{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:25:01Z","timestamp":1775053501621,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540232087","type":"print"},{"value":"9783540301448","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_36","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"428-440","source":"Crossref","is-referenced-by-count":16,"title":["The Obfuscation Executive"],"prefix":"10.1007","author":[{"given":"Kelly","family":"Heffner","sequence":"first","affiliation":[]},{"given":"Christian","family":"Collberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"Appel, A.: Deobfuscation is in np, \n                    \n                      http:\/\/www.cs.princeton.edu\/~appel\/papers\/deobfus.pdf"},{"key":"36_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of software obfuscation. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"issue":"4","key":"36_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSECP.2003.1219058","volume":"1","author":"C. Collberg","year":"2003","unstructured":"Collberg, C., Myles, G., Huntwork, A.: Sandmark - a tool for software protection research. IEEE Security and Privacy\u00a01(4), 40\u201349 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: POPL 1999, San Antonio, TX (January 1999)","DOI":"10.1145\/292540.292569"},{"key":"36_CR5","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland (July 1997)"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: POPL 1998, San Diego, CA (January 1998)","DOI":"10.1145\/268946.268962"},{"key":"36_CR7","unstructured":"Lacey, D., de Moor, O.: Detecting disabling interference between program transformations, \n                    \n                      citeseer.nj.nec.com\/464977.html"},{"issue":"2","key":"36_CR8","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/857076.857090","volume":"35","author":"S. Purao","year":"2003","unstructured":"Purao, S., Vaishnavi, V.: Product metrics for object-oriented systems. ACM Comput.\u00a035(2), 191\u2013221 (2003)","journal-title":"ACM Comput."},{"key":"36_CR9","unstructured":"Vliet, H.P.V.: Crema \u2014 The Java obfuscator, \n                    \n                      web.inter.nl.net\/users\/H.P.van.Vliet\/crema.html\n                    \n                    \n                   (January 1996)"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Whitfield, D., Soffa, M.L.: An approach to ordering optimizing transformations. In: PPOPP 1990, pp. 137\u2013146 (1990)","DOI":"10.1145\/99163.99179"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Whitfield, D., Soffa, M.L.: Automatic generation of global optimizers. In: PLDI 1991, pp. 120\u2013129 (1991)","DOI":"10.1145\/113445.113456"},{"key":"36_CR12","unstructured":"Wroblewski, G.: A General Method of Program Code Obfuscation. PhD thesis, Wroclaw University (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:52:31Z","timestamp":1620013951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}