{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:55Z","timestamp":1750308775616,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,11]],"date-time":"2014-06-11T00:00:00Z","timestamp":1402444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0811689"],"award-info":[{"award-number":["CNS-0811689"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8650-10-C-7025 and FA8750-13-2-0096"],"award-info":[{"award-number":["FA8650-10-C-7025 and FA8750-13-2-0096"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911-10-0131"],"award-info":[{"award-number":["W911-10-0131"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,11]]},"DOI":"10.1145\/2600918.2600928","type":"proceedings-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:50:25Z","timestamp":1402404625000},"page":"23-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["What's the PointiSA?"],"prefix":"10.1145","author":[{"given":"Sudeep","family":"Ghosh","sequence":"first","affiliation":[{"name":"Microsoft Corporation, Redmond, WA, USA"}]},{"given":"Jason D.","family":"Hiser","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Jack W.","family":"Davidson","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Compilers: principles, techniques, and tools","author":"Aho A. V.","year":"1986","unstructured":"Aho , A. V. , Sethi , R. , and Ullman , J. D . Compilers: principles, techniques, and tools . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 1986 . Aho, A. V., Sethi, R., and Ullman, J. D. Compilers: principles, techniques, and tools. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1986."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179509.1179521"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731528"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247401"},{"key":"e_1_3_2_1_5_1","volume-title":"Black Hat Europe (Amsterdam, the Netherlands","author":"Biondi P.","year":"2006","unstructured":"Biondi , P. , and Fabrice , D . Silver needle in the skype . In Black Hat Europe (Amsterdam, the Netherlands , 2006 ). Biondi, P., and Fabrice, D. Silver needle in the skype. In Black Hat Europe (Amsterdam, the Netherlands, 2006)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/647777.734775"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346284"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_2_1_10_1","unstructured":"Computing Group T. TCG TPM specification version 1.2 revisions 62-94.  Computing Group T. TCG TPM specification version 1.2 revisions 62-94."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/997163.997194"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151051"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929304.1929307"},{"key":"e_1_3_2_1_16_1","first-page":"141","volume-title":"Digital Rights Management Workshop","author":"Horne B.","year":"2001","unstructured":"Horne , B. , Matheson , L. R. , Sheehan , C. , and Tarjan , R. E . Dynamic self-checking techniques for improved tamper resistance . In Digital Rights Management Workshop ( London, U.K. , 2001 ), pp. 141 -- 159 . Horne, B., Matheson, L. R., Sheehan, C., and Tarjan, R. E. Dynamic self-checking techniques for improved tamper resistance. In Digital Rights Management Workshop (London, U.K., 2001), pp. 141--159."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288887"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_1"},{"key":"e_1_3_2_1_22_1","volume-title":"http:\/\/oreans.com\/themida.php","author":"Oreans Technologies","year":"2009","unstructured":"Oreans Technologies . Themida. http:\/\/oreans.com\/themida.php , 2009 . Oreans Technologies. Themida. http:\/\/oreans.com\/themida.php, 2009."},{"key":"e_1_3_2_1_23_1","volume-title":"http:\/\/oreans.com\/codevirtualizer.php","author":"Oreons Technology","year":"2009","unstructured":"Oreons Technology . Codevirtualizer. http:\/\/oreans.com\/codevirtualizer.php , 2009 . Oreons Technology. Codevirtualizer. http:\/\/oreans.com\/codevirtualizer.php, 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Peinado M. P.England and Y.Chen. An overview of NGSCB. Trusted Computing Chapter 4 (2005).  Peinado M. P.England and Y.Chen. An overview of NGSCB. Trusted Computing Chapter 4 (2005).","DOI":"10.1049\/PBPC006E_ch4"},{"key":"e_1_3_2_1_25_1","first-page":"57","volume-title":"The protection of computer software|its technology and applications (New York","author":"Phipps J.","year":"1989","unstructured":"Phipps , J. Physical protection devices . In The protection of computer software|its technology and applications (New York , NY, USA , 1989 ), Cambridge University Press , pp. 57 -- 78 . Phipps, J. Physical protection devices. In The protection of computer software|its technology and applications (New York, NY, USA, 1989), Cambridge University Press, pp. 57--78."},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"SSYM '07: Proceedings of 16th USENIX Security Symposium-","volume":"18","author":"Popov I. V.","year":"2007","unstructured":"Popov , I. V. , Debray , S. K. , and Andrews , G. R . Binary obfuscation using signals . In SSYM '07: Proceedings of 16th USENIX Security Symposium- Volume 18 (Berkeley, CA, USA, 2007 ), USENIX Association , pp. 19: 1 -- 19 :16. Popov, I. V., Debray, S. K., and Andrews, G. R. Binary obfuscation using signals. In SSYM '07: Proceedings of 16th USENIX Security Symposium- Volume 18 (Berkeley, CA, USA, 2007), USENIX Association, pp. 19:1--19:16."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855876.1855877"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/776261.776265"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178766.1178771"},{"key":"e_1_3_2_1_30_1","volume-title":"Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design)","author":"Smith J.","year":"2005","unstructured":"Smith , J. , and Nair , R . Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design) . Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA, 2005 . Smith, J., and Nair, R. Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2005."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_32_1","volume-title":"http:\/\/vmpsoft.com\/","author":"Protect Software","year":"2008","unstructured":"VM Protect Software . VMProtect. http:\/\/vmpsoft.com\/ , 2008 . VMProtect Software . VMProtect. http:\/\/vmpsoft.com\/, 2008."},{"key":"e_1_3_2_1_33_1","volume-title":"Principia Mathematica. No. v. 2 in Principia Mathematica","author":"Whitehead A.","year":"1912","unstructured":"Whitehead , A. , and Russell , B . Principia Mathematica. No. v. 2 in Principia Mathematica . University Press , 1912 . Whitehead, A., and Russell, B. Principia Mathematica. No. v. 2 in Principia Mathematica. University Press, 1912."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.2"}],"event":{"name":"IH&MMSec '14: ACM Information Hiding and Multimedia Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Salzburg Austria","acronym":"IH&MMSec '14"},"container-title":["Proceedings of the 2nd ACM workshop on Information hiding and multimedia security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600918.2600928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:39Z","timestamp":1750278159000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,11]]},"references-count":32,"alternative-id":["10.1145\/2600918.2600928","10.1145\/2600918"],"URL":"https:\/\/doi.org\/10.1145\/2600918.2600928","relation":{},"subject":[],"published":{"date-parts":[[2014,6,11]]},"assertion":[{"value":"2014-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}