060971626","display_name":"Harun Oz","orcid":"https://orcid.org/0000-0002-2650-2055"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Harun Oz","raw_affiliation_strings":["Florida International University, Miami, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019145852","display_name":"A. Selcuk Uluagac","orcid":"https://orcid.org/0000-0002-9823-3464"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. Selcuk Uluagac","raw_affiliation_strings":["Florida International University, Miami, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":2.6798,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.90347587,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"140","last_page":"145"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9838411808013916},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8439033031463623},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7798006534576416},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5291260480880737},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5067549347877502},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4674934446811676},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4620828628540039},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.446600079536438},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12579670548439026}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9838411808013916},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8439033031463623},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7798006534576416},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5291260480880737},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5067549347877502},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4674934446811676},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4620828628540039},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.446600079536438},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12579670548439026},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3507657.3528560","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3528560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5309637660","display_name":null,"funder_award_id":"CNS-1453647, 1757761","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2175884749","https://openalex.org/W2778960843","https://openalex.org/W2888822874","https://openalex.org/W2890228473","https://openalex.org/W3012849786","https://openalex.org/W3132588576","https://openalex.org/W3138147846","https://openalex.org/W4288057729"],"related_works":["https://openalex.org/W2620652965","https://openalex.org/W2024170198","https://openalex.org/W4296272594","https://openalex.org/W2900526031","https://openalex.org/W2128507946","https://openalex.org/W2728713145","https://openalex.org/W2131332603","https://openalex.org/W2470502009","https://openalex.org/W2072617132","https://openalex.org/W4360993664"],"abstract_inverted_index":{"WebAssembly":[0],"(Wasm)":[1],"has":[2,27,79,119],"seen":[3],"a":[4,81,155,176,206],"lot":[5],"of":[6,61,65,72,95,112],"attention":[7],"lately":[8],"as":[9,38],"it":[10],"spreads":[11],"through":[12,107],"the":[13,19,58,70,85,110,113,133,211],"mobile":[14,43],"computing":[15],"domain":[16],"and":[17,49,131,149,168,172,202],"becomes":[18],"new":[20,51],"standard":[21],"for":[22,42,46,54,116,139],"performance-oriented":[23],"web":[24,34,166],"development.":[25],"It":[26],"diversified":[28],"its":[29],"uses":[30,60],"far":[31],"beyond":[32],"just":[33],"applications":[35,78,167],"by":[36],"acting":[37],"an":[39],"execution":[40],"environment":[41],"agents,":[44],"containers":[45],"IoT":[47],"devices,":[48],"enabling":[50],"serverless":[52],"approaches":[53],"edge":[55],"computing.":[56],"Within":[57],"numerous":[59,89,143],"Wasm,":[62],"not":[63],"all":[64],"them":[66,174],"are":[67],"benign.":[68],"With":[69],"rise":[71],"Wasm-based":[73,90,165],"cryptojacking":[74,91,169,179],"malware,":[75],"analyzing":[76],"Wasm":[77,117,147,158,178,185,213],"been":[80,121],"hot":[82],"topic":[83],"in":[84,88,153],"literature,":[86],"resulting":[87],"detection":[92],"systems.":[93],"Many":[94],"these":[96],"methods":[97,187],"rely":[98],"on":[99],"static":[100],"analysis,":[101],"which":[102],"traditionally":[103],"can":[104,188,198,203],"be":[105,189,199],"circumvented":[106],"obfuscation.":[108,192],"However,":[109],"feasibility":[111],"obfuscation":[114,138,144,197],"techniques":[115,145],"programs":[118],"never":[120],"investigated":[122],"thoroughly.":[123],"In":[124],"this":[125,129],"paper,":[126],"we":[127,161],"address":[128],"gap":[130],"perform":[132],"first":[134],"look":[135],"at":[136],"code":[137],"Wasm.":[140],"We":[141],"apply":[142],"to":[146,181,209],"programs,":[148],"test":[150],"their":[151],"effectiveness":[152],"producing":[154],"fully":[156],"obfuscated":[157,212],"program.":[159],"Particularly,":[160],"obfuscate":[162],"both":[163],"benign":[164],"malware":[170],"instances":[171],"feed":[173],"into":[175],"state-of-the-art":[177,207],"detector":[180,208],"see":[182],"if":[183],"current":[184],"analysis":[186,194],"subverted":[190],"with":[191],"Our":[193],"shows":[195],"that":[196],"highly":[200],"effective":[201],"cause":[204],"even":[205],"misclassify":[210],"samples.":[214]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
