{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:28Z","timestamp":1750308208867,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,29]],"date-time":"2004-10-29T00:00:00Z","timestamp":1099008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,29]]},"DOI":"10.1145\/1029618.1029623","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"23-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Review and analysis of synthetic diversity for breaking monocultures"],"prefix":"10.1145","author":[{"given":"James E.","family":"Just","sequence":"first","affiliation":[{"name":"Global InfoTek, Inc., Reston, VA"}]},{"given":"Mark","family":"Cornwell","sequence":"additional","affiliation":[{"name":"Global InfoTek, Inc., Reston, VA"}]}],"member":"320","published-online":{"date-parts":[[2004,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aleph One \"Smashing The Stack For Fun And Profit\" Phrack 49 Volume Seven Issue Forty-Nine File 14 of 16 11\/8\/1995]]  Aleph One \"Smashing The Stack For Fun And Profit\" Phrack 49 Volume Seven Issue Forty-Nine File 14 of 16 11\/8\/1995]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/800027.808469"},{"key":"e_1_3_2_1_3_1","first-page":"1491","volume-title":"No12","author":"Avizienis A.","year":"1985"},{"key":"e_1_3_2_1_4_1","first-page":"22","article-title":"Self-Protecting Mobile Agents Obfuscation Techniques Evaluation Report","volume":"01","author":"Badger Lee","year":"2001","journal-title":"Network Associates Laboratories, Report #"},{"volume-title":"Mediating Connectors. Proceedings of the 19th IEEE International Conference on Distributed Computing Systems","year":"1999","author":"Balzer R.","key":"e_1_3_2_1_5_1"},{"volume-title":"Advances in Cryptology-CRYPTO '01","author":"Barak Boaz","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_8_1","first-page":"28","article-title":"N-Version programming method of Software Fault Tolerance: A Critical Review","volume":"721302","author":"Bharathi V.","year":"2003","journal-title":"Indian Institute of Technology, Kharagpur"},{"key":"e_1_3_2_1_9_1","unstructured":"Sandeep Bhatkar Daniel C. DuVarney and R. Sekar \"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits \" 12th USENIX Security Symposium August 2003.]]   Sandeep Bhatkar Daniel C. DuVarney and R. Sekar \"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits \" 12th USENIX Security Symposium August 2003.]]"},{"key":"e_1_3_2_1_10_1","first-page":"3","article-title":"N-version programming: A fault-tolerance approach to reliability of software operation","author":"Chen L.","year":"1978","journal-title":"IEEE 8th FTCS"},{"key":"e_1_3_2_1_11_1","unstructured":"M. Chew D. Song. \"Mitigating Buffer Overflows by Operating System Randomization \" Technical Report CMU-CS-02-197.]]  M. Chew D. Song. \"Mitigating Buffer Overflows by Operating System Randomization \" Technical Report CMU-CS-02-197.]]"},{"volume-title":"Oorschot: A White-Box DES Implementation for DRM Applications. Digital Rights Management Workshop 2002:  1--15]]","author":"Chow Stanley","key":"e_1_3_2_1_12_1"},{"volume-title":"Proceedings of the Ninth Workshop on Selected Areas in Cryptography (SAC 2002)","author":"Chow S.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_2_1_16_1","first-page":"28","volume-title":"Proceedings of the 1998 International Conference on Computer Languages","author":"Collberg C.","year":"1998"},{"key":"e_1_3_2_1_17_1","unstructured":"Larry D'Anna Brian Matt Andrew Reisse Tom Van Vleck Steve Schwab Patrick LeBlanc \"Self-Protecting Mobile Agents Obfuscation Report - Final report \" Network Associates Laboratories Report #03--015 June 30 2003]]  Larry D'Anna Brian Matt Andrew Reisse Tom Van Vleck Steve Schwab Patrick LeBlanc \"Self-Protecting Mobile Agents Obfuscation Report - Final report \" Network Associates Laboratories Report #03--015 June 30 2003]]"},{"key":"e_1_3_2_1_18_1","unstructured":"Hiroaki Etoh and Kunikazu Yoda. Protecting from stack smashing attacks. Published on World-WideWeb at URL &lt;http:\/\/www.trl.ibm.com\/projects\/security\/ssp\/main.html&gt; June 2000.]]  Hiroaki Etoh and Kunikazu Yoda. Protecting from stack smashing attacks. Published on World-WideWeb at URL &lt;http:\/\/www.trl.ibm.com\/projects\/security\/ssp\/main.html&gt; June 2000.]]"},{"volume-title":"CA, 1997. IEEE Computer Society Press.]]","author":"Forrest Stephanie","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/582128.582149"},{"volume-title":"2002 ACM Workshop on Digital Rights Management. Washington, D.C.","author":"Jacob Matthias","key":"e_1_3_2_1_21_1"},{"volume-title":"5th International Symposium","year":"2002","author":"Just James E.