{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:09Z","timestamp":1750220769832,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T00:00:00Z","timestamp":1582070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,19]]},"DOI":"10.1145\/3385209.3385219","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T00:35:48Z","timestamp":1591490148000},"page":"34-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Developing Anti-tamper Functionalities through Continuous Integration"],"prefix":"10.1145","author":[{"given":"Ara","family":"Hur","sequence":"first","affiliation":[{"name":"Department of Security Management and Engineering, Myongji University, Yongin, Gyeonggi-do, Korea"}]},{"given":"Yeonseung","family":"Ryu","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Myongji University, Yongin, Gyeonggi-do, Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/www.gartner.com\/en\/documents\/3558917 (29","author":"Gartner Research","year":"2016","unstructured":"Gartner Research, https:\/\/www.gartner.com\/en\/documents\/3558917 (29 December 2016)."},{"volume-title":"Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations","author":"Fei H.","key":"e_1_3_2_1_2_1","unstructured":"Fei, H. 2016. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations. CRC Press."},{"key":"e_1_3_2_1_3_1","volume-title":"An introduction to software protection concepts. Intellectual Property Today","author":"Wilson K.","year":"2007","unstructured":"Wilson, K. 2007. An introduction to software protection concepts. Intellectual Property Today (2007), 36--41."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.07.007"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61996-8_49"},{"key":"e_1_3_2_1_7_1","unstructured":"Ogiso T. Sakabe Y. Soshi M. and Miyaji A. 2003. Software Obfuscation on a Theoretical Basic and its Implementation IEICE Transaction on Fundamentals of Electronics Communications and Computer Sciences E86-A(1) 1 (2003) 176--186."},{"volume-title":"Proceedings of the 2nd Bangalore Annual Compute Conference","author":"Sivadasan P.","key":"e_1_3_2_1_8_1","unstructured":"Sivadasan, P., SojanLal, P., and Sivadasan, N. 2009. JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. In Proceedings of the 2nd Bangalore Annual Compute Conference, New York, USA."},{"volume-title":"Proceedings of the International Conference on Computer Science Service System","author":"Le Y.","key":"e_1_3_2_1_9_1","unstructured":"Le, Y. and Huo-Jiao, H. 2012. Research on Java bytecode parse and obfuscate tool. In Proceedings of the International Conference on Computer Science Service System, Nanjing, China."},{"key":"e_1_3_2_1_10_1","unstructured":"Abaco Systems White Paper. Anti-tamper Technology: Safeguarding Today's COTS Platforms. https:\/\/www.abaco.com\/library\/white-papers."},{"key":"e_1_3_2_1_11_1","unstructured":"Huber II A. F. and Scott J. M. 1999. The role and nature of anti-tamper techniques in U.S. defense acquisition Acquisition Review Quarterly_Fall 355--368."},{"key":"e_1_3_2_1_12_1","unstructured":"Lorraine M. Shirley A. and Jon M. 2001. The DACS Software Reliability Sourcebook. Data and Analysis Center for Software Rome LAB."},{"key":"e_1_3_2_1_13_1","unstructured":"Guidelines for Implementation of Anti-tamper Techniques in Weapon System Acquisition Programs US USD (A&T) Memorandum (2000)."},{"key":"e_1_3_2_1_14_1","unstructured":"Implementing Anti-tamper. US USD (A&T) Memorandum (2001)."},{"key":"e_1_3_2_1_15_1","unstructured":"Implementation of Anti-tamper (AT) Techniques in Acquisition Programs. US DoD memorandum (1999)."},{"key":"e_1_3_2_1_16_1","volume-title":"FPGA Prototyping by VHDL Examples: Xilinx Microblaze MCS SoC","author":"Pong C.","unstructured":"Pong, C. 2017. FPGA Prototyping by VHDL Examples: Xilinx Microblaze MCS SoC. 2nd ed. Wiley.","edition":"2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/968280.968305"},{"key":"e_1_3_2_1_18_1","unstructured":"Louise H. C. Ross A. E. Martin A. E. and Robert W. S. 2014. The Zynq Book: Embedded Processing with the ARM Cortex-A9 on the Xilinx Zynq-7000 All Programmable SoC First ed. Strathclyde Academic Media."},{"key":"e_1_3_2_1_19_1","unstructured":"Jenkins Homepage http:\/\/jenkins.io."},{"volume-title":"Proceedings of International Workshop on Defense Technology and Security","author":"Minhae J.","key":"e_1_3_2_1_20_1","unstructured":"Minhae, J., Yeonseung, R., and Hyunkyoo, P. 2018. A FPGA-based scheme for protecting weapon system software technology, In Proceedings of International Workshop on Defense Technology and Security, Melbourne, Australia."},{"key":"e_1_3_2_1_21_1","unstructured":"Stunnix Homepage http:\/\/stunix.com."},{"key":"e_1_3_2_1_22_1","unstructured":"Sandmark Homepage http:\/\/sandmark.cs.arizona.edu."},{"key":"e_1_3_2_1_23_1","unstructured":"Cloakware Homepage https:\/\/irdeto.com."},{"key":"e_1_3_2_1_24_1","unstructured":"StarForce Homepage http:\/\/star-force.com."},{"key":"e_1_3_2_1_25_1","unstructured":"Themida Homepage https:\/\/www.oreans.com."},{"key":"e_1_3_2_1_26_1","unstructured":"Impulse C Homepage http:\/\/www.Impulsec.com."},{"key":"e_1_3_2_1_27_1","unstructured":"Mitrion-C Homepage http:\/\/www.mitrionics.com."},{"key":"e_1_3_2_1_28_1","unstructured":"Handel-C Homepage http:\/\/www.mentor.com."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.107"},{"key":"e_1_3_2_1_30_1","unstructured":"Xilinx SDSoC Homepage https:\/\/www.xilinx.com\/products\/design-tools\/software-zone\/sdsoc.html."},{"key":"e_1_3_2_1_31_1","unstructured":"Git Homepage https:\/\/git-scm.com."}],"event":{"name":"ICIIT 2020: 2020 5th International Conference on Intelligent Information Technology","acronym":"ICIIT 2020","location":"Hanoi Viet Nam"},"container-title":["Proceedings of the 2020 5th International Conference on Intelligent Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3385209.3385219","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3385209.3385219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:14Z","timestamp":1750200074000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3385209.3385219"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,19]]},"references-count":30,"alternative-id":["10.1145\/3385209.3385219","10.1145\/3385209"],"URL":"https:\/\/doi.org\/10.1145\/3385209.3385219","relation":{},"subject":[],"published":{"date-parts":[[2020,2,19]]},"assertion":[{"value":"2020-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}