{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:25:58Z","timestamp":1739424358544,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642048456"},{"type":"electronic","value":"9783642048463"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04846-3_9","type":"book-chapter","created":{"date-parts":[[2009,10,15]],"date-time":"2009-10-15T06:29:53Z","timestamp":1255588193000},"page":"125-139","source":"Crossref","is-referenced-by-count":11,"title":["Tamper-Tolerant Software: Modeling and Implementation"],"prefix":"10.1007","author":[{"given":"Mariusz H.","family":"Jakubowski","sequence":"first","affiliation":[]},{"given":"Chit Wei (Nick)","family":"Saw","sequence":"additional","affiliation":[]},{"given":"Ramarathnam","family":"Venkatesan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/1179509.1179521","volume-title":"DRM 2006: Proceedings of the ACM Workshop on Digital Rights Management","author":"B. Anckaert","year":"2006","unstructured":"Anckaert, B., Jakubowski, M.H., Venkatesan, R.: Proteus: Virtualization for diversified tamper-resistance. In: DRM 2006: Proceedings of the ACM Workshop on Digital Rights Management, pp. 47\u201358. ACM Press, New York (2006)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Anckaert, B., Jakubowski, M.H., Venkatesan, R.: Runtime protection via dataflow flattening. In: IARIA SECURWARE 2009 (to appear, 2009)","DOI":"10.1109\/SECURWARE.2009.44"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-75651-4_11","volume-title":"Advances in Information and Computer Security","author":"B. Anckaert","year":"2007","unstructured":"Anckaert, B., Jakubowski, M.H., Venkatesan, R., De Bosschere, K.: Run-time randomization to mitigate tampering. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol.\u00a04752, pp. 153\u2013168. Springer, Heidelberg (2007)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1029146.1029157","volume-title":"DRM 2004: Proceedings of the 4th ACM Workshop on Digital Rights Management","author":"B. Anckaert","year":"2004","unstructured":"Anckaert, B., De Sutter, B., De Bosschere, K.: Software piracy prevention through diversity. In: DRM 2004: Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 63\u201371. ACM Press, New York (2004)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","volume-title":"Information Hiding","author":"D. Aucsmith","year":"1996","unstructured":"Aucsmith, D.: Tamper resistant software: An implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 317\u2013333. Springer, Heidelberg (1996)"},{"key":"9_CR6","first-page":"23","volume-title":"Software Fault Tolerance","author":"A. Avizienis","year":"1995","unstructured":"Avizienis, A.: The methodology of N-version programming. In: Lyu, M.R. (ed.) Software Fault Tolerance,ch. 2, pp. 23\u201346. Wiley, Chichester (1995)"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"9_CR8","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1145\/1134760.1220164","volume-title":"VEE 2006: Proceedings of the 2nd international conference on Virtual execution environments","author":"S. Bhansali","year":"2006","unstructured":"Bhansali, S., Chen, W.-K., de Jong, S., Edwards, A., Murray, R., Drini\u0107, M., Miho\u010dka, D., Chau, J.: Framework for instruction-level tracing and analysis of program executions. In: VEE 2006: Proceedings of the 2nd international conference on Virtual execution environments, pp. 154\u2013163. ACM, New York (2006)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Chang, H., Atallah, M.J.: Protecting software code by guards. In: Digital Rights Management Workshop, pp. 160\u2013175 (2001)","DOI":"10.1007\/3-540-47870-1_10"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.H.: Oblivious hashing: A stealthy software integrity verification primitive. In: Information Hiding 2002, Noordwijkerhout, The Netherlands (October 2002)","DOI":"10.1007\/3-540-36415-3_26"},{"key":"9_CR11","unstructured":"Cloakware Corporation. Software Security Suite (2009)"},{"key":"9_CR12","unstructured":"Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, The University of Auckland, New Zealand (July 1997)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Breaking abstractions and unstructuring data structures. In: International Conference on Computer Languages, pp. 28\u201338 (1998)","DOI":"10.1109\/ICCL.1998.674154"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Principles of Programming Languages, POPL 1998, pp. 184\u2013196 (1998)","DOI":"10.1145\/268946.268962"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Dedi\u0107, N., Jakubowski, M.H., Venkatesan, R.: A graph game model for software tamper protection. In: Proceedings of the 2007 Information Hiding Workshop (June 2007)","DOI":"10.1007\/978-3-540-77370-2_6"},{"issue":"4","key":"9_CR16","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1145\/356678.356680","volume":"8","author":"P.J. Denning","year":"1976","unstructured":"Denning, P.J.: Fault tolerant operating systems. ACM Comput. Surv.\u00a08(4), 359\u2013389 (1976)","journal-title":"ACM Comput. Surv."