{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T03:55:39Z","timestamp":1771300539196,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,7]],"date-time":"2008-06-07T00:00:00Z","timestamp":1212796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,7]]},"DOI":"10.1145\/1375696.1375702","type":"proceedings-article","created":{"date-parts":[[2008,6,10]],"date-time":"2008-06-10T14:13:22Z","timestamp":1213107202000},"page":"33-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["A compiler-based infrastructure for software-protection"],"prefix":"10.1145","author":[{"given":"Clifford","family":"Liem","sequence":"first","affiliation":[{"name":"Cloakware Corporation, Ottawa, ON, Canada"}]},{"given":"Yuan Xiang","family":"Gu","sequence":"additional","affiliation":[{"name":"Cloakware Corporation, Ottawa, ON, Canada"}]},{"given":"Harold","family":"Johnson","sequence":"additional","affiliation":[{"name":"Cloakware Corporation, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2008,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Compilers: Principles, Techniques, and Tools","author":"Aho A.","year":"1988","unstructured":"A. Aho , R. Sethi , and J. D. Ullman . Compilers: Principles, Techniques, and Tools . Addison Wesley , 1988 , 796 pp.]] A. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison Wesley, 1988, 796 pp.]]"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"CRYPTO","author":"Barak B.","year":"2001","unstructured":"B. Barak , O. Goldreich , R. Impagliazzo , S. Rudich , A. Sahai , S. Vadhan , K. Yang , \" On the (Im)possibility of Obfuscating Programs\" , CRYPTO 2001 , pages 1 -- 18 .]] B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, K. Yang, \"On the (Im)possibility of Obfuscating Programs\", CRYPTO 2001, pages 1--18.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_2"},{"key":"e_1_3_2_1_4_1","article-title":"Attack Trees, Modeling Security Threats","author":"Schneier B.","year":"1999","unstructured":"B. Schneier , \" Attack Trees, Modeling Security Threats \", Dr. Dobb's Journal , Dec , 1999 .]] B. Schneier, \"Attack Trees, Modeling Security Threats\", Dr. Dobb's Journal, Dec, 1999.]]","journal-title":"Dr. Dobb's Journal"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-6422-2","volume-title":"Retargetable Compilers for Embedded Core Processors: Methods and Experiences in Industrial Applications","author":"Liem C.","year":"1997","unstructured":"C. Liem , Retargetable Compilers for Embedded Core Processors: Methods and Experiences in Industrial Applications , Kluwer Academic Publishers , 1997 , 155 pp.]] C. Liem, Retargetable Compilers for Embedded Core Processors: Methods and Experiences in Industrial Applications, Kluwer Academic Publishers, 1997, 155 pp.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647882.738073"},{"key":"e_1_3_2_1_8_1","unstructured":"C. Wang. \"A Security Architecture for Survivability Mechanisms\". PhD thesis Department of Computer Science University of Virginia October 2000.]]   C. Wang. \"A Security Architecture for Survivability Mechanisms\". PhD thesis Department of Computer Science University of Virginia October 2000.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"The Benjamin\/Cummings Publishing Company","author":"Fischer C.","year":"1991","unstructured":"C. Fischer , R. LeBlanc Jr . , Crafting a Compiler with C , The Benjamin\/Cummings Publishing Company , Inc ., 1991 , 812 pp.]] C. Fischer, R. LeBlanc Jr., Crafting a Compiler with C, The Benjamin\/Cummings Publishing Company, Inc., 1991, 812 pp.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731528"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830545"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.13"},{"key":"e_1_3_2_1_13_1","volume-title":"European Symposium on Programming (ESOP).LNCS, 4421","author":"Mantel Heiko","year":"2007","unstructured":"Heiko Mantel and Alexander Reinhard , \" Controlling the What and Where of Declassification in Language-Based Security\" , In European Symposium on Programming (ESOP).LNCS, 4421 . Springer , 2007 .]] Heiko Mantel and Alexander Reinhard, \"Controlling the What and Where of Declassification in Language-Based Security\", In European Symposium on Programming (ESOP).LNCS, 4421. Springer, 2007.]]"