{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T23:10:05Z","timestamp":1743635405026,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642315121"},{"type":"electronic","value":"9783642315138"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31513-8_13","type":"book-chapter","created":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T09:39:17Z","timestamp":1340962757000},"page":"113-129","source":"Crossref","is-referenced-by-count":0,"title":["An Obfuscated Implementation of RC4"],"prefix":"10.1007","author":[{"given":"Roger","family":"Zahno","sequence":"first","affiliation":[]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-36492-7_17","volume-title":"Selected Areas in Cryptography","author":"S. Chow","year":"2003","unstructured":"Chow, S., Eisen, P.A., Johnson, H., van Oorschot, P.C.: White-Box Cryptography and an AES Implementation. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 250\u2013270. Springer, Heidelberg (2003)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-44993-5_1","volume-title":"Digital Rights Management","author":"S. Chow","year":"2003","unstructured":"Chow, S., Eisen, P., Johnson, H., van Oorschot, P.C.: A White-Box DES Implementation for DRM Applications. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol.\u00a02696, pp. 1\u201315. Springer, Heidelberg (2003)"},{"key":"13_CR4","unstructured":"STUNNIX. C++ Obfuscator - Obfuscate C and C++ Code, http:\/\/www.stunnix.com\/prod\/cxxo\/overview.shtml (accessed September 2011)"},{"key":"13_CR5","unstructured":"UPX: the Ultimate Packer for EXecutables, http:\/\/upx.sourceforge.net\/ (accessed September 2011)"},{"key":"13_CR6","unstructured":"SecuriTeam. SecuriTeam - Shiva, ELF Encryption Tool, http:\/\/www.securiteam.com\/tools\/5XP041FA0U.html (accessed September 2011)"},{"key":"13_CR7","unstructured":"Collberg, C.S., Nagra, J.: Surreptitious Software: Obfuscation, Watermarking and Tamperproofing for Software Protection. Addison-Wesley (2010)"},{"key":"13_CR8","unstructured":"Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M., Lavoie, Y., Tawbi, N.: Static detection of malicious code in executable programs. Int. J. of Req. Eng. (2001)"},{"key":"13_CR9","unstructured":"Wang, C., Hill, J., Knight, J., Davidson, J.: Software Tamper Resistance: Obstructing Static Analysis of Programs. Technical Report CS-2000-12. Univ. of Virginia (2000)"},{"key":"13_CR10","unstructured":"Reddit: the Front Page of\u00a0the Internet. Skype\u2019s Obfuscated RC4 Algorithm Was Leaked, so Its Discoverers Open Code for Review: Technology, http:\/\/www.reddit.com\/r\/technology\/comments\/cn4gn\/skypes_obfuscated_rc4_algorithm_was_leaked_so_its\/ (accessed September 2011)"},{"key":"13_CR11","unstructured":"Biondi, P., Desclau, F.: Silver Needle in the Skype, http:\/\/www.secdev.org\/conf\/skype_BHEU06.pdf (accessed September 2011)"},{"key":"13_CR12","first-page":"176","volume":"E86-A","author":"T. Ogiso","year":"2003","unstructured":"Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: Software obfuscation on a theoretical basis and its implementation. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences\u00a0E86-A, 176\u2013186 (2003)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"13_CR13","unstructured":"Collberg, C.S., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science. University of Auckland (1997)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Zhu, W., Thomborson, C.D., Wang, F.-Y.: Obfuscate arrays by homomorphic functions. In: GrC, pp. 770\u2013773 (2006)","DOI":"10.1109\/GRC.2006.1635914"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Collberg, C.S., Thomborson, C.D., Low, D.: Manufacturing Cheap, Resilient and Stealthy Opaque Constructs. In: POPL, pp. 184\u2013196 (1998)","DOI":"10.1145\/268946.268962"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Park, J.-Y., Yi, O., Choi, J.-S.: Methods for practical whitebox cryptography. In: 2010 International Conference on Information and Communication Technology Convergence (ICTC), pp. 474\u2013479 (November 2010)","DOI":"10.1109\/ICTC.2010.5674789"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Link, H.E., Neumann, W.D.: Clarifying obfuscation: Improving the security of white-box encoding, cryptology eprint archive. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005), vol.\u00a0I (2005)","DOI":"10.1109\/ITCC.2005.100"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Computing and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31513-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T22:40:33Z","timestamp":1743633633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-31513-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642315121","9783642315138"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31513-8_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2012]]}}}