Software Protection Through Dynamic Code Mutation View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2006

AUTHORS

Matias Madou , Bertrand Anckaert , Patrick Moseley , Saumya Debray , Bjorn De Sutter , Koen De Bosschere

ABSTRACT

Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in attacks against software systems, and can facilitate software piracy. This paper introduces a novel technique to complicate reverse engineering. The idea is to change the program code repeatedly as it executes, thereby thwarting correct disassembly. The technique can be made as secure as the least secure component of opaque variables and pseudorandom number generators. More... »

PAGES

194-206

References to SciGraph publications

  • 1996. Tamper resistant software: an implementation in INFORMATION HIDING
  • Book

    TITLE

    Information Security Applications

    ISBN

    978-3-540-31012-9
    978-3-540-33153-7

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/11604938_15

    DOI

    http://dx.doi.org/10.1007/11604938_15

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1021939173


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Department of Electronics and Information Systems, Ghent University, B-9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Madou", 
            "givenName": "Matias", 
            "id": "sg:person.011031570557.52", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011031570557.52"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Department of Electronics and Information Systems, Ghent University, B-9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Anckaert", 
            "givenName": "Bertrand", 
            "id": "sg:person.013243217423.37", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Arizona", 
              "id": "https://www.grid.ac/institutes/grid.134563.6", 
              "name": [
                "Department of Computer Science, University of Arizona, 85721, Tucson, AZ, U.S.A."
              ], 
              "type": "Organization"
            }, 
            "familyName": "Moseley", 
            "givenName": "Patrick", 
            "id": "sg:person.011260202435.94", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011260202435.94"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Arizona", 
              "id": "https://www.grid.ac/institutes/grid.134563.6", 
              "name": [
                "Department of Computer Science, University of Arizona, 85721, Tucson, AZ, U.S.A."
              ], 
              "type": "Organization"
            }, 
            "familyName": "Debray", 
            "givenName": "Saumya", 
            "id": "sg:person.0652310314.85", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0652310314.85"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Department of Electronics and Information Systems, Ghent University, B-9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Sutter", 
            "givenName": "Bjorn", 
            "id": "sg:person.014214375307.41", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014214375307.41"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Department of Electronics and Information Systems, Ghent University, B-9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Bosschere", 
            "givenName": "Koen", 
            "id": "sg:person.013465130107.96", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/358438.349303", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002013056"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/512644.512653", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003720188"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/997163.997194", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004207335"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/237721.237765", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005294481"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1002/spe.4380250706", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014272010"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-61996-8_49", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017797835", 
              "https://doi.org/10.1007/3-540-61996-8_49"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/155332.155346", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017838373"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/268946.268962", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022024311"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/378795.378798", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028425386"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/356989.357005", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028754060"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/800157.805047", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053230526"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tse.2002.1027797", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061788215"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1177/109434200001400404", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063976886"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1177/109434200001400404", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063976886"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.21236/ada466288", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1091579036"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csac.2003.1254318", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093228123"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/wcre.2002.1173063", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094037165"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/fits.2003.1264939", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094549648"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/cmpsac.2003.1245338", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095356272"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccl.1998.674164", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095424880"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccl.1998.674154", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095632951"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/349299.349303", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1098991821"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/512529.512542", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1098992245"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2006", 
        "datePublishedReg": "2006-01-01", 
        "description": "Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in attacks against software systems, and can facilitate software piracy. This paper introduces a novel technique to complicate reverse engineering. The idea is to change the program code repeatedly as it executes, thereby thwarting correct disassembly. The technique can be made as secure as the least secure component of opaque variables and pseudorandom number generators.", 
        "editor": [
          {
            "familyName": "Song", 
            "givenName": "Joo-Seok", 
            "type": "Person"
          }, 
          {
            "familyName": "Kwon", 
            "givenName": "Taekyoung", 
            "type": "Person"
          }, 
          {
            "familyName": "Yung", 
            "givenName": "Moti", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/11604938_15", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-540-31012-9", 
            "978-3-540-33153-7"
          ], 
          "name": "Information Security Applications", 
          "type": "Book"
        }, 
        "name": "Software Protection Through Dynamic Code Mutation", 
        "pagination": "194-206", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1021939173"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/11604938_15"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "6885dbcf1b1f393447ec6f001bf59a0d50494246b618859a8cf1fd38bf8030e4"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/11604938_15", 
          "https://app.dimensions.ai/details/publication/pub.1021939173"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T07:29", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000356_0000000356/records_57871_00000000.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F11604938_15"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11604938_15'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11604938_15'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11604938_15'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11604938_15'


