{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:12:28Z","timestamp":1770217948069,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642007293","type":"print"},{"value":"9783642007309","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00730-9_10","type":"book-chapter","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T07:22:23Z","timestamp":1237274543000},"page":"152-165","source":"Crossref","is-referenced-by-count":8,"title":["Instruction Set Limitation in Support of Software Diversity"],"prefix":"10.1007","author":[{"given":"Bjorn","family":"De Sutter","sequence":"first","affiliation":[]},{"given":"Bertrand","family":"Anckaert","sequence":"additional","affiliation":[]},{"given":"Jens","family":"Geiregat","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"Chanet","sequence":"additional","affiliation":[]},{"given":"Koen","family":"De Bosschere","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. In: PLDI 2007: Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation, pp. 89\u2013100 (2007)","DOI":"10.1145\/1250734.1250746"},{"key":"10_CR2","unstructured":"Maebe, J., Ronsse, M., De Bosschere, K.: DIOTA: Dynamic Instrumentation, Optimization and Transformation of Applications. In: Compendium of Workshops and Tutorials in Conjunction with the 11th International Conference on Parallel Architectures and Compilation Techniques (2002) (count 11)"},{"key":"10_CR3","unstructured":"Anckaert, B.: Diversity for Software Protection. PhD thesis, Ghent University (2008)"},{"key":"10_CR4","unstructured":"De Bus, B.: Reliable, Retargetable and Extensivle Link-Time Program Rewriting. PhD thesis, Ghent University (2005)"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1210268.1210273","volume":"6","author":"B. Sutter De","year":"2007","unstructured":"De Sutter, B., Van Put, L., Chanet, D., De Bus, B., De Bosschere, K.: Link-time compaction and optimization of ARM executables. Trans. on Embedded Computing Sys.\u00a06(1), 5 (2007)","journal-title":"Trans. on Embedded Computing Sys."},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1102546.1102560","volume-title":"Proceedings of the 5th ACM workshop on Digital Rights Management","author":"M. Madou","year":"2005","unstructured":"Madou, M., Anckaert, B., De Sutter, B., De Bosschere, K.: Hybrid static-dynamic attacks against software protection mechanisms. In: Proceedings of the 5th ACM workshop on Digital Rights Management, pp. 75\u201382. ACM Press, New York (2005)"},{"key":"10_CR7","unstructured":"Madou, M., Van Put, L., De Bosschere, K.: Loco: An interactive code (de)obfuscation tool. In: Proceedings of ACM SIGPLAN 2006 Workshop on Partial Evaluation and Program Manipulation, PEPM 2006 (2006), http:\/\/www.elis.ugent.be\/diablo\/obfuscation"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/11496618_31","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"B. Anckaert","year":"2005","unstructured":"Anckaert, B., De Sutter, B., Chanet, D., De Bosschere, K.: Steganography for executables and code transformation signatures. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 425\u2013439. Springer, Heidelberg (2005)"},{"key":"10_CR9","volume-title":"Advanced Compiler Design and Implementation","author":"S. Muchnick","year":"1997","unstructured":"Muchnick, S.: Advanced Compiler Design and Implementation. Morgan Kaufmann, San Francisco (1997)"},{"key":"10_CR10","first-page":"184","volume-title":"Proceedings of the 25th Conference on Principles of Programming Languages","author":"C. Collberg","year":"1998","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th Conference on Principles of Programming Languages, pp. 184\u2013196. ACM, New York (1998)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"De Sutter, B., De Bus, B., De Bosschere, K.: Sifting out the mud: low level C++ code reuse. In: OOPSLA 2002: Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pp. 275\u2013291 (2002)","DOI":"10.1145\/582419.582445"},{"key":"10_CR12","first-page":"1","volume":"2","author":"Z. Wang","year":"2000","unstructured":"Wang, Z., Pierce, K., McFarling, S.: Bmat \u2013 a binary matching tools for stale profile propagation. The Journal of Instruction-Level Parallelism\u00a02, 1\u201320 (2000)","journal-title":"The Journal of Instruction-Level Parallelism"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/948109.948149","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security","author":"C. Linn","year":"2003","unstructured":"Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 290\u2013299. ACM Press, New York (2003)"},{"key":"10_CR14","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1145\/36206.36194","volume-title":"Proceedings of the 2nd International Conference on Architectual Support for Programming Languages and Operating Systems","author":"H. Massalin","year":"1987","unstructured":"Massalin, H.: Superoptimizer: a look at the smallest program. In: Proceedings of the 2nd International Conference on Architectual Support for Programming Languages and Operating Systems, pp. 122\u2013126. IEEE Computer Society Press, Los Alamitos (1987)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00730-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T09:34:26Z","timestamp":1684920866000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00730-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642007293","9783642007309"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00730-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}