{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:07:32Z","timestamp":1730315252437,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100002994","name":"Ministry of Knowledge Economy","doi-asserted-by":"publisher","award":["NIPA-2009-C1090-0902-0045"],"id":[{"id":"10.13039\/501100002994","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["R31-2008-000-10100-0"],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003665","name":"National IT Industry Promotion Agency","doi-asserted-by":"publisher","award":["NIPA-2009-C1090-0902-0045"],"id":[{"id":"10.13039\/501100003665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,13]]},"DOI":"10.1145\/1755688.1755722","type":"proceedings-article","created":{"date-parts":[[2010,4,16]],"date-time":"2010-04-16T14:28:35Z","timestamp":1271428115000},"page":"271-281","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["binOb+"],"prefix":"10.1145","author":[{"given":"Byoungyoung","family":"Lee","sequence":"first","affiliation":[{"name":"Pohang University of Science and Technology (POSTECH), Nam-gu, Pohang, Republic of Korea"}]},{"given":"Yuna","family":"Kim","sequence":"additional","affiliation":[{"name":"Pohang University of Science and Technology (POSTECH), Nam-gu, Pohang, Republic of Korea"}]},{"given":"Jong","family":"Kim","sequence":"additional","affiliation":[{"name":"Pohang University of Science and Technology (POSTECH), Nam-gu, Pohang, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2010,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Data Rescue. IDA Pro. http:\/\/www.datarescue.com\/idabase. Data Rescue. IDA Pro. http:\/\/www.datarescue.com\/idabase."},{"key":"e_1_3_2_1_2_1","unstructured":"Microsoft Corporation. DumpBin. http:\/\/support.microsoft.com\/kb\/177429. Microsoft Corporation. DumpBin. http:\/\/support.microsoft.com\/kb\/177429."},{"key":"e_1_3_2_1_3_1","first-page":"169","volume-title":"Proceedings of the 12th conference on USENIX Security Symposium","author":"Christodorescu M.","year":"2003","unstructured":"M. Christodorescu and S. Jha . Static analysis of executables to detect malicious patterns . In Proceedings of the 12th conference on USENIX Security Symposium , pages 169 -- 186 . USENIX Association , 2003 . M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In Proceedings of the 12th conference on USENIX Security Symposium, pages 169--186. USENIX Association, 2003."},{"key":"e_1_3_2_1_4_1","volume-title":"Operating system protection through program evolution","author":"Cohen F. B.","year":"1992","unstructured":"F. B. Cohen . Operating system protection through program evolution , 1992 . http:\/\/all.net\/books\/IP\/evelve.html. F. B. Cohen. Operating system protection through program evolution, 1992. http:\/\/all.net\/books\/IP\/evelve.html."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/857172.857242"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_2_1_7_1","volume-title":"Reversing: secrets of reverse engineering","author":"Eilam E.","year":"2005","unstructured":"E. Eilam . Reversing: secrets of reverse engineering . Wiley , 2005 . E. Eilam. Reversing: secrets of reverse engineering. Wiley, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.71"},{"key":"e_1_3_2_1_9_1","unstructured":"GNU Project-Free Software Foundation. Objdump GNU Manuals Online. http:\/\/sourceware.org\/binutils\/docs\/binutils\/objdump.html. GNU Project-Free Software Foundation. Objdump GNU Manuals Online. http:\/\/sourceware.org\/binutils\/docs\/binutils\/objdump.html."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014105"},{"key":"e_1_3_2_1_11_1","first-page":"161","volume-title":"Proceedings of the 14th conference on USENIX Security Symposium","author":"Kruegel C.","year":"2005","unstructured":"C. Kruegel , E. Kirda , D. Mutz , W. Robertson , and G. Vigna . Automating mimicry attacks using static binary analysis . In Proceedings of the 14th conference on USENIX Security Symposium , pages 161 -- 176 . USENIX Association , 2005 . C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In Proceedings of the 14th conference on USENIX Security Symposium, pages 161--176. USENIX Association, 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 13th USENIX Security Symposium. USENIX Association","author":"Kruegel C.","year":"2004","unstructured":"C. Kruegel , W. Robertson , F. Valeur , and G. Vigna . Static disassembly of obfuscated binaries . In Proceedings of the 13th USENIX Security Symposium. USENIX Association , 2004 . C. Kruegel, W. Robertson, F. Valeur, and