{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T20:11:25Z","timestamp":1760645485905,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74124-4_16","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"232-248","source":"Crossref","is-referenced-by-count":17,"title":["A Model for Self-Modifying Code"],"prefix":"10.1007","author":[{"given":"Bertrand","family":"Anckaert","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Matias","family":"Madou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Koen","family":"De Bosschere","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","volume-title":"Information Hiding","author":"D. Aucsmith","year":"1996","unstructured":"Aucsmith, D.: Tamper resistant software: an implementation. In: Anderson, R. (ed.) Information Hiding. LNCS, vol.\u00a01174, pp. 317\u2013333. Springer, Heidelberg (1996)"},{"key":"16_CR2","unstructured":"Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, pp. 169\u2013186. USENIX Association (2003)"},{"issue":"7","key":"16_CR3","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1002\/spe.4380250706","volume":"25","author":"C. Cifuentes","year":"1995","unstructured":"Cifuentes, C., Gough, K.: Decompilation of binary programs. Software - Practice & Experience\u00a025(7), 811\u2013829 (1995)","journal-title":"Software - Practice & Experience"},{"issue":"8","key":"16_CR4","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TSE.2002.1027797","volume":"28","author":"C. Collberg","year":"2002","unstructured":"Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering\u00a028(8), 735\u2013746 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proc. of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 184\u2013196 (1998)","DOI":"10.1145\/268946.268962"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Debray, S., Evans, W.: Profile-guided code compression. In: Proc. of the ACM SIGPLAN Conference on Programming language design and implementation (2002)","DOI":"10.1145\/512529.512542"},{"key":"16_CR7","unstructured":"Dehnert, J., Grant, B., Banning, J., Johnson, R., Kistler, T., Klaiber, A., Mattson, J.: The transmeta code morphing software: Using speculation, recovery, and adaptive retranslation to address real-life challenges (2003)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Dux, B., Iyer, A., Debray, S., Forrester, D., Kobourov, S.: Visualizing the behavior of dynamically modifiable code. In: Proc. of the 13th International Workshop on Program Comprehension, pp. 337\u2013340 (2005)","DOI":"10.1109\/WPC.2005.46"},{"issue":"6","key":"16_CR9","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/12.931892","volume":"50","author":"K. Ebcioglu","year":"2001","unstructured":"Ebcioglu, K., Altman, E., Gschwind, M., Sathaye, S.: Dynamic binary translation and optimization. IEEE Transactions on Computers\u00a050(6), 529\u2013548 (2001)","journal-title":"IEEE Transactions on Computers"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Kanzaki, Y., Monden, A., Nakamura, M., Matsumoto, K.: Exploiting self-modification mechanism for program protection. In: Proc. of the 27th Annual International Computer Software and Applications Conference, pp. 170\u2013181 (2003)","DOI":"10.1109\/CMPSAC.2003.1245338"},{"key":"16_CR11","unstructured":"Kruegel, C., Robertson, W., Valeur, F., Vigna, G.: Static disassembly of obfuscated binaries. In: Proc. of the 13the USENIX Security Symposium (2004)"},{"key":"16_CR12","unstructured":"The Leprosy-B virus (1990), http:\/\/familycode.atspace.com\/lep.txt"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: Proc. 10th. ACM Conference on Computer and Communications Security (CCS), pp. 290\u2013299 (2003)","DOI":"10.1145\/948109.948149"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/11604938_15","volume-title":"Information Security Applications","author":"M. Madou","year":"2006","unstructured":"Madou, M., Anckaert, B., Moseley, P., Debray, S., De Sutter, B., De Bosschere, K.: Software protection through dynamic code mutation. In: Song, J., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 194\u2013206. Springer, Heidelberg (2006)"},{"key":"16_CR15","unstructured":"Maebe, J., Ronsse, M., De Bosschere, K.: DIOTA: Dynamic Instrumentation, Optimization and Transformation of Applications. In: Proc. Int. Conf. on Parallel Architectures and Compilation Techniques (2002)"},{"key":"16_CR16","volume-title":"Advanced Compiler Design and Implementation","author":"S. Muchnick","year":"1997","unstructured":"Muchnick, S.: Advanced Compiler Design and Implementation. Morgan Kaufmann Publischers Inc., San Francisco (1997)"},{"issue":"7","key":"16_CR17","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MC.2003.1212692","volume":"36","author":"G. Naumovich","year":"2003","unstructured":"Naumovich, G., Memon, N.: Preventing piracy, reverse engineering, and tampering. Computer\u00a036(7), 64\u201371 (2003)","journal-title":"Computer"},{"issue":"2","key":"16_CR18","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1002\/spe.4380150203","volume":"15","author":"R. Pike","year":"1985","unstructured":"Pike, R., Locanthi, B., Reiser, J.: Hardware\/software tradeoffs for bitmap graphics on the blit. Software - Practice & Experience\u00a015(2), 131\u2013151 (1985)","journal-title":"Software - Practice & Experience"},{"key":"16_CR19","volume-title":"The Art of Computer Virus Research and Defense","author":"P. Szor","year":"2005","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley, London, UK (2005)"},{"key":"16_CR20","unstructured":"Szor, P., Ferrie, P.: Hunting for metamorphic (2001)"},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/10958513_1","volume-title":"Information Security","author":"P.C. Oorschot van","year":"2003","unstructured":"van Oorschot, P.C.: Revisiting software protection. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 1\u201313. Springer, Heidelberg (2003)"},{"key":"16_CR22","unstructured":"Zuse, K.: Einf\u00fchrung in die allgemeine dyadik (1937)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T23:41:29Z","timestamp":1737416489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540741237","9783540741244"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}