{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:47:18Z","timestamp":1762004838293,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,12,5]],"date-time":"2016-12-05T00:00:00Z","timestamp":1480896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["609734"],"award-info":[{"award-number":["609734"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,12,5]]},"DOI":"10.1145\/3015135.3015142","type":"proceedings-article","created":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T20:36:32Z","timestamp":1481142992000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Tightly-coupled self-debugging software protection"],"prefix":"10.1145","author":[{"given":"Bert","family":"Abrath","sequence":"first","affiliation":[{"name":"Ghent University"}]},{"given":"Bart","family":"Coppens","sequence":"additional","affiliation":[{"name":"Ghent University"}]},{"given":"Stijn","family":"Volckaert","sequence":"additional","affiliation":[{"name":"University of Califoria at Irvine"}]},{"given":"Joris","family":"Wijnant","sequence":"additional","affiliation":[{"name":"Ghent University"}]},{"given":"Bjorn","family":"De Sutter","sequence":"additional","affiliation":[{"name":"Ghent University"}]}],"member":"320","published-online":{"date-parts":[[2016,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"41","volume-title":"USENIX Annual Technical Conference, FREENIX Track","author":"Bellard F.","year":"2005","unstructured":"F. Bellard . Qemu, a fast and portable dynamic translator . In USENIX Annual Technical Conference, FREENIX Track , pages 41 -- 46 , 2005 . F. Bellard. Qemu, a fast and portable dynamic translator. In USENIX Annual Technical Conference, FREENIX Track, pages 41--46, 2005."},{"key":"e_1_3_2_1_2_1","first-page":"17","volume-title":"Google I\/O Developer Conference","author":"Bornstein D.","year":"2008","unstructured":"D. Bornstein . Dalvik VM internals . In Google I\/O Developer Conference , volume 23 , pages 17 -- 30 , 2008 . D. Bornstein. Dalvik VM internals. In Google I\/O Developer Conference, volume 23, pages 17--30, 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808481"},{"key":"e_1_3_2_1_4_1","unstructured":"Carbon Monoxide. Scyllahide. https:\/\/bitbucket.org\/NtQuery\/scyllahide.  Carbon Monoxide. Scyllahide. https:\/\/bitbucket.org\/NtQuery\/scyllahide."},{"key":"e_1_3_2_1_5_1","volume-title":"Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection","author":"Christian Collberg J. N.","year":"2009","unstructured":"J. N. Christian Collberg . Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection . Addison-Wesley Professional , 2009 . J. N. Christian Collberg. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley Professional, 2009."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_2_1_7_1","unstructured":"G. Developers. GDB: The GNU Project Debugger. https:\/\/www.gnu.org\/software\/gdb\/.  G. Developers. GDB: The GNU Project Debugger. https:\/\/www.gnu.org\/software\/gdb\/."},{"key":"e_1_3_2_1_8_1","volume-title":"No Starch Press","author":"Eagle C.","year":"2011","unstructured":"C. Eagle . The IDA pro book: the unofficial guide to the world's most popular disassembler . No Starch Press , 2011 . C. Eagle. The IDA pro book: the unofficial guide to the world's most popular disassembler. No Starch Press, 2011."},{"key":"e_1_3_2_1_9_1","unstructured":"F. Eigler V. Prasad W. Cohen H. Nguyen and M. Hunt. Architecture of systemtap: a Linux trace\/probe tool. http:\/\/sourceware.org\/systemtap\/archpaper.pdf 2005.  F. Eigler V. Prasad W. Cohen H. Nguyen and M. Hunt. Architecture of systemtap: a Linux trace\/probe tool. http:\/\/sourceware.org\/systemtap\/archpaper.pdf 2005."},{"key":"e_1_3_2_1_10_1","unstructured":"P. Ferrie. The \"ultimate\" anti-debugging reference. http:\/\/anti-reversing.com\/Downloads\/Anti-Reversing\/The_Ultimate_Anti-Reversing_Reference.pdf April 2011.  P. Ferrie. The \"ultimate\" anti-debugging reference. http:\/\/anti-reversing.com\/Downloads\/Anti-Reversing\/The_Ultimate_Anti-Reversing_Reference.pdf April 2011."},{"key":"e_1_3_2_1_11_1","unstructured":"Ferrit. OllyExt 1.8. https:\/\/tuts4you.com\/download.php?view.3392.  Ferrit. OllyExt 1.8. https:\/\/tuts4you.com\/download.php?view.3392."},{"key":"e_1_3_2_1_12_1","unstructured":"B. Gregg. DTrace Tools. http:\/\/www.brendangregg.com\/dtrace.html.  B. Gregg. DTrace Tools. http:\/\/www.brendangregg.com\/dtrace.html."