{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:35:01Z","timestamp":1742394901794},"publisher-location":"Berlin, Heidelberg","reference-count":52,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201762"},{"type":"electronic","value":"9783540399810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/10958513_1","type":"book-chapter","created":{"date-parts":[[2006,7,6]],"date-time":"2006-07-06T11:00:21Z","timestamp":1152183621000},"page":"1-13","source":"Crossref","is-referenced-by-count":33,"title":["Revisiting Software Protection"],"prefix":"10.1007","author":[{"given":"Paul C.","family":"van Oorschot","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic Security for Mobile Code. In: Proc. 2001 IEEE Symposium on Security and Privacy, pp. 2\u201311 (May 2001)","DOI":"10.1109\/SECPRI.2001.924283"},{"key":"1_CR2","unstructured":"Anderson, R.: Trusted Computing FAQ \u2013 TCPA\/Palladium\/NGSCB\/TCG, http:\/\/www.cl.cam.ac.uk\/~rja14\/tcpa-faq.html"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R.J. Anderson","year":"1997","unstructured":"Anderson, R.J., Kuhn, M.G.: Low Cost Attacks on Tamper-Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1997)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A Secure and Reliable Bootstrap Architecture. In: Proc. 1997 IEEE Symp. Security and Privacy, pp. 65\u201371 (May 1997)","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"1_CR5","unstructured":"Arbaugh, W.A., Farber, D.J., Keromytis, A.D., Smith, J.M.: Secure and Reliable Bootstrap Architecture, U.S. Patent 6,185,678 (filed October 2 1998; issued February 6 2001)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","first-page":"317","volume-title":"Information Hiding","author":"D. Aucsmith","year":"1997","unstructured":"Aucsmith, D.: Tamper Resistant Software: An Implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 317\u2013333. Springer, Heidelberg (1997)"},{"key":"1_CR7","unstructured":"Aucsmith, D., Graunke, G.: Tamper Resistant Methods and Apparatus, U.S. Patent 5,892,899 (filed June 13 1996; issued April 6 1999)"},{"volume-title":"Trusted Computing Platforms: TCPA Technology in Context","year":"2002","key":"1_CR8","unstructured":"Balacheff, B., Chen, L., Pearson, S., Plaquin, D., Proudler, G. (eds.): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall, Englewood Cliffs (2002)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997); Revised: Technion - C.S. Dept. - Technical Report CS0910-revised (1997)"},{"issue":"2","key":"1_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Eliminating Errors in Cryptographic Computations. J. Cryptology\u00a014(2), 101\u2013119 (2001)","journal-title":"J. Cryptology"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-47870-1_10","volume-title":"Security and Privacy in Digital Rights Management","author":"H. Chang","year":"2002","unstructured":"Chang, H., Atallah, M.: Protecting Software Code by Guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, pp. 160\u2013175. Springer, Heidelberg (2002)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/3-540-36415-3_26","volume-title":"Information Hiding","author":"Y. Chen","year":"2003","unstructured":"Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.: Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 400\u2013414. Springer, Heidelberg (2003)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-68671-1_1","volume-title":"Mobile Agents and Security","author":"D.M. Chess","year":"1998","unstructured":"Chess, D.M.: Security Issues in Mobile Code Systems. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 1\u201314. Springer, Heidelberg (1998)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-45439-X_10","volume-title":"Information Security","author":"S. Chow","year":"2001","unstructured":"Chow, S., Gu, Y., Johnson, H., Zakharov, V.A.: An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, pp. 144\u2013155. Springer, Heidelberg (2001)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Nickerson, J.R., Chow, S.T., Johnson, H.J., Gu, Y.: The Encoder Solution to Implementing Tamper Resistant Software. Presented at the CERT\/IEEE Information Survivability Workshop, Vancouver (October 2001)","DOI":"10.1145\/1232454.1232477"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-36492-7_17","volume-title":"Selected Areas in Cryptography","author":"S. Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: White-Box Cryptography and an AES Implementation. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 250\u2013270. Springer, Heidelberg (2003)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-44993-5_1","volume-title":"Digital Rights Management","author":"S. Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: A White-Box DES Implementation for DRM Applications. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, pp. 1\u201315. Springer, Heidelberg (2003) (to appear)"},{"issue":"6","key":"1_CR19","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1016\/0167-4048(93)90054-9","volume":"12","author":"F. Cohen","year":"1993","unstructured":"Cohen, F.: Operating System Protection Through Program Evolution. Computers and Security\u00a012(6), 565\u2013584 (1993)","journal-title":"Computers and Security"},{"key":"1_CR20","unstructured":"Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations., Technical Report 148, Dept. Computer Science, University of Auckland (July 1997)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. In: Proc. Symp. Principles of Programming Languages (POPL 1998) (January 1998)","DOI":"10.1145\/268946.268962"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Breaking Abstractions and Unstructuring Data Structures. In: IEEE International Conf. Computer Languages (ICCL 1998) (May 1998)","DOI":"10.1109\/ICCL.1998.674154"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Collberg, C.S., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. IEEE Trans. Software Engineering\u00a028(6) (June 2002)","DOI":"10.1109\/TSE.2002.1027797"},{"key":"1_CR24","volume-title":"The Design of Rijndael: aes \u2013 The Advanced Encryption Standard","author":"J. Daemen","year":"2001","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: aes \u2013 The Advanced Encryption Standard. Springer, Heidelberg (2001)"},{"key":"1_CR25","unstructured":"ComputerWeekly.com, U.S. Software Security Takes Off, November 8 (2002), http:\/\/www.computerweekly.com\/Article117316.htm"},{"key":"1_CR26","unstructured":"England, P., DeTreville, J.D., Lampson, B.W.: Digital Rights Management Operating System, U.S. Patent 6,330,670 (filed January 8 1999; issued December 11 2001)"},{"key":"1_CR27","unstructured":"England, P., DeTreville, J.D., Lampson, B.W.: Loading and Identifying a Digital Rights Management Operating System, U.S. Patent 6,327,652 (filed January 8 1999; issued December 4 2001)"},{"key":"1_CR28","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/HOTOS.1997.595185","volume-title":"Proc. 6th Workshop on Hot Topics in Operating Systems","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Somayaji, A., Ackley, D.H.: Building Diverse Computer Systems. In: Proc. 6th Workshop on Hot Topics in Operating Systems, pp. 67\u201372. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"1_CR29","volume-title":"Computers and Intractability - A Guide to the Theory of NP-Completeness","author":"M.R. Garey","year":"1979","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability - A Guide to the Theory of NP-Completeness. W.H. Freeman and Company, New York (1979)"},{"issue":"3","key":"1_CR30","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on Oblivious RAMs. Journal of the ACM\u00a043(3), 431\u2013473 (1996); Based on earlier ideas of Goldreich (STOC 1987) and Ostrovsky (STOC 1990)","journal-title":"Journal of the ACM"},{"key":"1_CR31","series-title":"Lecture Notes in Computer Science","first-page":"140","volume-title":"Advances in Cryptology","author":"J. Gosler","year":"1985","unstructured":"Gosler, J.: Software Protection: Myth or Reality? In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 140\u2013157. Springer, Heidelberg (1985)"},{"key":"1_CR32","unstructured":"Gutmann, P.: An Open-source Cryptographic Co-processor. In: Proc, USENIX Security Symposium (2000)"},{"issue":"4","key":"1_CR33","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1145\/29868.29872","volume":"5","author":"A. Herzberg","year":"1987","unstructured":"Herzberg, A., Pinter, S.S.: Public protection of software. ACM Trans. Computer Systems\u00a05(4), 371\u2013393 (1987); Earlier version in Crypto 1985","journal-title":"ACM Trans. Computer Systems"},{"key":"1_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/3-540-47870-1_9","volume-title":"Security and Privacy in Digital Rights Management","author":"B. Horne","year":"2002","unstructured":"Horne, B., Matheson, L., Sheehan, C., Tarjan, R.: Dynamic Self-Checking Techniques for Improved Tamper Resistance. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, pp. 141\u2013159. Springer, Heidelberg (2002)"},{"key":"1_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-44993-5_2","volume-title":"Digital Rights Management","author":"M. Jacob","year":"2003","unstructured":"Jacob, M., Boneh, D., Felton, E.: Attacking an Obfuscated Cipher by Injecting Faults. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, pp. 16\u201331. Springer, Heidelberg (2003) (to appear)"},{"key":"1_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-47870-1_1","volume-title":"Security and Privacy in Digital Rights Management","author":"M. Jakobsson","year":"2002","unstructured":"Jakobsson, M., Reiter, M.K.: Discouraging Software Piracy Using Software Aging. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, pp. 1\u201312. Springer, Heidelberg (2002)"},{"key":"1_CR37","unstructured":"Kent, S.: Protecting Externally Supplied Software in Small Computers, Ph.D. thesis, M.I.T. (September 1980)"},{"key":"1_CR38","unstructured":"Kerckhoffs, A.: La Cryptographie Militaire. Journal des Sciences Militaires\u00a09 (February 1883)"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., Horowitz, M.: Architectural Support for Copy and Tamper Resistant Software. In: Proc. 9th International Conf. Architectural Support for Programming Languages and Operating Systems (November 2000)","DOI":"10.21236\/ADA419599"},{"key":"1_CR40","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"1_CR41","unstructured":"Next-Generation Secure Computing Base (formerly Palladium), Microsoft web site, http:\/\/www.microsoft.com\/resources\/ngscb\/default.mspx"},{"key":"1_CR42","unstructured":"Next-Generation Secure Computing Base - Technical FAQ, Microsoft web site, http:\/\/www.microsoft.com\/technet\/security\/news\/NGSCB.asp"},{"key":"1_CR43","unstructured":"Ogiso, T., Sakabe, U., Soshi, M., Miyaji, A.: Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis. In: 3rd Workshop on Information Security Applications (WISA 2002), Korea (August 2002)"},{"issue":"7","key":"1_CR44","first-page":"1062","volume":"87","author":"F. Petitcolas","year":"1999","unstructured":"Petitcolas, F., Anderson, R.J., Kuhn, M.G.: Information Hiding \u2013 A Survey. Proc. of the IEEE (Special Issue on Protection of Multimedia Content)\u00a087(7), 1062\u20131078 (1999)","journal-title":"Proc. of the IEEE (Special Issue on Protection of Multimedia Content)"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Sander, T., Tschudin, C.F.: Towards Mobile Cryptography. In: Proc. 1998 IEEE Symposium on Security and Privacy, pp. 215\u2013224 (1998)","DOI":"10.1109\/SECPRI.1998.674837"},{"key":"1_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","volume-title":"Mobile Agents and Security","author":"T. Sander","year":"1998","unstructured":"Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 44\u201360. Springer, Heidelberg (1998)"},{"key":"1_CR47","unstructured":"Schneider, F. (ed.): Trust in Cyberspace, report of the Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board (U.S.) National Research Council. National Academy Press (1999)"},{"key":"1_CR48","unstructured":"Trusted Computing Group, http:\/\/www.trustedcomputinggroup.org\/home"},{"key":"1_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-48390-X_9","volume-title":"Financial Cryptography","author":"A. Shamir","year":"1999","unstructured":"van Someren, N., Shamir, A.: Playing Hide and Seek with Keys. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, pp. 118\u2013124. Springer, Heidelberg (1999)"},{"key":"1_CR50","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/978-1-4612-1872-2_12","volume-title":"Complexity Theory Retrospective II","author":"J. Wang","year":"1997","unstructured":"Wang, J.: Average-Case Computational Complexity Theory. In: Hemaspaandra, L., Selman, A. (eds.) Complexity Theory Retrospective II, pp. 295\u2013328. Springer, Heidelberg (1997)"},{"key":"1_CR51","unstructured":"Wang, C., Hill, J., Knight, J., Davidson, J.: Software Tamper Resistance: Obstructing Static Analysis of Programs., Dept. of Computer Science, Univ. of Virginia, Tech. Report CS-2000-12, Updated in [52] (May 2000)"},{"key":"1_CR52","unstructured":"Wang, C.: A Security Architecture for Survivability Mechanisms, Ph.D. thesis, University of Virginia (October 2000)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10958513_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T21:14:25Z","timestamp":1555708465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10958513_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201762","9783540399810"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/10958513_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}