{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:18:42Z","timestamp":1725542322549},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642104664"},{"type":"electronic","value":"9783642104671"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10467-1_65","type":"book-chapter","created":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T17:53:07Z","timestamp":1260813187000},"page":"743-754","source":"Crossref","is-referenced-by-count":1,"title":["Protection of DRM Agent Codes"],"prefix":"10.1007","author":[{"given":"Shan","family":"Liang","sequence":"first","affiliation":[]},{"given":"Sabu","family":"Emmanuel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","doi-asserted-by":"crossref","unstructured":"Sachan, A., Emmanuel, S., Das, A., Kankanhalli, M.S.: Privacy preserving multiparty multilevel drm architecture. In: Workshop on Digital Rights Management, 6th IEEE Consumer Communications and Networking Conference, pp. 1\u20135 (2009)","DOI":"10.1109\/CCNC.2009.4784937"},{"key":"65_CR2","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1542245.1542265","volume-title":"Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video","author":"T. Thomas","year":"2009","unstructured":"Thomas, T., Emmanuel, S., Das, A., Kankanhalli, M.: Secure multimedia content delivery with multiparty multilevel DRM architecture. In: Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video, pp. 85\u201390. ACM, New York (2009)"},{"key":"65_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1102546.1102559","volume-title":"Proceedings of the 5th ACM workshop on Digital rights management","author":"S. Michiels","year":"2005","unstructured":"Michiels, S., Verslype, K., Joosen, W., De Decker, B.: Towards a software architecture for DRM. In: Proceedings of the 5th ACM workshop on Digital rights management, pp. 65\u201374. ACM, New York (2005)"},{"key":"65_CR4","unstructured":"Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. University of Virginia, Charlottesville, VA (2000)"},{"key":"65_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/1102546.1102561","volume-title":"Proceedings of the 5th ACM workshop on Digital rights management","author":"J. Ge","year":"2005","unstructured":"Ge, J., Chaudhuri, S., Tyagi, A.: Control flow based obfuscation. In: Proceedings of the 5th ACM workshop on Digital rights management, pp. 83\u201392. ACM, New York (2005)"},{"key":"65_CR6","volume-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium table of contents","author":"I. Popov","year":"2007","unstructured":"Popov, I., Debray, S., Andrews, G.: Binary obfuscation using signals. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium table of contents. USENIX Association, Berkeley (2007)"},{"key":"65_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/11604938_15","volume-title":"Information Security Applications","author":"M. Madou","year":"2006","unstructured":"Madou, M., Anckaert, B., Moseley, P., Debray, S., De Sutter, B., De Bosschere, K.: Software Protection Through Dynamic Code Mutation. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 194\u2013206. Springer, Heidelberg (2006)"},{"key":"65_CR8","doi-asserted-by":"crossref","unstructured":"Kanzaki, Y., Monden, A., Nakamura, M., Matsumoto, K.: Exploiting self-modification mechanism for program protection. In: Proceedings of 27th Annual International Computer Software and Applications Conference, 2003. COMPSAC 2003, pp. 170\u2013179 (2003)","DOI":"10.1109\/CMPSAC.2003.1245338"},{"key":"65_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-540-74124-4_16","volume-title":"Information Hiding","author":"B. Anckaert","year":"2007","unstructured":"Anckaert, B., Madou, M., De Bosschere, K.: A Model for Self-Modifying Code. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 232\u2013248. Springer, Heidelberg (2007)"},{"key":"65_CR10","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1145\/268946.268962","volume-title":"Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages","author":"C. Collberg","year":"1998","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 184\u2013196. ACM, New York (1998)"},{"key":"65_CR11","first-page":"187","volume-title":"Proceedings of the 29th Australasian Computer Science Conference","author":"A. Majumdar","year":"2006","unstructured":"Majumdar, A., Thomborson, C.: Manufacturing opaque predicates in distributed systems for code obfuscation. In: Proceedings of the 29th Australasian Computer Science Conference, vol.\u00a048, pp. 187\u2013196. Australian Computer Society, Inc., Darlinghurst (2006)"},{"key":"65_CR12","doi-asserted-by":"crossref","unstructured":"Wang, C., Davidson, J., Hill, J., Knight, J.: Protection of Software-based Survivability Mechanisms. In: Proc. International Conference of Dependable Systems and Networks (July 2001)","DOI":"10.21236\/ADA466288"},{"key":"65_CR13","unstructured":"Wang, C.: A Security Architecture for survivability Mechanisms. Phd thesis, Department of Computer Science, University of Virginia (October 2000)"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing - PCM 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10467-1_65.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T07:32:49Z","timestamp":1619767969000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10467-1_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642104664","9783642104671"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10467-1_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}