{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:36:11Z","timestamp":1775054171678,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540208136","type":"print"},{"value":"9783540398660","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39866-0_11","type":"book-chapter","created":{"date-parts":[[2010,10,25]],"date-time":"2010-10-25T16:30:09Z","timestamp":1288024209000},"page":"91-102","source":"Crossref","is-referenced-by-count":7,"title":["On the Possibility of Provably Secure Obfuscating Programs"],"prefix":"10.1007","author":[{"given":"Nikolay P.","family":"Varnovsky","sequence":"first","affiliation":[]},{"given":"Vladimir A.","family":"Zakharov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","volume-title":"Fundamentals of Computer Security Technology","author":"E.G. Amoroso","year":"1994","unstructured":"Amoroso, E.G.: Fundamentals of Computer Security Technology. Prentice Hall PTR, Englewood Cliffs (1994)"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vedhan, S., Yang, K.: On the (Im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Chow, S., Gu, Y., Johnson, H., Zakharov, V.: An approach to the obfuscation of control flow of sequential computer programs. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, pp. 144\u2013156. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45439-X_10"},{"key":"11_CR4","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations, Tech. Report, N 148, Dept. of Computer Science, Univ. of Auckland (1997)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient and stealthy opaque constructs. In: Symposium on Principles of Programming Languages, pp. 184\u2013196 (1998)","DOI":"10.1145\/268946.268962"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Breaking abstraction and unstructuring data structures. In: IEEE International Conference on Computer Languages, pp. 28\u201338 (1998)","DOI":"10.1109\/ICCL.1998.674154"},{"issue":"2","key":"11_CR7","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TSE.2002.1027797","volume":"28","author":"C. Collberg","year":"2002","unstructured":"Collberg, C., Thomborson, C.: Watermarking, tamper-proofing and obfuscation \u2014 tools for software protection. IEEE Transactions on Software Engineering\u00a028(2), 735\u2013746 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Devanbu, P.T., Stubblebine, S.: Software engineering for security: a roadmap. In: Future of SE Track, pp. 227\u2013239 (2000)","DOI":"10.1145\/336512.336559"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions in Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions in Information Theory"},{"key":"11_CR10","volume-title":"Computer Security","author":"D. Gollmann","year":"1999","unstructured":"Gollmann, D.: Computer Security. Willey, New York (1999)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing, pp. 25\u201332 (1989)","DOI":"10.1145\/73007.73010"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/3-540-44448-3_34","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"S. Hada","year":"2000","unstructured":"Hada, S.: Zero-knowledge and code obfuscation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, p. 443. Springer, Heidelberg (2000)"},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/239912.239913","volume":"19","author":"S. Horwitz","year":"1997","unstructured":"Horwitz, S.: Precise flow-insensitive alias analysis is NP-hard. ACM Transactions on Programming Languages and Systems\u00a019(1), 1\u20136 (1997)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"4","key":"11_CR14","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1145\/161494.161501","volume":"1","author":"W. Landi","year":"1992","unstructured":"Landi, W.: Undecidability of static analysis. ACM Letters on Programming Languages and Systems\u00a01(4), 323\u2013337 (1992)","journal-title":"ACM Letters on Programming Languages and Systems"},{"key":"11_CR15","unstructured":"MacDonald, J.: On program security and obfuscation. Technical Report, University of California (1998)"},{"key":"11_CR16","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"5","key":"11_CR17","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1145\/186025.186041","volume":"16","author":"G. Ramalingam","year":"1994","unstructured":"Ramalingam, G.: The undecidability of aliasing. ACM Transactions on Programming Languages and Systems\u00a016(5), 1467\u20131471 (1994)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"11_CR18","unstructured":"Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: obstructing static analysis of programs, Tech. Report, N 12, Dep. of Comp. Sci., Univ. of Virginia (2000)"},{"key":"11_CR19","unstructured":"Wroblewski, G.: General method of program code obfuscation. In: Proceedings of the International Conference on Software Engineering Research and Practice (SERP), pp. 153\u2013159 (2002)"}],"container-title":["Lecture Notes in Computer Science","Perspectives of System Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39866-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,24]],"date-time":"2019-03-24T05:04:43Z","timestamp":1553403883000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39866-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208136","9783540398660"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39866-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}