{"id":"https://openalex.org/W4410313129","doi":"https://doi.org/10.32604/cmc.2025.062743","title":"Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution","display_name":"Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410313129","doi":"https://doi.org/10.32604/cmc.2025.062743"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.062743","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.062743","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.062743","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101666169","display_name":"Yan Cao","orcid":"https://orcid.org/0000-0002-4252-9952"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yan Cao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Zhizhuang Zhou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhizhuang Zhou","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5009698718","display_name":"Yan Zhuang","orcid":"https://orcid.org/0000-0002-7640-4330"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yan Zhuang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101666169"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10737499,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"1","first_page":"1545","last_page":"1565"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9366999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7893412113189697},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7834040522575378},{"id":"https://openalex.org/keywords/opacity","display_name":"Opacity","score":0.5592455863952637},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5362009406089783},{"id":"https://openalex.org/keywords/predicate","display_name":"Predicate (mathematical logic)","score":0.44491544365882874},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42987877130508423},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3359873592853546},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21641120314598083}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7893412113189697},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7834040522575378},{"id":"https://openalex.org/C60056205","wikidata":"https://www.wikidata.org/wiki/Q691914","display_name":"Opacity","level":2,"score":0.5592455863952637},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5362009406089783},{"id":"https://openalex.org/C140146324","wikidata":"https://www.wikidata.org/wiki/Q1144319","display_name":"Predicate (mathematical logic)","level":2,"score":0.44491544365882874},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42987877130508423},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3359873592853546},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21641120314598083},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.062743","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.062743","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.062743","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.062743","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2009489720","https://openalex.org/W2042033151","https://openalex.org/W2047181172","https://openalex.org/W2061948404","https://openalex.org/W2101512909","https://openalex.org/W2107147876"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2161791806","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W4366824690","https://openalex.org/W2613656770","https://openalex.org/W2482431380","https://openalex.org/W2066014542","https://openalex.org/W2073474947","https://openalex.org/W2056396287"],"abstract_inverted_index":{"Code":[0],"obfuscation":[1,17,127,162],"is":[2],"a":[3,62,125,158],"crucial":[4],"technique":[5],"for":[6,65],"protecting":[7],"software":[8,169],"against":[9,132,146],"reverse":[10],"engineering":[11],"and":[12,26,52,89,100,129,160],"security":[13],"attacks.":[14],"Among":[15],"various":[16],"methods,":[18],"opaque":[19,37,67,83,102],"predicates,":[20,84,103],"which":[21,48,85,104],"are":[22,28,39],"recognized":[23],"as":[24],"flexible":[25],"promising,":[27],"widely":[29],"used":[30],"to":[31,42,92,165],"increase":[32],"control-flow":[33],"complexity.":[34],"However,":[35],"traditional":[36],"predicates":[38,68],"increasingly":[40],"vulnerable":[41],"Dynamic":[43],"Symbolic":[44],"Execution":[45],"(DSE)":[46],"attacks,":[47],"can":[49],"efficiently":[50],"identify":[51],"eliminate":[53],"them.":[54],"To":[55,116],"address":[56],"this":[57,59],"issue,":[58],"paper":[60,156],"proposes":[61],"novel":[63],"approach":[64,142],"anti-DSE":[66],"that":[69,140],"effectively":[70],"resists":[71],"symbolic":[72,113,134,147],"execution-based":[73],"deobfuscation.":[74],"Our":[75],"method":[76],"introduces":[77],"two":[78],"key":[79],"techniques:":[80],"single-way":[81],"function":[82],"leverage":[86],"hash":[87],"functions":[88],"logarithmic":[90],"transformations":[91],"prevent":[93],"constraint":[94],"solvers":[95],"from":[96],"generating":[97],"feasible":[98],"inputs,":[99],"path-explosion":[101],"generate":[105],"an":[106],"excessive":[107],"number":[108],"of":[109,120,168],"execution":[110,114,135,148],"paths,":[111],"overwhelming":[112],"engines.":[115,136],"evaluate":[117],"the":[118,166],"effectiveness":[119],"our":[121,141],"approach,":[122],"we":[123],"implemented":[124],"prototype":[126],"tool":[128],"tested":[130],"it":[131],"prominent":[133],"Experimental":[137],"results":[138],"demonstrate":[139],"significantly":[143],"increases":[144],"resilience":[145],"attacks":[149],"while":[150],"maintaining":[151],"acceptable":[152],"performance":[153],"overhead.":[154],"This":[155],"provides":[157],"robust":[159],"scalable":[161],"technique,":[163],"contributing":[164],"enhancement":[167],"protection":[170],"strategies":[171],"in":[172],"adversarial":[173],"environments.":[174]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