},{"volume-title":"Sogeti ESEC Lab","year":"2010","key":"e_1_3_2_1_13_1","unstructured":"jean. hack.lu CTF - Challenge 12 WriteUp. Technical report , Sogeti ESEC Lab , 2010 . jean. hack.lu CTF - Challenge 12 WriteUp. Technical report, Sogeti ESEC Lab, 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"key":"e_1_3_2_1_15_1","unstructured":"Linux Programmer's Manual. dlopen(3) - Linux man page.  Linux Programmer's Manual. dlopen(3) - Linux man page."},{"key":"e_1_3_2_1_16_1","unstructured":"Linux Programmer's Manual. fork(2) - Linux manual page.  Linux Programmer's Manual. fork(2) - Linux manual page."},{"key":"e_1_3_2_1_17_1","unstructured":"Linux Programmer's Manual. proc(5) - Linux manual page.  Linux Programmer's Manual. proc(5) - Linux manual page."},{"key":"e_1_3_2_1_18_1","unstructured":"mrexodia. TitanHide. https:\/\/bitbucket.org\/mrexodia\/titanhide.  mrexodia. TitanHide. https:\/\/bitbucket.org\/mrexodia\/titanhide."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_1_20_1","unstructured":"Pellsson. Starcraft 2 anti-debugging. http:\/\/www.bhfiles.com\/files\/StarCraft%20II\/Wings%20of%20Liberty%20%28Beta%29\/0x1337.org%20-%20SCII%20Anti-Debug.htm March 2010.  Pellsson. Starcraft 2 anti-debugging. http:\/\/www.bhfiles.com\/files\/StarCraft%20II\/Wings%20of%20Liberty%20%28Beta%29\/0x1337.org%20-%20SCII%20Anti-Debug.htm March 2010."},{"key":"e_1_3_2_1_21_1","volume-title":"CodeBreakers Magazine","author":"Schallner M.","year":"2006","unstructured":"M. Schallner . Beginners guide to basic linux anti anti debugging techniques . CodeBreakers Magazine , 2006 . M. Schallner. Beginners guide to basic linux anti anti debugging techniques. CodeBreakers Magazine, 2006."},{"key":"e_1_3_2_1_22_1","volume-title":"Pearson Education","author":"Seal D.","year":"2001","unstructured":"D. Seal . ARM architecture reference manual . Pearson Education , 2001 . D. Seal. ARM architecture reference manual. Pearson Education, 2001."},{"key":"e_1_3_2_1_23_1","volume-title":"Veracode","author":"Shields T.","year":"2009","unstructured":"T. Shields . Anti-debugging - a developers view. Technical report , Veracode , 2009 . T. Shields. Anti-debugging - a developers view. Technical report, Veracode, 2009."},{"key":"e_1_3_2_1_24_1","unstructured":"Ubuntu Wiki. SecurityTeam\/Roadmap\/KernelHardening - Ubuntu Wiki. https:\/\/wiki.ubuntu.com\/SecurityTeam\/Roadmap\/KernelHardening{\\#}ptrace{\\_}Protection.  Ubuntu Wiki. SecurityTeam\/Roadmap\/KernelHardening - Ubuntu Wiki. https:\/\/wiki.ubuntu.com\/SecurityTeam\/Roadmap\/KernelHardening{\\#}ptrace{\\_}Protection."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/ISSPIT.2005.1577061","volume-title":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005","author":"Van Put L.","year":"2005","unstructured":"L. Van Put , D. Chanet , B. De Bus , B. De Sutter , and K. De Bosschere . Diablo: a reliable, retargetable and extensible link-time rewriting framework . In Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005 ., pages 7 -- 12 . IEEE, 2005 . L. Van Put, D. Chanet, B. De Bus, B. De Sutter, and K. De Bosschere. Diablo: a reliable, retargetable and extensible link-time rewriting framework. In Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005., pages 7--12. IEEE, 2005."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/647882.738073"},{"key":"e_1_3_2_1_27_1","unstructured":"Yama. ptrace_scope. https:\/\/www.kernel.org\/doc\/Documentation\/security\/Yama.txt.  Yama. ptrace_scope. https:\/\/www.kernel.org\/doc\/Documentation\/security\/Yama.txt."}],"event":{"name":"SSPREW '16: Software Security, Protection, and Reverse Engineering Workshop","acronym":"SSPREW '16","location":"Los Angeles California USA"},"container-title":["Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3015135.3015142","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3015135.3015142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:18Z","timestamp":1750220658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3015135.3015142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,5]]},"references-count":27,"alternative-id":["10.1145\/3015135.3015142","10.1145\/3015135"],"URL":"https:\/\/doi.org\/10.1145\/3015135.3015142","relation":{},"subject":[],"published":{"date-parts":[[2016,12,5]]},"assertion":[{"value":"2016-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}