Run-Time Randomization to Mitigate Tampering View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2007

AUTHORS

Bertrand Anckaert , Mariusz Jakubowski , Ramarathnam Venkatesan , Koen De Bosschere

ABSTRACT

The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical copies. The ideas presented in this paper are a compromise between distributing identical copies and unique executions by diversifying at run time, based upon additional chaff input and variable program state. This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers, or a subset of the input space. More... »

PAGES

153-168

References to SciGraph publications

  • 2002. Dynamic Self-Checking Techniques for Improved Tamper Resistance in SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT
  • 2002. Protecting Software Code by Guards in SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT
  • 2002-12-18. Oblivious Hashing: A Stealthy Software Integrity Verification Primitive in INFORMATION HIDING
  • 2004. The Obfuscation Executive in INFORMATION SECURITY
  • 2001. On the (Im)possibility of Obfuscating Programs in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • Book

    TITLE

    Advances in Information and Computer Security

    ISBN

    978-3-540-75650-7
    978-3-540-75651-4

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11

    DOI

    http://dx.doi.org/10.1007/978-3-540-75651-4_11

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1049257952


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Ghent University, Electronics and Information Systems Department, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Anckaert", 
            "givenName": "Bertrand", 
            "id": "sg:person.013243217423.37", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Microsoft (United States)", 
              "id": "https://www.grid.ac/institutes/grid.419815.0", 
              "name": [
                "Microsoft Research, Cryptography and Anti-Piracy Group, One Microsoft Way, Redmond, WA 98052, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Jakubowski", 
            "givenName": "Mariusz", 
            "id": "sg:person.014636160423.87", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014636160423.87"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Microsoft (United States)", 
              "id": "https://www.grid.ac/institutes/grid.419815.0", 
              "name": [
                "Microsoft Research, Cryptography and Anti-Piracy Group, One Microsoft Way, Redmond, WA 98052, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Venkatesan", 
            "givenName": "Ramarathnam", 
            "id": "sg:person.014063763433.38", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014063763433.38"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Ghent University, Electronics and Information Systems Department, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Bosschere", 
            "givenName": "Koen", 
            "id": "sg:person.013465130107.96", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1053283.1053286", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005591589"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/312203.312214", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015202247"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/977091.977139", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018540397"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/268946.268962", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022024311"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/93542.93550", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023218421"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1030083.1030124", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023536170"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/0167-4048(93)90054-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027872363"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/0167-4048(93)90054-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027872363"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30144-8_36", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029290335", 
              "https://doi.org/10.1007/978-3-540-30144-8_36"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30144-8_36", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029290335", 
              "https://doi.org/10.1007/978-3-540-30144-8_36"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1086642.1086645", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029418974"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-47870-1_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038284211", 
              "https://doi.org/10.1007/3-540-47870-1_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36415-3_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039509516", 
              "https://doi.org/10.1007/3-540-36415-3_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36415-3_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039509516", 
              "https://doi.org/10.1007/3-540-36415-3_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039594573", 
              "https://doi.org/10.1007/3-540-44647-8_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-47870-1_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047590996", 
              "https://doi.org/10.1007/3-540-47870-1_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1179509.1179521", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050843053"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1134760.1220164", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053327430"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/390016.808467", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063170611"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csac.2005.53", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093201082"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sp.2005.2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095083868"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/hotos.1997.595185", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095758678"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2007", 
        "datePublishedReg": "2007-01-01", 
        "description": "The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical copies. The ideas presented in this paper are a compromise between distributing identical copies and unique executions by diversifying at run time, based upon additional chaff input and variable program state. This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers, or a subset of the input space.", 
        "editor": [
          {
            "familyName": "Miyaji", 
            "givenName": "Atsuko", 
            "type": "Person"
          }, 
          {
            "familyName": "Kikuchi", 
            "givenName": "Hiroaki", 
            "type": "Person"
          }, 
          {
            "familyName": "Rannenberg", 
            "givenName": "Kai", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-540-75651-4_11", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-540-75650-7", 
            "978-3-540-75651-4"
          ], 
          "name": "Advances in Information and Computer Security", 
          "type": "Book"
        }, 
        "name": "Run-Time Randomization to Mitigate Tampering", 
        "pagination": "153-168", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-540-75651-4_11"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "eaa7da4b935b821f1d9b64c8b1af2d1d33c950ca95f4724ca873a9eb47c842f5"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1049257952"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-540-75651-4_11", 
          "https://app.dimensions.ai/details/publication/pub.1049257952"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T05:31", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000346_0000000346/records_99809_00000003.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-540-75651-4_11"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'


     

    This table displays all metadata directly associated to this object as RDF triples.