     

    This table displays all metadata directly associated to this object as RDF triples.

    180 TRIPLES      23 PREDICATES      49 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/11604938_15 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author N2df098af951944dc98afdc34cf2022ed
    4 schema:citation sg:pub.10.1007/3-540-61996-8_49
    5 https://doi.org/10.1002/spe.4380250706
    6 https://doi.org/10.1109/cmpsac.2003.1245338
    7 https://doi.org/10.1109/csac.2003.1254318
    8 https://doi.org/10.1109/fits.2003.1264939
    9 https://doi.org/10.1109/iccl.1998.674154
    10 https://doi.org/10.1109/iccl.1998.674164
    11 https://doi.org/10.1109/tse.2002.1027797
    12 https://doi.org/10.1109/wcre.2002.1173063
    13 https://doi.org/10.1145/155332.155346
    14 https://doi.org/10.1145/237721.237765
    15 https://doi.org/10.1145/268946.268962
    16 https://doi.org/10.1145/349299.349303
    17 https://doi.org/10.1145/356989.357005
    18 https://doi.org/10.1145/358438.349303
    19 https://doi.org/10.1145/378795.378798
    20 https://doi.org/10.1145/512529.512542
    21 https://doi.org/10.1145/512644.512653
    22 https://doi.org/10.1145/800157.805047
    23 https://doi.org/10.1145/997163.997194
    24 https://doi.org/10.1177/109434200001400404
    25 https://doi.org/10.21236/ada466288
    26 schema:datePublished 2006
    27 schema:datePublishedReg 2006-01-01
    28 schema:description Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in attacks against software systems, and can facilitate software piracy. This paper introduces a novel technique to complicate reverse engineering. The idea is to change the program code repeatedly as it executes, thereby thwarting correct disassembly. The technique can be made as secure as the least secure component of opaque variables and pseudorandom number generators.
    29 schema:editor N5035dc1be0c1484abae0be9eeef8065d
    30 schema:genre chapter
    31 schema:inLanguage en
    32 schema:isAccessibleForFree true
    33 schema:isPartOf N8138efc20ed544a5bcb0e6af1b584e84
    34 schema:name Software Protection Through Dynamic Code Mutation
    35 schema:pagination 194-206
    36 schema:productId N0ec49bfaeab44d79b7d2dab1ee73ba68
    37 N883213421b7d49ca92525b4cc220d404
    38 Ne9b2fe80e68940ccbcafdabf3bf2c5ce
    39 schema:publisher N869d45d9bb7f4176964ac748217a25ff
    40 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021939173
    41 https://doi.org/10.1007/11604938_15
    42 schema:sdDatePublished 2019-04-16T07:29
    43 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    44 schema:sdPublisher Nc4360fd499ab455fbeda393bc140428d
    45 schema:url https://link.springer.com/10.1007%2F11604938_15
    46 sgo:license sg:explorer/license/
    47 sgo:sdDataset chapters
    48 rdf:type schema:Chapter
    49 N08ccbe6e0766410784b65601c7391e48 rdf:first sg:person.013465130107.96
    50 rdf:rest rdf:nil
    51 N0ec49bfaeab44d79b7d2dab1ee73ba68 schema:name doi
    52 schema:value 10.1007/11604938_15
    53 rdf:type schema:PropertyValue
    54 N2df098af951944dc98afdc34cf2022ed rdf:first sg:person.011031570557.52
    55 rdf:rest N507694ac7ff047e7a49fd37f6af9207c
    56 N4a1df23c4b48440582d6361b7a64569e schema:familyName Song
    57 schema:givenName Joo-Seok
    58 rdf:type schema:Person
    59 N5035dc1be0c1484abae0be9eeef8065d rdf:first N4a1df23c4b48440582d6361b7a64569e
    60 rdf:rest N51ff47cdf0404a82b68a3d8ea89c2f3f
    61 N507694ac7ff047e7a49fd37f6af9207c rdf:first sg:person.013243217423.37
    62 rdf:rest Na22c13e580284fe58a1f27c72a04d3e5
    63 N51ff47cdf0404a82b68a3d8ea89c2f3f rdf:first Nc55a995dc05d4886b02f628e719ca6b3
