Software Protection Through Dynamic Code Mutation View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2006

AUTHORS

Matias Madou , Bertrand Anckaert , Patrick Moseley , Saumya Debray , Bjorn De Sutter , Koen De Bosschere

ABSTRACT

Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in attacks against software systems, and can facilitate software piracy. This paper introduces a novel technique to complicate reverse engineering. The idea is to change the program code repeatedly as it executes, thereby thwarting correct disassembly. The technique can be made as secure as the least secure component of opaque variables and pseudorandom number generators. More... »

PAGES

194-206

References to SciGraph publications

  • 1996. Tamper resistant software: an implementation in INFORMATION HIDING
  • Book

    TITLE

    Information Security Applications

    ISBN

    978-3-540-31012-9
    978-3-540-33153-7

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/11604938_15

    DOI

    http://dx.doi.org/10.1007/11604938_15

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1021939173


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Department of Electronics and Information Systems, Ghent University, B-9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Madou", 
            "givenName": "Matias", 
            "id": "sg:person.011031570557.52", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011031570557.52"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Department of Electronics and Information Systems, Ghent University, B-9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Anckaert", 
            "givenName": "Bertrand", 
            "id": "sg:person.013243217423.37", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Arizona", 
              "id": "https://www.grid.ac/institutes/grid.134563.6", 
              "name": [
                "Department of Computer Science, University of Arizona, 85721, Tucson, AZ, U.S.A."
              ], 
              "type": "Organization"
            }, 
            "familyName": "Moseley", 
            "givenName": "Patrick", 
            "id": "sg:person.011260202435.94", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011260202435.94"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Arizona", 
              "id": "https://www.grid.ac/institutes/grid.134563.6", 
              "name": [
                "Department of Computer Science, University of Arizona, 85721, Tucson, AZ, U.S.A."
              ], 
              "type": "Organization"
            }, 
            "familyName": "Debray", 
            "givenName": "Saumya", 
            "id": "sg:person.0652310314.85", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0652310314.85"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Department of Electronics and Information Systems, Ghent University, B-9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Sutter", 
            "givenName": "Bjorn", 
            "id": "sg:person.014214375307.41", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014214375307.41"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Department of Electronics and Information Systems, Ghent University, B-9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Bosschere", 
            "givenName": "Koen", 
            "id": "sg:person.013465130107.96", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/358438.349303", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002013056"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/512644.512653", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003720188"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/997163.997194", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004207335"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/237721.237765", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005294481"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1002/spe.4380250706", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014272010"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-61996-8_49", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017797835", 
              "https://doi.org/10.1007/3-540-61996-8_49"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/155332.155346", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017838373"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/268946.268962", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022024311"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/378795.378798", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028425386"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/356989.357005", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028754060"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/800157.805047", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053230526"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tse.2002.1027797", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061788215"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1177/109434200001400404", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063976886"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1177/109434200001400404", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063976886"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.21236/ada466288", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1091579036"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csac.2003.1254318", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093228123"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/wcre.2002.1173063", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094037165"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/fits.2003.1264939", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094549648"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/cmpsac.2003.1245338", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095356272"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccl.1998.674164", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095424880"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccl.1998.674154", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095632951"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/349299.349303", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1098991821"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/512529.512542", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1098992245"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2006", 
        "datePublishedReg": "2006-01-01", 
        "description": "Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in attacks against software systems, and can facilitate software piracy. This paper introduces a novel technique to complicate reverse engineering. The idea is to change the program code repeatedly as it executes, thereby thwarting correct disassembly. The technique can be made as secure as the least secure component of opaque variables and pseudorandom number generators.", 
        "editor": [
          {
            "familyName": "Song", 
            "givenName": "Joo-Seok", 
            "type": "Person"
          }, 
          {
            "familyName": "Kwon", 
            "givenName": "Taekyoung", 
            "type": "Person"
          }, 
          {
            "familyName": "Yung", 
            "givenName": "Moti", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/11604938_15", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-540-31012-9", 
            "978-3-540-33153-7"
          ], 
          "name": "Information Security Applications", 
          "type": "Book"
        }, 
        "name": "Software Protection Through Dynamic Code Mutation", 
        "pagination": "194-206", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1021939173"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/11604938_15"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "6885dbcf1b1f393447ec6f001bf59a0d50494246b618859a8cf1fd38bf8030e4"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/11604938_15", 
          "https://app.dimensions.ai/details/publication/pub.1021939173"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T07:29", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000356_0000000356/records_57871_00000000.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F11604938_15"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11604938_15'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11604938_15'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11604938_15'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11604938_15'


     

    This table displays all metadata directly associated to this object as RDF triples.