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS 2005: Proceedings of the 46th IEEE Symposium on Foundations of Computer Science (2005)","DOI":"10.1109\/SFCS.2005.60"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Horne, B., Matheson, L.R., Sheehan, C., Tarjan, R.E.: Dynamic self-checking techniques for improved tamper resistance. In: Digital Rights Management Workshop, pp. 141\u2013159 (2001)","DOI":"10.1007\/3-540-47870-1_9"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Jacob, M., Jakubowski, M.H., Venkatesan, R.: Towards integral binary execution: Implementing oblivious hashing using overlapped instruction encodings. In: 2007 ACM Multimedia and Security Workshop, Dallas, TX (September 2007)","DOI":"10.1145\/1288869.1288887"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-77370-2_7","volume-title":"Information Hiding 2007","author":"M.H. Jakubowski","year":"2008","unstructured":"Jakubowski, M.H., Naldurg, P., Patankar, V., Venkatesan, R.: Software integrity checking expressions (ICEs) for robust tamper detection. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol.\u00a04567, pp. 96\u2013111. Springer, Heidelberg (2008)"},{"issue":"4","key":"9_CR21","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1145\/356678.356682","volume":"8","author":"T.A. Linden","year":"1976","unstructured":"Linden, T.A.: Operating system structures to support security and reliable software. ACM Comput. Surv.\u00a08(4), 409\u2013445 (1976)","journal-title":"ACM Comput. Surv."},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/978-3-540-24676-3_2","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"B. Lynn","year":"2004","unstructured":"Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 20\u201339. Springer, Heidelberg (2004)"},{"key":"9_CR23","unstructured":"Microsoft Corporation. Phoenix compiler framework (2008)"},{"key":"9_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/0471739219","volume-title":"Error Correction Coding: Mathematical Methods and Algorithms","author":"T.K. Moon","year":"2005","unstructured":"Moon, T.K.: Error Correction Coding: Mathematical Methods and Algorithms. Wiley-Interscience, Hoboken (2005)"},{"issue":"3","key":"9_CR25","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1275517.1275519","volume":"25","author":"Q. Feng","year":"2007","unstructured":"Feng, Q., Joseph, T., Yuanyuan, Z., Jagadeesan, S.: Rx: Treating bugs as allergies\u2014a safe method to survive software failures. ACM Trans. Comput. Syst.\u00a025(3), 7 (2007)","journal-title":"ACM Trans. Comput. Syst."},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1145\/800027.808467","volume-title":"Proceedings of the International Conference on Reliable Software","author":"B. Randell","year":"1975","unstructured":"Randell, B.: System structure for software fault tolerance. In: Proceedings of the International Conference on Reliable Software, Los Angeles, California, pp. 437\u2013449. ACM, New York (1975)"},{"issue":"2","key":"9_CR27","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1145\/356725.356729","volume":"10","author":"B. Randell","year":"1978","unstructured":"Randell, B., Lee, P., Treleaven, P.C.: Reliability issues in computing system design. ACM Comput. Surv.\u00a010(2), 123\u2013165 (1978)","journal-title":"ACM Comput. Surv."},{"key":"9_CR28","volume-title":"Theory and Practice of Reliable System Design","author":"D.P. Siewiorek","year":"1982","unstructured":"Siewiorek, D.P., Swarz, R.S.: Theory and Practice of Reliable System Design. Digital Press, Bedford (1982)"},{"key":"9_CR29","unstructured":"Tan, G., Chen, Y., Jakubowski, M.H.: Delayed and controlled failures in tamper-resistant software. In: Proceedings of the 2006 Information Hiding Workshop (july 2006)"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Tyrrell, A.M.: Recovery blocks and algorithm-based fault tolerance. In: EUROMICRO Conference, vol.\u00a00, p. 292 (1996)","DOI":"10.1109\/EURMIC.1996.546394"},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1314276.1314289","volume-title":"DRM 2007: Proceedings of the 2007 ACM workshop on Digital Rights Management","author":"A.V. Varadarajan","year":"2007","unstructured":"Varadarajan, A.V., Venkatesan, R., Rangan, C.P.: Data structures for limited oblivious execution of programs while preserving locality of reference. In: DRM 2007: Proceedings of the 2007 ACM workshop on Digital Rights Management, pp. 63\u201369. ACM, New York (2007)"},{"key":"9_CR32","unstructured":"Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12, University of Virginia (December 2000)"},{"key":"9_CR33","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1145\/1060590.1060669","volume-title":"STOC 2005: Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing","author":"H. Wee","year":"2005","unstructured":"Wee, H.: On obfuscating point functions. In: STOC 2005: Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing, pp. 523\u2013532. ACM Press, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04846-3_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T19:31:20Z","timestamp":1739388680000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04846-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642048456","9783642048463"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04846-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}