{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:24:53Z","timestamp":1775053493261,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314276.1314290","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"70-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Slicing obfuscations"],"prefix":"10.1145","author":[{"given":"Anirban","family":"Majumdar","sequence":"first","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"given":"Stephen J.","family":"Drape","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"given":"Clark D.","family":"Thomborson","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"May","author":"Alliance Business Software","year":"2005","unstructured":"Business Software Alliance . Second annual BSA and IDC software piracy study , May 2005 . Available from www.bsa.org\/globalstudy\/upload\/2005-Global-Study-English.pdf. Business Software Alliance. Second annual BSA and IDC software piracy study, May 2005. Available from www.bsa.org\/globalstudy\/upload\/2005-Global-Study-English.pdf."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the Workshop on Inspection in Software Engineering (WISE 2001","author":"Anderson Paul","year":"2001","unstructured":"Paul Anderson and Tim Teitelbaum . Software inspection using CodeSurfer . In Proceedings of the Workshop on Inspection in Software Engineering (WISE 2001 ), Paris, France , July 2001 . IEEE Computer Society. Paul Anderson and Tim Teitelbaum. Software inspection using CodeSurfer. In Proceedings of the Workshop on Inspection in Software Engineering (WISE 2001), Paris, France, July 2001. IEEE Computer Society."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704152"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776856"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/942800.943553"},{"key":"e_1_3_2_1_6_1","volume-title":"March","author":"Biondi Phillipe","year":"2006","unstructured":"Phillipe Biondi and Fabrice Desclaux . Silver needle in the Skype. Presentation at BlackHat Europe , March 2006 . Available from www.blackhat.com\/html\/bh-media-archives\/bh-archives-2006.html. Phillipe Biondi and Fabrice Desclaux. Silver needle in the Skype. Presentation at BlackHat Europe, March 2006. Available from www.blackhat.com\/html\/bh-media-archives\/bh-archives-2006.html."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1525579"},{"key":"e_1_3_2_1_11_1","volume-title":"Obfuscation of Abstract Data-Types. DPhil thesis","author":"Drape Stephen","year":"2004","unstructured":"Stephen Drape . Obfuscation of Abstract Data-Types. DPhil thesis , Oxford University Computing Laboratory , 2004 . Stephen Drape. Obfuscation of Abstract Data-Types. DPhil thesis, Oxford University Computing Laboratory, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/571157.571171"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2007.167"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.83912"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31984-9_20"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ADCOM.2006.4289963"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11961635_26"},{"key":"e_1_3_2_1_20_1","first-page":"256","volume-title":"WCRE '04: Proceedings of the 11th Working Conference on Reverse Engineering (WCRE'04)","author":"Timothy","year":"2004","unstructured":"Timothy M. Meyers and David Binkley. Slice-based cohesion metrics and software intervention . In WCRE '04: Proceedings of the 11th Working Conference on Reverse Engineering (WCRE'04) , pages 256 -- 265 , Washington, DC, USA , 2004 . IEEE Computer Society. Timothy M. Meyers and David Binkley. Slice-based cohesion metrics and software intervention. In WCRE '04: Proceedings of the 11th Working Conference on Reverse Engineering (WCRE'04), pages 256--265, Washington, DC, USA, 2004. IEEE Computer Society."},{"key":"e_1_3_2_1_21_1","first-page":"78","volume-title":"Proceedings of the IEEE-CS International Software Metrics Symposium","author":"Linda","year":"1993","unstructured":"Linda M. Ott and Jeffrey J. Thuss. Slice based metrics for estimating cohesion . In Proceedings of the IEEE-CS International Software Metrics Symposium , pages 78 -- 81 , 1993 . Linda M. Ott and Jeffrey J. Thuss. Slice based metrics for estimating cohesion. In Proceedings of the IEEE-CS International Software Metrics Symposium, pages 78--81, 1993."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/851042.857047"},{"key":"e_1_3_2_1_23_1","first-page":"53","volume-title":"First International Mobile IPR Workshop: Rights Management of Information (MobileIPR)","author":"Santos Nuno","year":"2003","unstructured":"Nuno Santos , Pedro Pereira , and Lu\u00eds Moura e Silva . A Generic DRM Framework for J2ME Applications. In Olli Pitk\u00e4nen, editor , First International Mobile IPR Workshop: Rights Management of Information (MobileIPR) , pages 53 -- 66 . Helsinki Institute for Information Tecnhology , August 2003 . Nuno Santos, Pedro Pereira, and Lu\u00eds Moura e Silva. A Generic DRM Framework for J2ME Applications. In Olli Pitk\u00e4nen, editor, First International Mobile IPR Workshop: Rights Management of Information (MobileIPR), pages 53--66. Helsinki Institute for Information Tecnhology, August 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.13"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","location":"Alexandria Virginia USA","acronym":"CCS07","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2007 ACM workshop on Digital Rights Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314276.1314290","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314276.1314290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:14:06Z","timestamp":1750259646000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314276.1314290"}},"subtitle":["design, correctness, and evaluation"],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":22,"alternative-id":["10.1145\/1314276.1314290","10.1145\/1314276"],"URL":"https:\/\/doi.org\/10.1145\/1314276.1314290","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}