{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:01:14Z","timestamp":1726408874785},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238289"},{"type":"electronic","value":"9783319238296"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23829-6_21","type":"book-chapter","created":{"date-parts":[[2015,11,7]],"date-time":"2015-11-07T11:06:53Z","timestamp":1446894413000},"page":"287-304","source":"Crossref","is-referenced-by-count":0,"title":["Control Flow Obfuscation Using Neural Network to Fight Concolic Testing"],"prefix":"10.1007","author":[{"given":"Haoyu","family":"Ma","sequence":"first","affiliation":[]},{"given":"Xinjie","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Weijie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhipeng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Chunfu","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,8]]},"reference":[{"issue":"1","key":"21_CR1","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1002\/stvr.309","volume":"15","author":"G Lee","year":"2005","unstructured":"Lee, G., Morris, J., Parker, K., Bundell, G.A., Lam, P.: Using symbolic execution to guide test generation. Softw. Test. Verif. Rel. 15(1), 41\u201361 (2005)","journal-title":"Softw. Test. Verif. Rel."},{"key":"21_CR2","unstructured":"Molnar, D., Li, X.C., Wagner, D.A.: Dynamic test generation to find integer bugs in x86 binary linux programs. In: Proceedings of the 18th Conference on USENIX Security Symposium (USENIX Security), pp. 67\u201382 (2009)"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P), pp. 231\u2013245 (2007)","DOI":"10.1109\/SP.2007.17"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Sen, K., Marinov, D., Agha, G.: Cute: A concolic unit testing engine for c. In: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC\/FSE), pp. 263\u2013272 (2005)","DOI":"10.1145\/1081706.1081750"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/11817963_38","volume-title":"Computer Aided Verification","author":"K Sen","year":"2006","unstructured":"Sen, K., Agha, G.: CUTE and jCUTE: concolic unit testing and explicit path model-checking tools. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 419\u2013423. Springer, Heidelberg (2006)"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: Dart: directed automated random testing. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). (2005) 213\u2013223","DOI":"10.1145\/1065010.1065036"},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"10:1","DOI":"10.1145\/1455518.1455522","volume":"12","author":"C Cadar","year":"2008","unstructured":"Cadar, C., Ganesh, V., Pawlowski, P.M., Dill, D.L., Engler, D.R.: Exe: automatically generating inputs of death. ACM Trans. Inf. Syst. Secur. (TISSEC) 12(2), 10:1\u201310:38 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"21_CR8","unstructured":"Williams, N., Marre, B., Mouy, P.: On-the-fly generation of k-path tests for c functions. In: Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE), pp. 290\u2013293 (2004)"},{"key":"21_CR9","unstructured":"Cadar, C., Dunbar, D., Engler, D.R.: Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp. 209\u2013224 (2008)"},{"issue":"2","key":"21_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MS.2011.34","volume":"28","author":"P Falcarin","year":"2011","unstructured":"Falcarin, P., Collberg, C., Atallah, M., Jakubowski, M.: Guest editors\u2019 introduction: software protection. IEEE Softw. 28(2), 24\u201327 (2011)","journal-title":"IEEE Softw."},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-23822-2_12","volume-title":"Computer Security\u2013ESORICS 2011","author":"Z Wang","year":"2011","unstructured":"Wang, Z., Ming, J., Jia, C., Gao, D.: Linear obfuscation to combat symbolic execution. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 210\u2013226. Springer, Heidelberg (2011)"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Falcarin, P., Carlo, S.D., Cabutto, A., Garazzino, N., Barberis, D.: Exploiting code mobility for dynamic binary obfuscation. In: Proceedings of the 2011 World Congress on Internet Security (WorldCIS), pp. 114\u2013120 (2011)","DOI":"10.1109\/WorldCIS17046.2011.5749894"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Wang, Z., Jia, C., Liu, M., Yu, X.: Branch obfuscation using code mobility and signal. In: Proceedings of the 36th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 16\u201320 (2012)","DOI":"10.1109\/COMPSACW.2012.102"},{"key":"21_CR14","unstructured":"Sharif, M., Lanzi, A., Giffin, J., Lee, W.: Impeding malware analysis using conditional code obfuscation. In: Proceedings of the 16th Annual Network & Distributed System Security Symposium (NDSS)(2008)"},{"key":"21_CR15","unstructured":"Popov, I., Debray, S., Andrews, G.: Binary obfuscation using signals. In: Proceedings of the 16th Conference on USENIX Security Symposium (USENIX Security), pp. 275\u2013290 (2007)"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-24178-9_19","volume-title":"Information Hiding","author":"S Schrittwieser","year":"2011","unstructured":"Schrittwieser, S., Katzenbeisser, S.: Code obfuscation against static and dynamic reverse engineering. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 270\u2013284. Springer, Heidelberg (2011)"},{"issue":"6","key":"21_CR17","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/72.728352","volume":"9","author":"AB Tickle","year":"1998","unstructured":"Tickle, A.B., Andrews, R., Golea, M., Diederich, J.: The truth will come to light: directions and challenges in extracting the knowledge embedded within trained artificial neural networks. IEEE Trans. Neural Netw. 9(6), 1057\u20131068 (1998)","journal-title":"IEEE Trans. Neural Netw."},{"key":"21_CR18","unstructured":"Golea, M.: On the complexity of rule extraction from neural networks and network querying. In: Proceedings of the Rule Extraction From Trained Artificial Neural Networks Workshop, Society For the Study of Artificial Intelligence and Simulation of Behavior Workshop Series (AISB), pp. 51\u201359 (1996)"},{"issue":"1","key":"21_CR19","first-page":"71","volume":"13","author":"GG Towell","year":"1993","unstructured":"Towell, G.G., Shavlik, J.W.: The extraction of refined rules from knowledge based neural networks. Mach. Learn. 13(1), 71\u2013101 (1993)","journal-title":"Mach. Learn."},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Information Systems Security","author":"D Song","year":"2008","unstructured":"Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: a new approach to computer security via binary analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 1\u201325. Springer, Heidelberg (2008)"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Qu, X., Robinson, B.: A case study of concolic testing tools and their limitations. In: Proceedings of 2011 International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 117\u2013126 (2011)","DOI":"10.1109\/ESEM.2011.20"},{"key":"21_CR22","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscation transformations. Technical report 148, Department of Computer Science, The University of Auckland (1997)"},{"issue":"4","key":"21_CR23","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/BF02551274","volume":"2","author":"G Cybenko","year":"1989","unstructured":"Cybenko, G.: Approximations by superpositions of sigmoidal functions. Math. Control Signals Syst. 2(4), 303\u2013314 (1989)","journal-title":"Math. Control Signals Syst."},{"issue":"2","key":"21_CR24","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0893-6080(91)90009-T","volume":"4","author":"K Hornik","year":"1991","unstructured":"Hornik, K.: Approximation capabilities of multilayer feedforward networks. Neural Networks 4(2), 251\u2013257 (1991)","journal-title":"Neural Networks"},{"issue":"4\u20136","key":"21_CR25","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1016\/j.neucom.2008.04.007","volume":"72","author":"C Johansson","year":"2009","unstructured":"Johansson, C., Lansner, A.: Implementing plastic weights in neural networks using low precision arithmetic. Neurocomputing 72(4\u20136), 968\u2013972 (2009)","journal-title":"Neurocomputing"},{"issue":"8","key":"21_CR26","doi-asserted-by":"publisher","first-page":"2724","DOI":"10.1109\/78.229903","volume":"41","author":"C Tang","year":"1993","unstructured":"Tang, C., Kwan, H.K.: Multilayer feedforward neural networks with single powers-of-two weights. IEEE Trans. Signal Process. 41(8), 2724\u20132727 (1993)","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"21_CR27","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/S0893-6080(02)00032-1","volume":"15","author":"S Draghici","year":"2002","unstructured":"Draghici, S.: On the capabilities of neural networks using limited precision weights. Neural Networks 15(3), 395\u2013414 (2002)","journal-title":"Neural Networks"},{"key":"21_CR28","unstructured":"Moerland, P., Fiesler, E.: Hardware-friendly learning algorithms for neural networks: an overview. In: Proceedings of 5th International Conference on Microelectronics for Neural Networks, pp. 117\u2013124 (1996)"},{"issue":"5","key":"21_CR29","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1145\/186025.186041","volume":"16","author":"G Ramalingam","year":"1994","unstructured":"Ramalingam, G.: The undecidability of aliasing. ACM Trans. Program. Lang. Syst. (TOPLAS) 16(5), 1467\u20131471 (1994)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Ghiya, R., Hendren, L.J.: Is it a tree, a dag, or a cyclic graph? a shape analysis for heap-directed pointers in c. In: Proceedings of the 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), pp. 1\u201315 (1996)","DOI":"10.1145\/237721.237724"},{"key":"21_CR31","unstructured":"Eberhart, R.C., Shi, Y.: Particle swarm optimization: developments, applications and resources. In: Proceedings of the 2001 Congress on Evolutionary Computation (CEC), pp. 81\u201386 (2001)"},{"issue":"2","key":"21_CR32","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1016\/j.amc.2006.07.025","volume":"185","author":"JR Zhang","year":"2007","unstructured":"Zhang, J.R., Zhang, J., Lok, T.M., Lyu, M.R.: A hybrid particle swarm optimization-back-propagation algorithm for feedforward neural network training. Appl. Math. Comput. 185(2), 1026\u20131037 (2007)","journal-title":"Appl. Math. Comput."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","International Conference on Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23829-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T19:51:40Z","timestamp":1692129100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23829-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238289","9783319238296"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23829-6_21","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}