{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:48:21Z","timestamp":1730285301053,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,27]]},"DOI":"10.1109\/netsoft54395.2022.9844077","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T19:34:09Z","timestamp":1659555249000},"page":"480-485","source":"Crossref","is-referenced-by-count":0,"title":["Always-Sustainable Software Security"],"prefix":"10.1109","author":[{"given":"Vincent","family":"Lefebvre","sequence":"first","affiliation":[{"name":"Sarl. Tages Solidshield,Le Cannet,France"}]},{"given":"Gianni","family":"Santinelli","sequence":"additional","affiliation":[{"name":"Sarl. Tages Solidshield,Le Cannet,France"}]}],"member":"263","reference":[{"key":"ref10","article-title":"TCS Research, Tata Consultancy","author":"kulkanir","year":"0","journal-title":"A New Code Obfuscation Scheme for Software Protection"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.85"},{"key":"ref12","article-title":"Malware obfuscation measuring via evolutionary similarity","author":"li","year":"2009","journal-title":"first International Conference on Future Information Networks"},{"key":"ref13","article-title":"Advances in computers journal","author":"ahmadvand","year":"2018","journal-title":"A Taxonomy of Software Integrity Protection Techniques"},{"key":"ref14","article-title":"SOK","author":"szekeres","year":"0","journal-title":"SoK Eternal War in Memory"},{"journal-title":"vonNeumann and the current computer security landscape","year":"0","author":"keromytis","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3342559.3365336"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2897795.2897803"},{"key":"ref18","article-title":"Memory Errors: The Past, the Present and and Future, RAID 2012 conference","author":"van der veen","year":"2012","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref19","first-page":"12","volume":"16","author":"shoshitaishvili","year":"0","journal-title":"Mechanical Phish resilient autonomous Hacking"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177155"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2018.00024"},{"journal-title":"Code Obfuscation Literature Survey","year":"2005","author":"balakrishnan","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214301"},{"journal-title":"Binary obfuscation using Signals in USENIX Security Symposium","year":"2007","author":"popov","key":"ref8"},{"key":"ref7","article-title":"Software Protection with Obfuscation. Singapore","author":"balachandran","year":"2013","journal-title":"Conference International Conference on Information Security Practice and Experience"},{"journal-title":"Inspire-5G plus project deliverable D2 2","year":"2021","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123121"},{"journal-title":"SGX explained Intel SGX Explained","year":"2016","author":"costan","key":"ref1"},{"key":"ref20","article-title":"Rise of Hacrs-Augmenting cyber reasoning systems with human assistance","author":"shoshitaishvili","year":"2017","journal-title":"Young The Technical Writer's Handbook"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0002-y"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870876"},{"journal-title":"Anti-tamper system with self-adjusting guards","year":"0","key":"ref24"},{"journal-title":"Anti-tamper system employing automated analysis","year":"0","key":"ref23"},{"key":"ref26","article-title":"TEEShift, Protecting Code Confidentiality by Selectively Shifting Functions into TEEs","author":"lazard","year":"2018","journal-title":"SysTEX 2018 conference Proceedings of the 3rd Workshop on System Software for Trusted Execution"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cola.2019.100939"}],"event":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","start":{"date-parts":[[2022,6,27]]},"location":"Milan, Italy","end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE 8th International Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9844017\/9844019\/09844077.pdf?arnumber=9844077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T20:02:19Z","timestamp":1661198539000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9844077\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/netsoft54395.2022.9844077","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]}}}