    64 rdf:rest Nb4ba05981c814086bb9a32dd5f7208f1
    65 N5510cdf0611b4ceea90b7fa827923091 rdf:first sg:person.014214375307.41
    66 rdf:rest N08ccbe6e0766410784b65601c7391e48
    67 N8138efc20ed544a5bcb0e6af1b584e84 schema:isbn 978-3-540-31012-9
    68 978-3-540-33153-7
    69 schema:name Information Security Applications
    70 rdf:type schema:Book
    71 N869d45d9bb7f4176964ac748217a25ff schema:location Berlin, Heidelberg
    72 schema:name Springer Berlin Heidelberg
    73 rdf:type schema:Organisation
    74 N883213421b7d49ca92525b4cc220d404 schema:name dimensions_id
    75 schema:value pub.1021939173
    76 rdf:type schema:PropertyValue
    77 N89d31bd1d7c5497caa56311e85871cc2 schema:familyName Yung
    78 schema:givenName Moti
    79 rdf:type schema:Person
    80 Na22c13e580284fe58a1f27c72a04d3e5 rdf:first sg:person.011260202435.94
    81 rdf:rest Ne7854ecba4414c908d010309439972b4
    82 Nb4ba05981c814086bb9a32dd5f7208f1 rdf:first N89d31bd1d7c5497caa56311e85871cc2
    83 rdf:rest rdf:nil
    84 Nc4360fd499ab455fbeda393bc140428d schema:name Springer Nature - SN SciGraph project
    85 rdf:type schema:Organization
    86 Nc55a995dc05d4886b02f628e719ca6b3 schema:familyName Kwon
    87 schema:givenName Taekyoung
    88 rdf:type schema:Person
    89 Ne7854ecba4414c908d010309439972b4 rdf:first sg:person.0652310314.85
    90 rdf:rest N5510cdf0611b4ceea90b7fa827923091
    91 Ne9b2fe80e68940ccbcafdabf3bf2c5ce schema:name readcube_id
    92 schema:value 6885dbcf1b1f393447ec6f001bf59a0d50494246b618859a8cf1fd38bf8030e4
    93 rdf:type schema:PropertyValue
    94 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    95 schema:name Information and Computing Sciences
    96 rdf:type schema:DefinedTerm
    97 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    98 schema:name Computer Software
    99 rdf:type schema:DefinedTerm
    100 sg:person.011031570557.52 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    101 schema:familyName Madou
    102 schema:givenName Matias
    103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011031570557.52
    104 rdf:type schema:Person
    105 sg:person.011260202435.94 schema:affiliation https://www.grid.ac/institutes/grid.134563.6
    106 schema:familyName Moseley
    107 schema:givenName Patrick
    108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011260202435.94
    109 rdf:type schema:Person
    110 sg:person.013243217423.37 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    111 schema:familyName Anckaert
    112 schema:givenName Bertrand
    113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37
    114 rdf:type schema:Person
    115 sg:person.013465130107.96 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    116 schema:familyName De Bosschere
    117 schema:givenName Koen
    118 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96
    119 rdf:type schema:Person
    120 sg:person.014214375307.41 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    121 schema:familyName De Sutter
    122 schema:givenName Bjorn
    123 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014214375307.41
    124 rdf:type schema:Person
    125 sg:person.0652310314.85 schema:affiliation https://www.grid.ac/institutes/grid.134563.6
    126 schema:familyName Debray
    127 schema:givenName Saumya
    128 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0652310314.85
    129 rdf:type schema:Person
    130 sg:pub.10.1007/3-540-61996-8_49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017797835
    131 https://doi.org/10.1007/3-540-61996-8_49
    132 rdf:type schema:CreativeWork
