{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:53:56Z","timestamp":1743076436466,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030525804"},{"type":"electronic","value":"9783030525811"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52581-1_1","type":"book-chapter","created":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T09:05:00Z","timestamp":1593767100000},"page":"3-8","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering"],"prefix":"10.1007","author":[{"given":"Salsabil","family":"Hamadache","sequence":"first","affiliation":[]},{"given":"Malte","family":"Elson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,4]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Fyrbiak, M., Strau\u00df, S., Kison, C., Wallat, S., Elson, M., Rummel, N., Paar, C.: Hardware reverse engineering: overview and open challenges. In: 2017 IEEE 2nd International Verification and Security Workshop (IVSW), pp. 88\u201394. IEEE (July 2017)","DOI":"10.1109\/IVSW.2017.8031550"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.3389\/fpsyg.2017.01153","volume":"8","author":"D D\u00f6rner","year":"2017","unstructured":"D\u00f6rner, D., Funke, J.: Complex problem solving: what it is and what it is not. Front. Psychol. 8, 1153 (2017)","journal-title":"Front. Psychol."},{"issue":"5","key":"1_CR3","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TSE.2002.1000450","volume":"28","author":"D Hendrix","year":"2002","unstructured":"Hendrix, D., Cross, J.H., Maghsoodloo, S.: The effectiveness of control structure diagrams in source code comprehension activities. IEEE Trans. Softw. Eng. 28(5), 463\u2013477 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Schrittwieser, S., Katzenbeisser, S., Kieseberg, P., Huber, M., Leithner, M., Mulazzani, M., Weippl, E.: Covert computation: hiding code in code for obfuscation purposes. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 529\u2013534. ACM (May 2013)","DOI":"10.1145\/2484313.2484384"},{"issue":"4","key":"1_CR5","first-page":"86","volume":"6","author":"J Park","year":"2015","unstructured":"Park, J., Kim, H., Jeong, Y., Cho, S.J., Han, S., Park, M.: Effects of code obfuscation on android app similarity analysis. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 6(4), 86\u201398 (2015)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"issue":"4","key":"1_CR6","first-page":"1040","volume":"19","author":"M Ceccato","year":"2014","unstructured":"Ceccato, M., Di Penta, M., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empir. Softw. Eng. 19(4), 1040\u20131074 (2014)","journal-title":"Empir. Softw. Eng."},{"key":"1_CR7","unstructured":"H\u00e4nsch, N., Schankin, A., Protsenko, M., Freiling, F., Benenson, Z.: Programming experience might not help in comprehending obfuscated source code efficiently. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 341\u2013356 (2018)"},{"issue":"3","key":"1_CR8","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TE.2016.2636125","volume":"60","author":"ST Hamman","year":"2017","unstructured":"Hamman, S.T., Hopkinson, K.M., Markham, R.L., Chaplik, A.M., Metzler, G.E.: Teaching game theory to improve adversarial thinking in cybersecurity students. IEEE Trans. Educ. 60(3), 205\u2013211 (2017)","journal-title":"IEEE Trans. Educ."},{"key":"1_CR9","unstructured":"D\u00f6rner, D., Kreuzig, H.W., Reither, F., St\u00e4udel, T.: Lohhausen: Vom Umgang mit Unbestimmtheit und Komplexit\u00e4t. [Lohhausen: dealing with indefiniteness and complexity] (1983)"},{"key":"1_CR10","unstructured":"Summers, T.C.: How hackers think: a mixed method study of mental models and cognitive patterns of high-tech wizards (Doctoral dissertation, Case Western Reserve University) (2015)"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1006\/game.1995.1031","volume":"10","author":"D Stahl","year":"1995","unstructured":"Stahl, D., Wilson, P.: On players\u2019 models of other players: theory and experimental evidence. Games Econ. Behav. 10, 218\u2013254 (1995)","journal-title":"Games Econ. Behav."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Human Factors in Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52581-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T09:08:39Z","timestamp":1593767319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52581-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030525804","9783030525811"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52581-1_1","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AHFE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Human Factors and Ergonomics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ahfe2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ahfe2020.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}