{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:24:03Z","timestamp":1742912643523,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_25","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T11:26:42Z","timestamp":1163590002000},"page":"352-368","source":"Crossref","is-referenced-by-count":1,"title":["An Attack on SMC-Based Software Protection"],"prefix":"10.1007","author":[{"given":"Yongdong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zhigang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Tian Wei","family":"Chui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Clarke, G.: DVD Jon Hacks Media Player File Encryption (September 02, 2005), http:\/\/www.theregister.co.uk\/2005\/09\/02\/dvd_jon_mediaplayer\/","key":"25_CR1"},{"unstructured":"IDA Pro Technologies & Features Highlights, http:\/\/www.datarescue.com\/idabase\/technologies.htm","key":"25_CR2"},{"unstructured":"MicroAPL Porting Tools, http:\/\/www.microapl.co.uk\/Porting\/index.html","key":"25_CR3"},{"unstructured":"Free Software Foundation. GNU Binary Utilities (March 2002), http:\/\/www.gnu.org\/software\/binutils\/manual\/","key":"25_CR4"},{"doi-asserted-by":"crossref","unstructured":"Schwarz, B., Debray, S., Andrews, G.: Disassembly of executable code revisited. In: 9th Working Conference on Reverse Engineering, pp. 45\u201354 (2002)","key":"25_CR5","DOI":"10.1109\/WCRE.2002.1173063"},{"unstructured":"rordbg, http:\/\/bbs.pediy.com\/upload\/2006\/8\/files\/rordbg.rar_116.rar","key":"25_CR6"},{"doi-asserted-by":"crossref","unstructured":"Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: 10th ACM Conference on Computer and Communications Security (CCS), pp. 290\u2013299 (2003)","key":"25_CR7","DOI":"10.1145\/948109.948149"},{"unstructured":"Davidson, R.L., Myhrvold, N.: Method and System for Generating and Auditing a Signature for a Computer Program, US Patent 5,559,884, Assignee: Microsoft Corp. (1996)","key":"25_CR8"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/10719724_25","volume-title":"Information Hiding","author":"J.P. Stern","year":"2000","unstructured":"Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.-J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 368\u2013378. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Mambo, M., Murayama, T., Okamoto, E.: A Tentative Approach to Constructing Tamper-Resistant Software. In: 1997 New Security Paradigms Workshop, pp. 23\u201333 (1993)","key":"25_CR10","DOI":"10.1145\/283699.283736"},{"doi-asserted-by":"crossref","unstructured":"Sosonkin, M., Naumovich, G., Memon, N.: Obfuscation of Design Intent in Object-oriented Applications. In: ACM Workshop On Digital Rights Management, pp. 142\u2013153 (2003)","key":"25_CR11","DOI":"10.1145\/947380.947399"},{"doi-asserted-by":"crossref","unstructured":"Wee, H.: On Obfuscating Point Functions. In: Annual ACM symposium on Theory of computing (STOC), pp. 523\u2013532 (2005)","key":"25_CR12","DOI":"10.1145\/1060590.1060669"},{"unstructured":"Kruegel, C., Robertson, W., Valeur, F., Vigna, G.: Static Disassembly of Obfuscated Binaries. In: USENIX security Symposium, pp. 255\u2013270 (2005)","key":"25_CR13"},{"key":"25_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-47870-1_10","volume-title":"Security and Privacy in Digital Rights Management","author":"H. Chang","year":"2002","unstructured":"Chang, H., Atallah, M.: Protecting Software Code by Guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, pp. 160\u2013175. Springer, Heidelberg (2002)"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/3-540-47870-1_9","volume-title":"Security and Privacy in Digital Rights Management","author":"B. Horne","year":"2002","unstructured":"Horne, B., Matheson, L.R., Sheehan, C., Endre Tarjan, R.: Dynamic Self-Checking Techniques for Improved Tamper Resistance. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, pp. 141\u2013159. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Wurster, G., van Oorschot, P.C., Somayaji, A.: A Generic Attack on Checksumming-based Software Tamper Resistance. In: IEEE Symposium on Security and Privacy, pp. 127\u2013138 (2005)","key":"25_CR16","DOI":"10.1109\/SP.2005.2"},{"issue":"2","key":"25_CR17","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/TDSC.2005.24","volume":"2","author":"P.C. Oorschot van","year":"2005","unstructured":"van Oorschot, P.C., Somayaji, A., Wurster, G.: Hardware assisted circumvention of self-hashing software tamper resistance. IEEE Transactions on Dependable and Secure Computing\u00a02(2), 82\u201392 (2005)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"doi-asserted-by":"crossref","unstructured":"Giffin, J.T., Christodorescu, M., Kruger, L.: Strengthening Software Self-Checksumming via Self-Modifying Code. In: 21st Annual Computer Security Applications Conference, pp. 23\u201332 (2005), http:\/\/www.cs.wisc.edu\/wisa\/papers\/acsac05\/GCK05.pdf","key":"25_CR18","DOI":"10.1109\/CSAC.2005.53"},{"doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity: Principles, Implementations, and Applications. In: ACM conference on Computer and communications security, pp. 340\u2013353 (2005)","key":"25_CR19","DOI":"10.1145\/1102120.1102165"},{"unstructured":"Christodorescu, M., Jha, S.: Static Analysis of Executables to Detect Malicious Patterns. In: USENIX Security Symposium, pp. 169\u2013186 (2003)","key":"25_CR20"},{"doi-asserted-by":"crossref","unstructured":"Kanzaki, Y., Monden, A., Nakamura, M., Matsumoto, K.-i.: Exploiting Self-Modification Mechanism for Program Protection. In: International Computer Software and Applications Conference (COMPSAC), pp. 170\u2013179 (2003)","key":"25_CR21","DOI":"10.1109\/CMPSAC.2003.1245338"},{"doi-asserted-by":"crossref","unstructured":"Albert, D.J., Morse, S.P.: Combating Software Piracy by Encryption and Key Management. Computer (April 1984)","key":"25_CR22","DOI":"10.1109\/MC.1984.1659112"},{"key":"25_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","volume-title":"Information Hiding","author":"D.W. Aucsmith","year":"1996","unstructured":"Aucsmith, D.W.: Tamper Resistant Software: An Implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 317\u2013333. Springer, Heidelberg (1996)"},{"unstructured":"Wang, P.: Tamper Resistance for Software Protection, Master Thesis, Information and Communications University, Korea (2005)","key":"25_CR24"},{"key":"25_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1007\/978-3-540-30501-9_117","volume-title":"Parallel and Distributed Computing: Applications and Technologies","author":"J. Lee","year":"2004","unstructured":"Lee, J., Kim, H., Yoon, H.: Tamper Resistant Software by Integrity-Based Encryption. In: Liew, K.-M., Shen, H., See, S., Cai, W. (eds.) PDCAT 2004. LNCS, vol.\u00a03320, pp. 608\u2013612. Springer, Heidelberg (2004)"},{"unstructured":"Maebe, J., De Bosschere, K.: Instrumenting Self-Modifying Code. In: Fifth Intl. Workshop on Automated and Algorithmic Debugging, September 2003, pp. 103\u2013113 (2003)","key":"25_CR26"},{"unstructured":"Microsoft Corporation, Microsoft Portable Executable and Common Object File Format Specification, Revision 6.0 (February 1999), http:\/\/www.microsoft.com\/whdc\/system\/platform\/firmware\/PECOFF.mspx","key":"25_CR27"},{"unstructured":"The gzip compression program, http:\/\/www.gzip.org\/","key":"25_CR28"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T23:14:35Z","timestamp":1736637275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/11935308_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}