G. Vigna. Static disassembly of obfuscated binaries. In Proceedings of the 13th USENIX Security Symposium. USENIX Association, 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1992.228218"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.242"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89900-6_21"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_18_1","first-page":"19","article-title":"A Crash Course on the Depths of Win32 {R} Structured Exception Handling","volume":"6","author":"Pietrek M.","year":"1997","unstructured":"M. Pietrek . A Crash Course on the Depths of Win32 {R} Structured Exception Handling . Microsoft Systems Journal-UK- , 6 : 19 -- 33 , 1997 . M. Pietrek. A Crash Course on the Depths of Win32 {R} Structured Exception Handling. Microsoft Systems Journal-UK-, 6:19--33, 1997.","journal-title":"Microsoft Systems Journal-UK-"},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"Proceedings of the 16th USENIX Security Symposium","author":"Popov I. V.","year":"2007","unstructured":"I. V. Popov , S. K. Debray , and G. R. Andrews . Binary obfuscation using signals . In Proceedings of the 16th USENIX Security Symposium , pages 1 -- 16 . USENIX Association , 2007 . I. V. Popov, S. K. Debray, and G. R. Andrews. Binary obfuscation using signals. In Proceedings of the 16th USENIX Security Symposium, pages 1--16. USENIX Association, 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2007.18"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_5"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 15th Annual Network and Distributed System Security Symposium. The Internet Society","author":"Sharif M.","year":"2008","unstructured":"M. Sharif , A. Lanzi , J. Giffin , and W. Lee . Impeding malware analysis using conditional code obfuscation . In Proceedings of the 15th Annual Network and Distributed System Security Symposium. The Internet Society , 2008 . M. Sharif, A. Lanzi, J. Giffin, and W. Lee. Impeding malware analysis using conditional code obfuscation. In Proceedings of the 15th Annual Network and Distributed System Security Symposium. The Internet Society, 2008."},{"key":"e_1_3_2_1_23_1","first-page":"155","volume-title":"Proceedings of the 1008 USENIX Annual Technical Conference","author":"Staelin C.","year":"1998","unstructured":"C. Staelin and L. McVoy . mhz: anatomy of a micro-benchmark . In Proceedings of the 1008 USENIX Annual Technical Conference , pages 155 -- 166 . USENIX Association , 1998 . C. Staelin and L. McVoy. mhz: anatomy of a micro-benchmark. In Proceedings of the 1008 USENIX Annual Technical Conference, pages 155--166. USENIX Association, 1998."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-44599-1_11"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/568235.568237"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.37"},{"key":"e_1_3_2_1_27_1","volume-title":"Pattern recognition","author":"Theodoridis S.","year":"2006","unstructured":"S. Theodoridis and K. Koutroumbas . Pattern recognition . Academic press , 2006 . S. Theodoridis and K. Koutroumbas. Pattern recognition. Academic press, 2006."},{"key":"e_1_3_2_1_28_1","unstructured":"US-Cert. Advisory CA-2001-10 Code Red Worm. http:\/\/www.cert.org\/advisories\/CA-2001-19.html. US-Cert. Advisory CA-2001-10 Code Red Worm. http:\/\/www.cert.org\/advisories\/CA-2001-19.html."},{"key":"e_1_3_2_1_29_1","unstructured":"US-Cert. Advisory CA-2003-04 MS-SQL Server Worm. http:\/\/www.cert.org\/advisories\/CA-2003-04.html. US-Cert. Advisory CA-2003-04 MS-SQL Server Worm. http:\/\/www.cert.org\/advisories\/CA-2003-04.html."},{"key":"e_1_3_2_1_31_1","unstructured":"O. Yuschuk. OllyDbg. http:\/\/www.ollydbg.de. O. Yuschuk. OllyDbg. http:\/\/www.ollydbg.de."}],"event":{"name":"ASIA CCS '10: 5th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Beijing China","acronym":"ASIA CCS '10"},"container-title":["Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1755688.1755722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T21:00:08Z","timestamp":1673125208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1755688.1755722"}},"subtitle":["a framework for potent and stealthy binary obfuscation"],"short-title":[],"issued":{"date-parts":[[2010,4,13]]},"references-count":30,"alternative-id":["10.1145\/1755688.1755722","10.1145\/1755688"],"URL":"https:\/\/doi.org\/10.1145\/1755688.1755722","relation":{},"subject":[],"published":{"date-parts":[[2010,4,13]]},"assertion":[{"value":"2010-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}