{"id":"https://openalex.org/W3023495226","doi":"https://doi.org/10.1186/s42400-020-00049-3","title":"Layered obfuscation: a taxonomy of software obfuscation techniques for layered security","display_name":"Layered obfuscation: a taxonomy of software obfuscation techniques for layered security","publication_year":2020,"publication_date":"2020-04-03","ids":{"openalex":"https://openalex.org/W3023495226","doi":"https://doi.org/10.1186/s42400-020-00049-3","mag":"3023495226"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-020-00049-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-020-00049-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-020-00049-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-020-00049-3","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014520888","display_name":"Hui Xu","orcid":"https://orcid.org/0000-0003-2465-8627"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hui Xu","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101465219","display_name":"Yangfan Zhou","orcid":"https://orcid.org/0000-0002-9184-7383"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangfan Zhou","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101420644","display_name":"Jiang Ming","orcid":"https://orcid.org/0000-0001-9682-0502"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiang Ming","raw_affiliation_strings":["Department of Computer Science and Engineering, UT Arlington, Arlington, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, UT Arlington, Arlington, USA","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069596903","display_name":"Michael R. Lyu","orcid":"https://orcid.org/0000-0002-3666-5798"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Michael Lyu","raw_affiliation_strings":["Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin N. T., Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin N. T., Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014520888"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":3.0476,"has_fulltext":true,"cited_by_count":47,"citation_normalized_percentile":{"value":0.92213571,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"3","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9739932417869568},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7434236407279968},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5311340689659119},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4635557234287262},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.44081810116767883},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.39131850004196167},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09455865621566772}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9739932417869568},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7434236407279968},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5311340689659119},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4635557234287262},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.44081810116767883},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.39131850004196167},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09455865621566772}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-020-00049-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-020-00049-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-020-00049-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1c81988b2ec44c30b97da802d058ec5c","is_oa":true,"landing_page_url":"https://doaj.org/article/1c81988b2ec44c30b97da802d058ec5c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 3, Iss 1, Pp 1-18 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-020-00049-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-020-00049-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-020-00049-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2955081506","display_name":null,"funder_award_id":"61332010","funder_id":"https://openalex.org/F4320335575","funder_display_name":"Key Programme"}],"funders":[{"id":"https://openalex.org/F4320322942","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48"},{"id":"https://openalex.org/F4320335575","display_name":"Key Programme","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3023495226.pdf","grobid_xml":"https://content.openalex.org/works/W3023495226.grobid-xml"},"referenced_works_count":98,"referenced_works":["https://openalex.org/W65725112","https://openalex.org/W109909280","https://openalex.org/W116627068","https://openalex.org/W130272139","https://openalex.org/W1496704300","https://openalex.org/W1500009377","https://openalex.org/W1505973206","https://openalex.org/W1513145367","https://openalex.org/W1543331277","https://openalex.org/W1545927878","https://openalex.org/W1551162551","https://openalex.org/W1551572898","https://openalex.org/W1558430956","https://openalex.org/W1567046609","https://openalex.org/W1569422795","https://openalex.org/W1577324065","https://openalex.org/W1582280513","https://openalex.org/W1603256047","https://openalex.org/W1793588810","https://openalex.org/W1795245349","https://openalex.org/W1798077826","https://openalex.org/W1871911207","https://openalex.org/W1964962870","https://openalex.org/W1971475814","https://openalex.org/W1979852787","https://openalex.org/W1981033991","https://openalex.org/W1982199114","https://openalex.org/W1987282814","https://openalex.org/W2002348316","https://openalex.org/W2016443801","https://openalex.org/W2022413220","https://openalex.org/W2024170198","https://openalex.org/W2030314305","https://openalex.org/W2039620016","https://openalex.org/W2054904172","https://openalex.org/W2056878746","https://openalex.org/W2062341755","https://openalex.org/W2073524356","https://openalex.org/W2075335084","https://openalex.org/W2081105932","https://openalex.org/W2082594235","https://openalex.org/W2087774737","https://openalex.org/W2093610458","https://openalex.org/W2104952158","https://openalex.org/W2111817346","https://openalex.org/W2123834080","https://openalex.org/W2126851641","https://openalex.org/W2127827393","https://openalex.org/W2132874238","https://openalex.org/W2134982488","https://openalex.org/W2138130228","https://openalex.org/W2145913834","https://openalex.org/W2148888468","https://openalex.org/W2149017961","https://openalex.org/W2153185479","https://openalex.org/W2156375130","https://openalex.org/W2158419323","https://openalex.org/W2163225748","https://openalex.org/W2163801980","https://openalex.org/W2165069015","https://openalex.org/W2166462894","https://openalex.org/W2169282973","https://openalex.org/W2170793790","https://openalex.org/W2178906754","https://openalex.org/W2180074456","https://openalex.org/W2229758354","https://openalex.org/W2285186186","https://openalex.org/W2314464932","https://openalex.org/W2396513659","https://openalex.org/W2407294228","https://openalex.org/W2479781685","https://openalex.org/W2486765974","https://openalex.org/W2491218167","https://openalex.org/W2509162308","https://openalex.org/W2532550198","https://openalex.org/W2532553488","https://openalex.org/W2533383364","https://openalex.org/W2537421194","https://openalex.org/W2602097259","https://openalex.org/W2782618049","https://openalex.org/W2784097977","https://openalex.org/W2794718534","https://openalex.org/W2799200720","https://openalex.org/W2810801906","https://openalex.org/W2868191876","https://openalex.org/W2891539454","https://openalex.org/W2944947224","https://openalex.org/W2947729775","https://openalex.org/W2962830343","https://openalex.org/W3035328655","https://openalex.org/W3147534920","https://openalex.org/W3213195093","https://openalex.org/W4230477302","https://openalex.org/W4238341678","https://openalex.org/W4246166885","https://openalex.org/W4247464060","https://openalex.org/W4253637600","https://openalex.org/W6600376255"],"related_works":["https://openalex.org/W2913519194","https://openalex.org/W2007287520","https://openalex.org/W4362634109","https://openalex.org/W2055981842","https://openalex.org/W4388820743","https://openalex.org/W2793135307","https://openalex.org/W3134235726","https://openalex.org/W2906395579","https://openalex.org/W128871440","https://openalex.org/W2532550198"],"abstract_inverted_index":{"Abstract":[0],"Software":[1],"obfuscation":[2,51,79,107,123,131,138,145,164,169],"has":[3],"been":[4],"developed":[5],"for":[6,45],"over":[7],"30":[8],"years.":[9],"A":[10],"problem":[11,26],"always":[12],"confusing":[13],"the":[14,20,31,39,66,92,98,114,127,144],"communities":[15],"is":[16,63,71],"what":[17],"security":[18,44],"strength":[19],"technique":[21],"can":[22,159],"achieve.":[23],"Nowadays,":[24],"this":[25,156],"becomes":[27,34],"even":[28],"harder":[29],"as":[30,52,109],"software":[32,59,70,102],"economy":[33],"more":[35],"diversified.":[36],"Inspired":[37],"by":[38,104],"classic":[40],"idea":[41,128],"of":[42,100,121,129,137],"layered":[43,50,130,168],"risk":[46],"management,":[47],"we":[48,116],"propose":[49],"a":[53,110,118,134],"promising":[54],"way":[55,84],"to":[56,96,152],"realize":[57],"reliable":[58],"obfuscation.":[60],"Our":[61],"concept":[62],"based":[64,125,171],"on":[65,91,126,172],"fact":[67],"that":[68],"real-world":[69],"usually":[72],"complicated.":[73],"Merely":[74],"applying":[75],"one":[76],"or":[77],"several":[78],"approaches":[80],"in":[81,162],"an":[82],"ad-hoc":[83],"cannot":[85],"achieve":[86],"good":[87],"obscurity.":[88],"Layered":[89],"obfuscation,":[90],"other":[93],"hand,":[94],"aims":[95],"mitigate":[97],"risks":[99],"reverse":[101],"engineering":[103],"integrating":[105],"different":[106,148],"techniques":[108,124,165],"whole":[111],"solution.":[112],"In":[113,155],"paper,":[115],"conduct":[117],"systematic":[119],"review":[120],"existing":[122],"and":[132,166],"develop":[133],"novel":[135],"taxonomy":[136,142],"techniques.":[139],"Following":[140],"our":[141],"hierarchy,":[143],"strategies":[146],"under":[147],"branches":[149],"are":[150],"orthogonal":[151],"each":[153],"other.":[154],"way,":[157],"it":[158],"assist":[160],"developers":[161],"choosing":[163],"designing":[167],"solutions":[170],"their":[173],"specific":[174],"requirements.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