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_24_1","first-page":"135","volume-title":"Digest of Papers FTCS-15: Fifteenth International Symposium on Fault-Tolerant Computing","author":"Knight J.C.","year":"1985"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312924"},{"key":"e_1_3_2_1_26_1","unstructured":"Hamilton E. Link and William D. Neumann \"Clarifying Obfuscation: Improving the Security of White-Box Encoding\" Sandia National Laboratories Albuquerque NM downloaded from eprint.iacr.org\/2004\/025.pdf]]  Hamilton E. Link and William D. Neumann \"Clarifying Obfuscation: Improving the Security of White-Box Encoding\" Sandia National Laboratories Albuquerque NM downloaded from eprint.iacr.org\/2004\/025.pdf]]"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"volume-title":"NGS Research Whitepaper","year":"2003","author":"Litchfield David","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"D. L. Lough. A Taxonomy of Computer Attacks with Applications to Wireless Networks. PhD Thesis Virginia Polytechnic and State University Blackburg VA.]]   D. L. Lough. A Taxonomy of Computer Attacks with Applications to Wireless Networks. PhD Thesis Virginia Polytechnic and State University Blackburg VA.]]"},{"key":"e_1_3_2_1_30_1","unstructured":"Douglas Low Java Control Flow Obfuscation MS Thesis Univ. Auckland 3 June 1998]]  Douglas Low Java Control Flow Obfuscation MS Thesis Univ. Auckland 3 June 1998]]"},{"key":"e_1_3_2_1_31_1","first-page":"69","volume-title":"The Sixteen Annual Int. Computer Software and Applications Conf.","author":"Lyu M.R.","year":"1992"},{"key":"e_1_3_2_1_32_1","unstructured":"Mudge \"How To write buffer overflows\" http:\/\/www.insecure.org\/stf\/mudge_buffer_overflow_tutorial.html 10\/20\/1995]]  Mudge \"How To write buffer overflows\" http:\/\/www.insecure.org\/stf\/mudge_buffer_overflow_tutorial.html 10\/20\/1995]]"},{"key":"e_1_3_2_1_33_1","unstructured":"Pax. Published on World-Wide Web at URL http:\/\/pageexec.virtualave.net 2001.]]  Pax. Published on World-Wide Web at URL http:\/\/pageexec.virtualave.net 2001.]]"},{"key":"e_1_3_2_1_34_1","unstructured":"Ryan Permeh Marc Maiffret Code Red Disassembly Analysis eEye Digital Security &lt;http:\/\/www.eeye.com\/html\/advisories\/codered.zip&gt;.]]  Ryan Permeh Marc Maiffret Code Red Disassembly Analysis eEye Digital Security &lt;http:\/\/www.eeye.com\/html\/advisories\/codered.zip&gt;.]]"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312842"},{"key":"e_1_3_2_1_36_1","unstructured":"Jeff Rowe \"Diversity Draft\" private communication UC Davis 25 Nov. 2003]]  Jeff Rowe \"Diversity Draft\" private communication UC Davis 25 Nov. 2003]]"},{"volume-title":"VA 20191","year":"1875","author":"Silberman Peter","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","unstructured":"Stuart Staniford Nicholas Weaver Vern Paxson. \"Flash Worms: Is there any Hope?\" Silicon Defense Retrieved 27 March 2003 &lt;http:\/\/silicondefense]]  Stuart Staniford Nicholas Weaver Vern Paxson. \"Flash Worms: Is there any Hope?\" Silicon Defense Retrieved 27 March 2003 &lt;http:\/\/silicondefense]]"},{"volume-title":"Proceedings of the 11th USENIX Security Symposium.","year":"2002","author":"Staniford Stuart","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","unstructured":"Chenxi Wang \"A Security Architecture for Survivability Mechanisms.\" PhD thesis University of Virginia October 2000.]]   Chenxi Wang \"A Security Architecture for Survivability Mechanisms.\" PhD thesis University of Virginia October 2000.]]"},{"key":"e_1_3_2_1_41_1","unstructured":"Chenxi Wang \"Protection of software-based survivability schemes\" in the proceedings of 2001 Dependable Systems and Networks. Gutenburg Sweden. July 2001.]]   Chenxi Wang \"Protection of software-based survivability schemes\" in the proceedings of 2001 Dependable Systems and Networks. Gutenburg Sweden. July 2001.]]"},{"key":"e_1_3_2_1_42_1","unstructured":"w00w00 \"Heap Overflow\" http:\/\/www.w00w00.org\/files\/articles\/heaptut.txt 1\/1999]]  w00w00 \"Heap Overflow\" http:\/\/www.w00w00.org\/files\/articles\/heaptut.txt 1\/1999]]"},{"key":"e_1_3_2_1_43_1","unstructured":"Gregory Wroblewski \"General Method of Program Code Obfuscation \" PhD Dissertation Wroclaw University of Technology Institute of Engineering Cybernetics 2002.]]  Gregory Wroblewski \"General Method of Program Code Obfuscation \" PhD Dissertation Wroclaw University of Technology Institute of Engineering Cybernetics 2002.]]"},{"volume-title":"2002 International Conference on Software Engineering Research and Practice (SERP'02)","year":"2002","author":"General Gregory","key":"e_1_3_2_1_44_1"},{"volume-title":"Proc. of 22nd Symposium on Reliable and Distributed Systems (SRDS)","year":"2003","author":"Xu Jun","key":"e_1_3_2_1_45_1"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 2004 ACM workshop on Rapid malcode"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029618.1029623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029618.1029623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:00Z","timestamp":1750264260000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029618.1029623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,29]]},"references-count":44,"alternative-id":["10.1145\/1029618.1029623","10.1145\/1029618"],"URL":"https:\/\/doi.org\/10.1145\/1029618.1029623","relation":{},"subject":[],"published":{"date-parts":[[2004,10,29]]},"assertion":[{"value":"2004-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}