{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:08:06Z","timestamp":1750136886956,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540877844"},{"type":"electronic","value":"9783540877851"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-87785-1_36","type":"book-chapter","created":{"date-parts":[[2008,9,24]],"date-time":"2008-09-24T01:22:11Z","timestamp":1222219331000},"page":"406-416","source":"Crossref","is-referenced-by-count":6,"title":["Implementation of an Obfuscation Tool for C\/C++ Source Code Protection on the XScale Architecture"],"prefix":"10.1007","author":[{"given":"Seongje","family":"Cho","sequence":"first","affiliation":[]},{"given":"Hyeyoung","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Yookun","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Business Software Alliance, Fourth Annual BSA and IDC Global Software Piracy Study (2006)","key":"36_CR1"},{"issue":"8","key":"36_CR2","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TSE.2002.1027797","volume":"28","author":"C.S. Collberg","year":"2002","unstructured":"Collberg, C.S., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation \u2013 Tools for Software Protection. IEEE Transactions on Software Engineering\u00a028(8), 735\u2013746 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"5","key":"36_CR3","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TC.2006.68","volume":"55","author":"M. Gomathisankaran","year":"2006","unstructured":"Gomathisankaran, M., Tyagi, A.: Architecture Support for 3D Obfuscation. IEEE Transaction on Computer\u00a055(5), 497\u2013507 (2006)","journal-title":"IEEE Transaction on Computer"},{"doi-asserted-by":"crossref","unstructured":"Collberg, C., Myles, G., Huntwork, A.: Sandmark \u2013 Tool for Software Protection Research. IEEE Security & Privacy (Software Protection), 40\u201349 (July\/August 2003)","key":"36_CR4","DOI":"10.1109\/MSECP.2003.1219058"},{"doi-asserted-by":"crossref","unstructured":"Naumovicb, G., Memon, N.: Preventing Piracy, Reverse Engineering, and Tampering. IEEE Computer, 64\u201371 (2003)","key":"36_CR5","DOI":"10.1109\/MC.2003.1212692"},{"doi-asserted-by":"crossref","unstructured":"Fu, B., Richard III, G.G., Chen, Y., Husseiny, A.: Some New Approaches For Preventing Software Tampering. In: Proc. of the 44th ACM Southeast Regional Conference (ACM SE 2006), pp. 655\u2013660 (2006)","key":"36_CR6","DOI":"10.1145\/1185448.1185592"},{"key":"36_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/10958513_1","volume-title":"Information Security","author":"P.C. Oorschot van","year":"2003","unstructured":"van Oorschot, P.C.: Revisiting Software Protection. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 1\u201313. Springer, Heidelberg (2003)"},{"unstructured":"Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations. Technical report 148, Dept. of Computer Science, University of Auckland, New Zealand (1997)","key":"36_CR8"},{"unstructured":"MacBride, J., Mascioli, C., Marks, S., Tang, G., Head, L.M.: A Comparative Study of Java Obfuscators. In: IASTED International Conference on Software Engineering and Applications, Phoenix, Arizona, November 14\u201316, 2005, pp. 82\u201386 (2005)","key":"36_CR9"},{"unstructured":"Ertaul, L., Venkatesh, S.: JHide \u2013 a tool kit for code obfuscation. In: Proc. of the 8th IASTED International Conference Software Engineering and Applications (2004)","key":"36_CR10"},{"unstructured":"Kruegel, C., Robertson, W., Valeur, F., Vigna, G.: Static Disassembly of Obfuscated Binaries. In: Proc. of the 13th USENIX Security Symposium, pp. 255\u2013270 (2004)","key":"36_CR11"},{"unstructured":"ANTLR, http:\/\/www.antlr.org","key":"36_CR12"}],"container-title":["Lecture Notes in Computer Science","Software Technologies for Embedded and Ubiquitous Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87785-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T01:12:04Z","timestamp":1557796324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87785-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540877844","9783540877851"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87785-1_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}