},{"key":"e_1_3_2_1_14_1","unstructured":"http:\/\/gcc.gnu.org\/install\/test.html]]  http:\/\/gcc.gnu.org\/install\/test.html]]"},{"key":"e_1_3_2_1_15_1","unstructured":"http:\/\/preemptive.com\/]]  http:\/\/preemptive.com\/]]"},{"key":"e_1_3_2_1_16_1","unstructured":"http:\/\/proguard.sourceforge.net\/]]  http:\/\/proguard.sourceforge.net\/]]"},{"key":"e_1_3_2_1_17_1","unstructured":"http:\/\/www.boost.org\/]]  http:\/\/www.boost.org\/]]"},{"key":"e_1_3_2_1_18_1","unstructured":"http:\/\/www.cryptopp.com]]  http:\/\/www.cryptopp.com]]"},{"key":"e_1_3_2_1_19_1","unstructured":"http:\/\/www.datarescue.com\/]]  http:\/\/www.datarescue.com\/]]"},{"key":"e_1_3_2_1_20_1","unstructured":"http:\/\/www.edg.com]]  http:\/\/www.edg.com]]"},{"key":"e_1_3_2_1_21_1","unstructured":"http:\/\/www.ollydbg.de\/]]  http:\/\/www.ollydbg.de\/]]"},{"key":"e_1_3_2_1_22_1","unstructured":"http:\/\/www.peren.com\/]]  http:\/\/www.peren.com\/]]"},{"key":"e_1_3_2_1_23_1","unstructured":"International Standard ISO\/IEC 14882:2003(E) \"Programming languages -C++\"]]  International Standard ISO\/IEC 14882:2003(E) \"Programming languages -C++\"]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301665"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0019-9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2005.13"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964017"},{"key":"e_1_3_2_1_28_1","volume-title":"Butterworh-Heinemann, 450 pp.]]","author":"Morgan Robert","unstructured":"Robert Morgan , Building an Optimizing Compiler , Butterworh-Heinemann, 450 pp.]] Robert Morgan, Building an Optimizing Compiler, Butterworh-Heinemann, 450 pp.]]"},{"key":"e_1_3_2_1_29_1","first-page":"779","article-title":"Tamper Resistant Software - Control Flow Encoding","volume":"6","author":"Chow S.","year":"1999","unstructured":"S. Chow , H. Johnson , Y. Gu , \" Tamper Resistant Software - Control Flow Encoding \", US Patent 6 , 779 , 114, filed August 19, 1999 .]] S. Chow, H. Johnson, Y. Gu, \"Tamper Resistant Software - Control Flow Encoding\", US Patent 6,779, 114, filed August 19, 1999.]]","journal-title":"US Patent"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of 2nd work ACM Workshop on Digital Rights Management 2002","author":"Chow S.","year":"2002","unstructured":"S. Chow , P. Eisen , H. Johnson , and P. van Oorschot . \" A White-Box DES Implementation for DRM Applications\". In Proceedings of 2nd work ACM Workshop on Digital Rights Management 2002 , Nov 18 2002 .]] S. Chow, P. Eisen, H. Johnson, and P. van Oorschot. \"A White-Box DES Implementation for DRM Applications\". In Proceedings of 2nd work ACM Workshop on Digital Rights Management 2002, Nov 18 2002.]]"},{"key":"e_1_3_2_1_31_1","volume-title":"ISC 2001","author":"Chow S.","year":"2001","unstructured":"S. Chow , Y. Gu , H. Johnson , V. Zakharov . \"An approach to the obfuscation of control--flow of sequential computer programs\". In G. Davida and Y. Frankel, Information Security , ISC 2001 , vol 2200 of Lectures Notes in Computer Science, Springer.Verlag , 2001 . 68.]] S. Chow, Y. Gu, H. Johnson, V. Zakharov. \"An approach to the obfuscation of control--flow of sequential computer programs\". In G. Davida and Y. Frankel, Information Security, ISC 2001, vol 2200 of Lectures Notes in Computer Science, Springer.Verlag, 2001. 68.]]"},{"key":"e_1_3_2_1_32_1","first-page":"856","volume-title":"Advanced Compiler Design and Implementation","author":"Muchnick S.","unstructured":"S. Muchnick , Advanced Compiler Design and Implementation , Elsevier , pp 856 .]] S. Muchnick, Advanced Compiler Design and Implementation, Elsevier, pp 856.]]"},{"key":"e_1_3_2_1_33_1","first-page":"61","volume-title":"8th International Workshop on Information Security Applications (WISA 2007","author":"Zhou Y.","year":"2008","unstructured":"Y. Zhou , A. Main , Y. Gu , H. Johnson , \" Information Hiding in Software with Mixed Boolean-- Arithmetic Transforms\" , 8th International Workshop on Information Security Applications (WISA 2007 ), pp 61 -- 75 , Springer LNCS 4867 , 2008 ]] Y. Zhou, A. Main, Y. Gu, H. Johnson, \"Information Hiding in Software with Mixed Boolean--Arithmetic Transforms\", 8th International Workshop on Information Security Applications (WISA 2007), pp 61--75, Springer LNCS 4867, 2008]]"}],"event":{"name":"PLDI '08: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Tucson AZ USA","acronym":"PLDI '08","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1375696.1375702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1375696.1375702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:18Z","timestamp":1750258038000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1375696.1375702"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,7]]},"references-count":33,"alternative-id":["10.1145\/1375696.1375702","10.1145\/1375696"],"URL":"https:\/\/doi.org\/10.1145\/1375696.1375702","relation":{},"subject":[],"published":{"date-parts":[[2008,6,7]]},"assertion":[{"value":"2008-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}