{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:53Z","timestamp":1725491873712},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_15","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"216-231","source":"Crossref","is-referenced-by-count":5,"title":["Delayed and Controlled Failures in Tamper-Resistant Software"],"prefix":"10.1007","author":[{"given":"Gang","family":"Tan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuqun","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mariusz H.","family":"Jakubowski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Business\u00a0Software Alliance and International\u00a0Data Corporation. Annual BSA and IDC global software piracy study (2004-2006), http:\/\/www.bsa.org\/globalstudy"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Aucsmith, D.: Tamper resistant software: An implementation. In: First Information Hiding Workshop, pp. 317\u2013333 (1996)","DOI":"10.1007\/3-540-61996-8_49"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201901","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"15_CR4","unstructured":"Cerven, P.: Crackproof Your Software. No Starch Press, Inc. (2002)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Chang, H., Atallah, M.J.: Protecting software code by guards. In: Digital Rights Management Workshop, pp. 160\u2013175 (2001)","DOI":"10.1007\/3-540-47870-1_10"},{"key":"15_CR6","unstructured":"Chen, Y., England, P., Peinado, M., Willman, B.: High assurance computing on open hardware architectures. Research Report MSR-TR-2003-20, Microsoft Research, Microsoft Corporation, Redmond, Washington, USA (March 2003)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.H.: Oblivious hashing: A stealthy software integrity verification primitive. In: Information Hiding Workshop, pp. 400\u2013414 (2002)","DOI":"10.1007\/3-540-36415-3_26"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Chow, S., Gu, Y., Johnson, H., Zakharov, V.A.: An approach to the obfuscation of control-flow of sequential computer programs. In: Information Security, 4th International Conference, pp. 144\u2013155 (2001)","DOI":"10.1007\/3-540-45439-X_10"},{"key":"15_CR9","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland (July 1997)"},{"issue":"8","key":"15_CR10","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TSE.2002.1027797","volume":"28","author":"C.S. Collberg","year":"2002","unstructured":"Collberg, C.S., Thomborson, C.D.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Trans. Software Eng.\u00a028(8), 735\u2013746 (2002)","journal-title":"IEEE Trans. Software Eng."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Collberg, C.S., Thomborson, C.D., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: ACM Symposium on Principles of Programming Languages (POPL), pp. 184\u2013196 (1998)","DOI":"10.1145\/268946.268962"},{"issue":"3","key":"15_CR12","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the ACM\u00a043(3), 431\u2013473 (1996)","journal-title":"Journal of the ACM"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Horne, B., Matheson, L.R., Sheehan, C., Tarjan, R.E.: Dynamic self-checking techniques for improved tamper resistance. In: Digital Rights Management Workshop, pp. 141\u2013159 (2001)","DOI":"10.1007\/3-540-47870-1_9"},{"key":"15_CR14","unstructured":"(2006), http:\/\/cdfreaks.com"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/978-3-540-24676-3_2","volume-title":"EUROCRYPT 2004","author":"B. Lynn","year":"2004","unstructured":"Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 20\u201339. Springer, Heidelberg (2004)"},{"key":"15_CR16","unstructured":"Macrovision. FADE, SafeDisc and SafeDVD copy protection (2002)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-540-27800-9_8","volume-title":"ACISP","author":"M. Peinado","year":"2004","unstructured":"Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 86\u201397. Springer, Heidelberg (2004)"},{"issue":"3","key":"15_CR18","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1002\/spe.4380010305","volume":"1","author":"I.C. Pyle","year":"1971","unstructured":"Pyle, I.C., McLatchie, R.C.F., Grandage, B.: A second-order bug with delayed effect. Software \u2013 Practice and Experience\u00a01(3), 231\u2013233 (1971)","journal-title":"Software \u2013 Practice and Experience"},{"key":"15_CR19","unstructured":"Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12, University of Virginia (December 2000)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Wee, H.: On obfuscating point functions. Cryptology ePrint Archive, Report 2005 \/001 (2005), http:\/\/eprint.iacr.org\/","DOI":"10.1145\/1060590.1060669"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:11:16Z","timestamp":1619518276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}