{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:38:19Z","timestamp":1725835099826},"publisher-location":"New Delhi","reference-count":22,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226932"},{"type":"electronic","value":"9788132226956"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_48","type":"book-chapter","created":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:41:10Z","timestamp":1445733670000},"page":"569-578","source":"Crossref","is-referenced-by-count":1,"title":["Code Obfuscation by Using Floating Points and Conditional Statements"],"prefix":"10.1007","author":[{"given":"Chandan Kumar","family":"Behera","sequence":"first","affiliation":[]},{"given":"D. Lalitha","family":"Bhaskari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Anckaert, B., Madou, M., Sutter, B.D., Bus, B.D., Bosschere, K.D., Preneel, B.: Program obfuscation: a quantitative approach. Proceedings of the 2007 ACM workshop on Quality of protection, USA, pp. 15\u201320 (2007)","DOI":"10.1145\/1314257.1314263"},{"key":"48_CR2","unstructured":"Balakrishnan, A., Schulze, C.: Code obfuscation: literature survey, Technical report, Computer Science Department, University of Wisconsin, Madison, USA (2005)"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Beaucamps P., Filiol E.: On the possibility of practically obfuscating programs\u2014towards a unified perspective of code protection. J. Comput. Virol. 2(4), WTCV\u201906 Special Issue (2006)","DOI":"10.1007\/s11416-006-0029-6"},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Brisebarre, N., Louvet, N., Martin E.D., Ercegovac, M.D.: Implementing decimal floating-point arithmetic through binary: some suggestions, 21st IEEE International Conference on Application-specific Systems Architectures and Processors, pp. 317\u2013320 (2010)","DOI":"10.1109\/ASAP.2010.5540969"},{"issue":"4","key":"48_CR5","first-page":"1040","volume":"19","author":"M Ceccato","year":"2014","unstructured":"Ceccato, M., Penta, M.Di., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empirical Softw. Eng. 19(4), 1040\u20131074 (2014)","journal-title":"Empirical Softw. Eng."},{"key":"48_CR6","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/3-540-47870-1_10","volume-title":"Security and Privacy in Digital Rights Management","author":"Hoi Chang","year":"2002","unstructured":"Chang, H., Atallah M.: Protecting software code by guards. ACM Workshop on Security and privacy in digital rights management, DRM\u201901, pp. 160\u2013175 (2002)"},{"key":"48_CR7","unstructured":"Collberg C., Thomborson, C., Low D.: A taxonomy of obfuscating transformations, Technical report, Department of Computer Science, The University of Auckland, NewZealand (1997)"},{"issue":"1","key":"48_CR8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1189756.1189759","volume":"17","author":"Jurgen A. Doornik","year":"2007","unstructured":"Doornik, J.A.: Conversion of high-period random numbers to floating point, ACM transactions on modeling and computer simulation, 17(1) (2007)","journal-title":"ACM Transactions on Modeling and Computer Simulation"},{"key":"48_CR9","unstructured":"Drape, S.: Intellectual property protection using obfuscation, Proceedings of SAS, pp. 133\u2013144 (2009)"},{"issue":"3","key":"48_CR10","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/TSE.2003.1183929","volume":"29","author":"T Eisenbarth","year":"2003","unstructured":"Eisenbarth, T., Koschke, R., Simon, D.: Locating features in source code. IEEE Trans. Softw. Eng. 29(3), 210\u2013224 (2003)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Ernst, M.: Quickly detecting relevant program invariants. In: 22nd International Conference on Software Engineering, pp. 449\u2013458 (2000)","DOI":"10.1145\/337180.337240"},{"issue":"5","key":"48_CR12","first-page":"1208","volume":"9","author":"W Fan","year":"2014","unstructured":"Fan, W., Lei, X., An, J.: Obfuscated malicious code detection with path condition analysis. J. Netw. 9(5), 1208\u20131214 (2014)","journal-title":"J. Netw."},{"key":"48_CR13","doi-asserted-by":"crossref","unstructured":"Kulkarni, A., Metta, R.: A new code obfuscation scheme for software protection,\u00a0service oriented system engineering (SOSE). In: 2014 IEEE 8th International Symposium, pp. 409\u2013414 (2014)","DOI":"10.1109\/SOSE.2014.57"},{"key":"48_CR14","unstructured":"Lauha, J.: The neglected art of fixed point arithmetic, Seminar presentation, Assembly (2006)"},{"key":"48_CR15","unstructured":"Lumetta, S.S.: Example: Bit sliced comparison, Introduction to Computer Engineering lecture, pp. 21-26 (2012)"},{"key":"48_CR16","unstructured":"Luo, H., Jianqin, J., Qingkai, Z.: Code obfuscation techniques based on software protection. Comput. Eng. 32(11) (2006)"},{"key":"48_CR17","unstructured":"Mann R., How to program an 8-bit microcontroller using C Language, Journal of Atmel Applications, 3(4),13\u201316 (2015)"},{"key":"48_CR18","unstructured":"Overton, M.L.: Floating point representation (1996)"},{"key":"48_CR19","unstructured":"Popov, I.V., Debray, S.K., Andrews, G.R.: Binary obfuscation using signals, Proceedings of 16th USENIX Security Symposium, Article-19 (2007)"},{"key":"48_CR20","unstructured":"Sharif, M., et al.: Impeding malware analysis using conditional code obfuscation. In: Network and Distributed System Security Symposium (2008)"},{"key":"48_CR21","unstructured":"Wroblewski, G.: General method of program code obfuscation. PhD thesis, Wroclaw University of Technology (2002)"},{"key":"48_CR22","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey, International Conference on Broadband, Wireless Computing, Communication and Applications, IEEE Computer Society. pp. 297\u2013300 (2010)","DOI":"10.1109\/BWCCA.2010.85"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T03:44:54Z","timestamp":1653363894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_48","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}