    180 TRIPLES      23 PREDICATES      49 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/11604938_15 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author N30c27b71394f4531b08196af56df36f1
    4 schema:citation sg:pub.10.1007/3-540-61996-8_49
    5 https://doi.org/10.1002/spe.4380250706
    6 https://doi.org/10.1109/cmpsac.2003.1245338
    7 https://doi.org/10.1109/csac.2003.1254318
    8 https://doi.org/10.1109/fits.2003.1264939
    9 https://doi.org/10.1109/iccl.1998.674154
    10 https://doi.org/10.1109/iccl.1998.674164
    11 https://doi.org/10.1109/tse.2002.1027797
    12 https://doi.org/10.1109/wcre.2002.1173063
    13 https://doi.org/10.1145/155332.155346
    14 https://doi.org/10.1145/237721.237765
    15 https://doi.org/10.1145/268946.268962
    16 https://doi.org/10.1145/349299.349303
    17 https://doi.org/10.1145/356989.357005
    18 https://doi.org/10.1145/358438.349303
    19 https://doi.org/10.1145/378795.378798
    20 https://doi.org/10.1145/512529.512542
    21 https://doi.org/10.1145/512644.512653
    22 https://doi.org/10.1145/800157.805047
    23 https://doi.org/10.1145/997163.997194
    24 https://doi.org/10.1177/109434200001400404
    25 https://doi.org/10.21236/ada466288
    26 schema:datePublished 2006
    27 schema:datePublishedReg 2006-01-01
    28 schema:description Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in attacks against software systems, and can facilitate software piracy. This paper introduces a novel technique to complicate reverse engineering. The idea is to change the program code repeatedly as it executes, thereby thwarting correct disassembly. The technique can be made as secure as the least secure component of opaque variables and pseudorandom number generators.
    29 schema:editor Ncd0f7e4cda0b4f27b8190924b820e33d
    30 schema:genre chapter
    31 schema:inLanguage en
    32 schema:isAccessibleForFree true
    33 schema:isPartOf Nc10a475f0d7d4473ac91c7ac246009f3
    34 schema:name Software Protection Through Dynamic Code Mutation
    35 schema:pagination 194-206
    36 schema:productId N03cdf80d9d5f4a42aeffaf919c3f2dab
    37 N60ce91cb4d46402ea6df176406582a96
    38 Nb6805041e4414be29765c88eefdb7138
    39 schema:publisher Nd00167350f4f4670811134fef5348413
    40 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021939173
    41 https://doi.org/10.1007/11604938_15
    42 schema:sdDatePublished 2019-04-16T07:29
    43 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    44 schema:sdPublisher Na4584ea687ec4176ba71272da6d618f6
    45 schema:url https://link.springer.com/10.1007%2F11604938_15
    46 sgo:license sg:explorer/license/
    47 sgo:sdDataset chapters
    48 rdf:type schema:Chapter
    49 N03cdf80d9d5f4a42aeffaf919c3f2dab schema:name readcube_id
    50 schema:value 6885dbcf1b1f393447ec6f001bf59a0d50494246b618859a8cf1fd38bf8030e4
    51 rdf:type schema:PropertyValue
    52 N30c27b71394f4531b08196af56df36f1 rdf:first sg:person.011031570557.52
    53 rdf:rest Na0483cdc960c40c788ff815849de16d0
    54 N395aeab04a024ee182d2efb0be11aed5 rdf:first sg:person.011260202435.94
    55 rdf:rest Nce780a562af843789a66bd3bd81d0190
    56 N57939bbd2d394a5c988fe923d36e8542 rdf:first Nf6d472ff1b30491d9161c3389232be60
    57 rdf:rest rdf:nil
    58 N60ce91cb4d46402ea6df176406582a96 schema:name dimensions_id
    59 schema:value pub.1021939173
    60 rdf:type schema:PropertyValue
    61 Na0483cdc960c40c788ff815849de16d0 rdf:first sg:person.013243217423.37
    62 rdf:rest N395aeab04a024ee182d2efb0be11aed5
    63 Na4584ea687ec4176ba71272da6d618f6 schema:name Springer Nature - SN SciGraph project
    64 rdf:type schema:Organization
    65 Nb0a4a736e6ba444aa4a8d4b8c1f8041a rdf:first sg:person.013465130107.96
    66 rdf:rest rdf:nil
    67 Nb4be6f90c06f452ca73cf7f941963746 schema:familyName Song
    68 schema:givenName Joo-Seok
    69 rdf:type schema:Person
    70 Nb6805041e4414be29765c88eefdb7138 schema:name doi
    71 schema:value 10.1007/11604938_15
    72 rdf:type schema:PropertyValue
    73 Nb9cd2f10fe734c988d46147c277a2e97 rdf:first sg:person.014214375307.41
    74 rdf:rest Nb0a4a736e6ba444aa4a8d4b8c1f8041a
    75 Nc10a475f0d7d4473ac91c7ac246009f3 schema:isbn 978-3-540-31012-9
    76 978-3-540-33153-7
    77 schema:name Information Security Applications
    78 rdf:type schema:Book
    79 Ncd0f7e4cda0b4f27b8190924b820e33d rdf:first Nb4be6f90c06f452ca73cf7f941963746
    80 rdf:rest Ne94b8b43e48b42629a9633ce396e5c8b
    81 Nce780a562af843789a66bd3bd81d0190 rdf:first sg:person.0652310314.85
    82 rdf:rest Nb9cd2f10fe734c988d46147c277a2e97
    83 Nd00167350f4f4670811134fef5348413 schema:location Berlin, Heidelberg
    84 schema:name Springer Berlin Heidelberg
    85 rdf:type schema:Organisation
    86 Ne94b8b43e48b42629a9633ce396e5c8b rdf:first Nf66f791ad599422caccd5e1c6916b9c0
    87 rdf:rest N57939bbd2d394a5c988fe923d36e8542
    88 Nf66f791ad599422caccd5e1c6916b9c0 schema:familyName Kwon
    89 schema:givenName Taekyoung
    90 rdf:type schema:Person
    91 Nf6d472ff1b30491d9161c3389232be60 schema:familyName Yung
    92 schema:givenName Moti
    93 rdf:type schema:Person
    94 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    95 schema:name Information and Computing Sciences
    96 rdf:type schema:DefinedTerm
    97 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    98 schema:name Computer Software