    133 https://doi.org/10.1002/spe.4380250706 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014272010
    134 rdf:type schema:CreativeWork
    135 https://doi.org/10.1109/cmpsac.2003.1245338 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095356272
    136 rdf:type schema:CreativeWork
    137 https://doi.org/10.1109/csac.2003.1254318 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093228123
    138 rdf:type schema:CreativeWork
    139 https://doi.org/10.1109/fits.2003.1264939 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094549648
    140 rdf:type schema:CreativeWork
    141 https://doi.org/10.1109/iccl.1998.674154 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095632951
    142 rdf:type schema:CreativeWork
    143 https://doi.org/10.1109/iccl.1998.674164 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095424880
    144 rdf:type schema:CreativeWork
    145 https://doi.org/10.1109/tse.2002.1027797 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061788215
    146 rdf:type schema:CreativeWork
    147 https://doi.org/10.1109/wcre.2002.1173063 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094037165
    148 rdf:type schema:CreativeWork
    149 https://doi.org/10.1145/155332.155346 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017838373
    150 rdf:type schema:CreativeWork
    151 https://doi.org/10.1145/237721.237765 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005294481
    152 rdf:type schema:CreativeWork
    153 https://doi.org/10.1145/268946.268962 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022024311
    154 rdf:type schema:CreativeWork
    155 https://doi.org/10.1145/349299.349303 schema:sameAs https://app.dimensions.ai/details/publication/pub.1098991821
    156 rdf:type schema:CreativeWork
    157 https://doi.org/10.1145/356989.357005 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028754060
    158 rdf:type schema:CreativeWork
    159 https://doi.org/10.1145/358438.349303 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002013056
    160 rdf:type schema:CreativeWork
    161 https://doi.org/10.1145/378795.378798 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028425386
    162 rdf:type schema:CreativeWork
    163 https://doi.org/10.1145/512529.512542 schema:sameAs https://app.dimensions.ai/details/publication/pub.1098992245
    164 rdf:type schema:CreativeWork
    165 https://doi.org/10.1145/512644.512653 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003720188
    166 rdf:type schema:CreativeWork
    167 https://doi.org/10.1145/800157.805047 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053230526
    168 rdf:type schema:CreativeWork
    169 https://doi.org/10.1145/997163.997194 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004207335
    170 rdf:type schema:CreativeWork
    171 https://doi.org/10.1177/109434200001400404 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063976886
    172 rdf:type schema:CreativeWork
    173 https://doi.org/10.21236/ada466288 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091579036
    174 rdf:type schema:CreativeWork
    175 https://www.grid.ac/institutes/grid.134563.6 schema:alternateName University of Arizona
    176 schema:name Department of Computer Science, University of Arizona, 85721, Tucson, AZ, U.S.A.
    177 rdf:type schema:Organization
    178 https://www.grid.ac/institutes/grid.5342.0 schema:alternateName Ghent University
    179 schema:name Department of Electronics and Information Systems, Ghent University, B-9000, Ghent, Belgium
    180 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...