{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:22:49Z","timestamp":1761675769448},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540404101"},{"type":"electronic","value":"9783540449935"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-44993-5_2","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:21:24Z","timestamp":1277234484000},"page":"16-31","source":"Crossref","is-referenced-by-count":46,"title":["Attacking an Obfuscated Cipher by Injecting Faults"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Jacob","sequence":"first","affiliation":[]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Felten","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Craver, S.A., Wu, M., Liu, B., Stubblefield, A., Swartzlander, B., Wallach, D.S., Dean, D., Felten, E.W.: Reading between the lines: Lessons from the SDMI challenge. In: Proceedings of the 10th USENIX Security Symposium (2001)"},{"key":"2_CR2","unstructured":"CSS (2002), http:\/\/www.dvdcca.org\/css"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Intertrust (2002), http:\/\/www.intertrust.com","DOI":"10.1145\/504689.504690"},{"key":"2_CR4","unstructured":"Microsoft Windows Media Technologies (2002), http:\/\/www.microsoft.com\/windows\/windowsmedia"},{"key":"2_CR5","unstructured":"Adobe EBooks (2002), http:\/\/www.adobe.com\/epaper\/ebooks"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1147\/sj.302.0206","volume":"30","author":"D.G. Abraham","year":"1991","unstructured":"Abraham, D.G., Dolan, G.M., Double, G.P., Stevens, J.V.: Transaction Security System. IBM Systems Journal\u00a030, 206\u2013229 (1991)","journal-title":"IBM Systems Journal"},{"key":"2_CR7","unstructured":"Dallas Semiconductor: Soft Microcontroller Data Book (1993)"},{"key":"2_CR8","unstructured":"Trusted Computing Platform Alliance (2002), http:\/\/www.trustedpc.org"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1998)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Shamir, A., van Someren, N.: Playing \u2018hide and seek\u2019 with stored keys. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, pp. 118\u2013124. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48390-X_9"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0IT-22, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR13","unstructured":"Microsoft Corporation: World Intellectual Property Organization, WO 02\/01327 A2 (2002)"},{"key":"2_CR14","unstructured":"Cloakware Corporation: World Intellectual Property Organization, WO 00\/77596 A1 (2000)"},{"key":"2_CR15","unstructured":"Intertrust Corporation: US Patent Office, US 6,157,721 (2000)"},{"key":"2_CR16","unstructured":"Intel Corporation: US Patent Office, US 6,205,550 (2000)"},{"key":"2_CR17","unstructured":"RetroGuard Java Obfuscator (2002), http:\/\/www.retrologic.com"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-44993-5_1","volume-title":"Digital Rights Management","author":"S. Chow","year":"2003","unstructured":"Chow, S., Johnson, H., van Oorschot, P.C., Eisen, P.: A White-Box DES Implementation for DRM Applications. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, pp. 1\u201315. Springer, Heidelberg (2003)"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"2_CR21","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1994","unstructured":"Schneier, B.: Applied Cryptography. Wiley, Chichester (1994)"},{"key":"2_CR22","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)"},{"key":"2_CR23","unstructured":"Daemen, J., Rijmen, V.: Rijndael for AES. In: NIST (ed.) The Third Advanced Encryption Standard Candidate Conference, pp. 343\u2013347. National Institute for Standards and Technology (2000)"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","volume-title":"Information Hiding","author":"D. Aucsmith","year":"1996","unstructured":"Aucsmith, D.: Tamper-resistant software: An implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 317\u2013333. Springer, Heidelberg (1996)"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"2_CR26","unstructured":"grugq, scut: Armouring the ELF: Binary encryption on the UNIX platform. Phrack Inc. 58 (2001)"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Wang, C., Davidson, J., Hill, J., Knight, J.: Protection of software-based survivability mechanisms. In: Proceedings of the 2001 Dependable Systems and Networks, DSN 2001 (2001)","DOI":"10.21236\/ADA466288"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: The 25th Symposium on Principles of Programming Languages (POPL 1998), Association for Computing Machinery (1998), pp. 184\u2013196 (1998)","DOI":"10.1145\/268946.268962"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Steensgaard, B.: Points-to analysis in almost linear time. In: The 23th Symposium on Principles of Programming Languages (POPL 1996), Association for Computing Machinery, pp. 32\u201341 (1996)","DOI":"10.1145\/237721.237727"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Landi, W.: Undecidability of static analysis. ACM Letters on Programming Languages and Systems\u00a01, 323\u2013337 (1992)","DOI":"10.1145\/161494.161501"},{"key":"2_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/3-540-47870-1_9","volume-title":"Security and Privacy in Digital Rights Management","author":"B. Horne","year":"2002","unstructured":"Horne, B., Matheson, L., Sheehan, C., Tarjan, R.E.: Dynamic self-checking techniques for improved tamper-resistance. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, pp. 141\u2013159. Springer, Heidelberg (2002)"},{"key":"2_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-47870-1_10","volume-title":"Security and Privacy in Digital Rights Management","author":"H. Chang","year":"2002","unstructured":"Chang, H., Atallah, M.J.: Protecting software code by guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, pp. 160\u2013175. Springer, Heidelberg (2002)"},{"key":"2_CR33","unstructured":"Cesare, S.: Linux anti-debugging techniques (fooling the debugger). Security Focus (2000)"},{"key":"2_CR34","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the Association for Computing Machinery\u00a043, 431\u2013473 (1996)","journal-title":"Journal of the Association for Computing Machinery"},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information Hiding","author":"F.A.P. Petitcolas","year":"1998","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 219\u2013239. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Digital Rights Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-44993-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T01:23:12Z","timestamp":1591406592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-44993-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540404101","9783540449935"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-44993-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}