    99 rdf:type schema:DefinedTerm
    100 sg:person.011031570557.52 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    101 schema:familyName Madou
    102 schema:givenName Matias
    103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011031570557.52
    104 rdf:type schema:Person
    105 sg:person.011260202435.94 schema:affiliation https://www.grid.ac/institutes/grid.134563.6
    106 schema:familyName Moseley
    107 schema:givenName Patrick
    108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011260202435.94
    109 rdf:type schema:Person
    110 sg:person.013243217423.37 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    111 schema:familyName Anckaert
    112 schema:givenName Bertrand
    113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37
    114 rdf:type schema:Person
    115 sg:person.013465130107.96 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    116 schema:familyName De Bosschere
    117 schema:givenName Koen
    118 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96
    119 rdf:type schema:Person
    120 sg:person.014214375307.41 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    121 schema:familyName De Sutter
    122 schema:givenName Bjorn
    123 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014214375307.41
    124 rdf:type schema:Person
    125 sg:person.0652310314.85 schema:affiliation https://www.grid.ac/institutes/grid.134563.6
    126 schema:familyName Debray
    127 schema:givenName Saumya
    128 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0652310314.85
    129 rdf:type schema:Person
    130 sg:pub.10.1007/3-540-61996-8_49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017797835
    131 https://doi.org/10.1007/3-540-61996-8_49
    132 rdf:type schema:CreativeWork
    133 https://doi.org/10.1002/spe.4380250706 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014272010
    134 rdf:type schema:CreativeWork
    135 https://doi.org/10.1109/cmpsac.2003.1245338 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095356272
    136 rdf:type schema:CreativeWork
    137 https://doi.org/10.1109/csac.2003.1254318 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093228123
    138 rdf:type schema:CreativeWork
    139 https://doi.org/10.1109/fits.2003.1264939 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094549648
    140 rdf:type schema:CreativeWork
    141 https://doi.org/10.1109/iccl.1998.674154 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095632951
    142 rdf:type schema:CreativeWork
    143 https://doi.org/10.1109/iccl.1998.674164 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095424880
    144 rdf:type schema:CreativeWork
    145 https://doi.org/10.1109/tse.2002.1027797 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061788215
    146 rdf:type schema:CreativeWork
    147 https://doi.org/10.1109/wcre.2002.1173063 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094037165
    148 rdf:type schema:CreativeWork
    149 https://doi.org/10.1145/155332.155346 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017838373
    150 rdf:type schema:CreativeWork
    151 https://doi.org/10.1145/237721.237765 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005294481
    152 rdf:type schema:CreativeWork
    153 https://doi.org/10.1145/268946.268962 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022024311
    154 rdf:type schema:CreativeWork
    155 https://doi.org/10.1145/349299.349303 schema:sameAs https://app.dimensions.ai/details/publication/pub.1098991821
    156 rdf:type schema:CreativeWork
    157 https://doi.org/10.1145/356989.357005 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028754060
    158 rdf:type schema:CreativeWork
    159 https://doi.org/10.1145/358438.349303 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002013056
    160 rdf:type schema:CreativeWork
    161 https://doi.org/10.1145/378795.378798 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028425386
    162 rdf:type schema:CreativeWork
    163 https://doi.org/10.1145/512529.512542 schema:sameAs https://app.dimensions.ai/details/publication/pub.1098992245
    164 rdf:type schema:CreativeWork
    165 https://doi.org/10.1145/512644.512653 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003720188
    166 rdf:type schema:CreativeWork
    167 https://doi.org/10.1145/800157.805047 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053230526
    168 rdf:type schema:CreativeWork
    169 https://doi.org/10.1145/997163.997194 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004207335
    170 rdf:type schema:CreativeWork
    171 https://doi.org/10.1177/109434200001400404 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063976886
    172 rdf:type schema:CreativeWork
    173 https://doi.org/10.21236/ada466288 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091579036
    174 rdf:type schema:CreativeWork
    175 https://www.grid.ac/institutes/grid.134563.6 schema:alternateName University of Arizona
    176 schema:name Department of Computer Science, University of Arizona, 85721, Tucson, AZ, U.S.A.
    177 rdf:type schema:Organization
    178 https://www.grid.ac/institutes/grid.5342.0 schema:alternateName Ghent University
    179 schema:name Department of Electronics and Information Systems, Ghent University, B-9000, Ghent, Belgium
    180 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...