{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:20Z","timestamp":1762005080278,"version":"3.37.3"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/tifs.2019.2894577","type":"journal-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T00:19:23Z","timestamp":1548289163000},"page":"2203-2216","source":"Crossref","is-referenced-by-count":9,"title":["Hypervisor-Based Protection of Code"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8906-5940","authenticated-orcid":false,"given":"Michael","family":"Kiperberg","sequence":"first","affiliation":[]},{"given":"Roee","family":"Leon","sequence":"additional","affiliation":[]},{"given":"Amit","family":"Resh","sequence":"additional","affiliation":[]},{"given":"Asaf","family":"Algawi","sequence":"additional","affiliation":[]},{"given":"Nezer J.","family":"Zaidenberg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294294"},{"key":"ref38","article-title":"Using CPU system management mode to circumvent operating system security functions","author":"duflot","year":"2006","journal-title":"Proc 7th CanSecWest Conf"},{"volume":"2","journal-title":"AMD64 Architecture Programmer&#x2019;s Manual System Programming","year":"2010","key":"ref33"},{"volume":"3","journal-title":"64 and IA-32 Architectures Software Developer's Manual","year":"2007","key":"ref32"},{"key":"ref31","first-page":"255","article-title":"De-anonymizing programmers via code stylometry","author":"caliskan-islam","year":"2015","journal-title":"Proc 24th USENIX Conf Security Symp"},{"journal-title":"The Tigress C Diversifier\/Obfuscator","year":"2018","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_21"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235579"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1332","DOI":"10.1007\/978-1-4419-5906-5_796","article-title":"Trusted platform module","author":"morris","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"journal-title":"ARM Architecture Reference Manual","year":"2013","key":"ref34"},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-74409-2","author":"lambrinoudakis","year":"2007","journal-title":"Trust Privacy and Security in Digital Business 4th International Conference TrustBus 2007 Regensburg Germany September 3&#x2013;7 2007 Proceedings"},{"journal-title":"Openssl Cryptography and SSL\/TLS Toolkit","year":"2018","key":"ref62"},{"journal-title":"LAME","year":"2018","key":"ref61"},{"journal-title":"The Apache HTTP Server Project","year":"2019","key":"ref63"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"article-title":"Intel SGX Explained","year":"2016","author":"costan","key":"ref64"},{"key":"ref27","first-page":"1","article-title":"Unpacking virtualization obfuscators","author":"rolles","year":"2009","journal-title":"Proc Usenix Conf Offensive Technol (WOOT)"},{"journal-title":"Stunnix C\/C++ Obfuscator","year":"2018","key":"ref29"},{"journal-title":"A Tutorial on Software Obfuscation","year":"2017","author":"banescu","key":"ref2"},{"article-title":"A taxonomy of obfuscating transformations","year":"1997","author":"collberg","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77360-3_17"},{"key":"ref21","first-page":"34","article-title":"Cryptanalysis of the Xiao&#x2013;Lai white-box AES implementation","author":"de mulder","year":"2012","journal-title":"Proc Int Conf Sel Areas Cryptogr"},{"journal-title":"Attacks on Virtual Machine Emulators","year":"2007","author":"ferrie","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3015135.3015142"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.16"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059968"},{"journal-title":"Virtualbox","year":"2019","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"journal-title":"8th Generation Intel Core i7 Processors","year":"2019","key":"ref59"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519076"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138876"},{"journal-title":"Data Execution Prevention Changes to Functionality in Microsoft Windows XP Service Pack 2 Part 3 Memory Protection Technologies","year":"2004","author":"andersen","key":"ref56"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"key":"ref54","first-page":"1","article-title":"A minimalist approach to remote attestation","author":"francillon","year":"2014","journal-title":"Proc Design Automation Test Eur Conf Exhib"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.09.005"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1508293.1508311"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89598-5_7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991114"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3015135.3015136"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.47"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627395"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_7"},{"article-title":"White box cryptography: Another attempt","year":"2006","author":"bringer","key":"ref17"},{"key":"ref18","first-page":"278","article-title":"Protecting white-box AES with dual ciphers","author":"karroumi","year":"2010","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2009.5404239"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.44"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"article-title":"Data randomization","year":"2008","author":"cadar","key":"ref7"},{"journal-title":"VMWare Workstation","year":"2019","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"journal-title":"UPX The Ultimate Packer for eXecutables","year":"2019","key":"ref46"},{"journal-title":"PELock Software Protection","year":"2019","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884663"},{"journal-title":"Qubes OS Architecture Version 0 3","year":"2010","author":"rutkowska","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.50"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.38"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8710012\/08624561.pdf?arnumber=8624561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:16:23Z","timestamp":1657746983000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8624561\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":64,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2019.2894577","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2019,8]]}}}