    161 TRIPLES      23 PREDICATES      46 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-540-75651-4_11 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author N15e60a05ae244517bab27f0b0cfcd8b9
    4 schema:citation sg:pub.10.1007/3-540-36415-3_26
    5 sg:pub.10.1007/3-540-44647-8_1
    6 sg:pub.10.1007/3-540-47870-1_10
    7 sg:pub.10.1007/3-540-47870-1_9
    8 sg:pub.10.1007/978-3-540-30144-8_36
    9 https://doi.org/10.1016/0167-4048(93)90054-9
    10 https://doi.org/10.1109/csac.2005.53
    11 https://doi.org/10.1109/hotos.1997.595185
    12 https://doi.org/10.1109/sp.2005.2
    13 https://doi.org/10.1145/1030083.1030124
    14 https://doi.org/10.1145/1053283.1053286
    15 https://doi.org/10.1145/1086642.1086645
    16 https://doi.org/10.1145/1134760.1220164
    17 https://doi.org/10.1145/1179509.1179521
    18 https://doi.org/10.1145/268946.268962
    19 https://doi.org/10.1145/312203.312214
    20 https://doi.org/10.1145/390016.808467
    21 https://doi.org/10.1145/93542.93550
    22 https://doi.org/10.1145/977091.977139
    23 schema:datePublished 2007
    24 schema:datePublishedReg 2007-01-01
    25 schema:description The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical copies. The ideas presented in this paper are a compromise between distributing identical copies and unique executions by diversifying at run time, based upon additional chaff input and variable program state. This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers, or a subset of the input space.
    26 schema:editor N243763394a6d49c88df69fd134fb7c0b
    27 schema:genre chapter
    28 schema:inLanguage en
    29 schema:isAccessibleForFree false
    30 schema:isPartOf N6ad6ed15ae1f46efa3494dbeb65f3415
    31 schema:name Run-Time Randomization to Mitigate Tampering
    32 schema:pagination 153-168
    33 schema:productId N10e6aad5cf8245b8a72396ce577cabb5
    34 N2f85bb5bacdc40168a90a8c173f3244b
    35 N369fe150bdf444e5a01840d27c4b0156
    36 schema:publisher Nc1496c81ce3443f180cdaceb1d943311
    37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049257952
    38 https://doi.org/10.1007/978-3-540-75651-4_11
    39 schema:sdDatePublished 2019-04-16T05:31
    40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    41 schema:sdPublisher N7bc8c73bd25f493b8084bc70b61e7226
    42 schema:url https://link.springer.com/10.1007%2F978-3-540-75651-4_11
    43 sgo:license sg:explorer/license/
    44 sgo:sdDataset chapters
    45 rdf:type schema:Chapter
    46 N10e6aad5cf8245b8a72396ce577cabb5 schema:name doi
    47 schema:value 10.1007/978-3-540-75651-4_11
    48 rdf:type schema:PropertyValue
    49 N15e60a05ae244517bab27f0b0cfcd8b9 rdf:first sg:person.013243217423.37
    50 rdf:rest N3e94dda7dd84440e9526b30189477f64
    51 N243763394a6d49c88df69fd134fb7c0b rdf:first Nc4af1c50fdff4d20821c7828f2418183
    52 rdf:rest Nb126025833724492ac7bccad077078fc
    53 N2d41b88b53944230b97d4402b1db8aa9 rdf:first sg:person.014063763433.38
    54 rdf:rest Nb244362b41d543338028f2df331ff0e3
    55 N2db4a17ecf3747bf8e88f02f1bfb1da0 schema:familyName Rannenberg
    56 schema:givenName Kai
    57 rdf:type schema:Person
    58 N2f85bb5bacdc40168a90a8c173f3244b schema:name dimensions_id
    59 schema:value pub.1049257952
    60 rdf:type schema:PropertyValue
    61 N369fe150bdf444e5a01840d27c4b0156 schema:name readcube_id
    62 schema:value eaa7da4b935b821f1d9b64c8b1af2d1d33c950ca95f4724ca873a9eb47c842f5
    63 rdf:type schema:PropertyValue
    64 N3e94dda7dd84440e9526b30189477f64 rdf:first sg:person.014636160423.87
    65 rdf:rest N2d41b88b53944230b97d4402b1db8aa9
    66 N6ad6ed15ae1f46efa3494dbeb65f3415 schema:isbn 978-3-540-75650-7
    67 978-3-540-75651-4
    68 schema:name Advances in Information and Computer Security
    69 rdf:type schema:Book
    70 N7bc8c73bd25f493b8084bc70b61e7226 schema:name Springer Nature - SN SciGraph project
    71 rdf:type schema:Organization
    72 N85e9962ebffc45ae897d7c21cca4c866 rdf:first N2db4a17ecf3747bf8e88f02f1bfb1da0
    73 rdf:rest rdf:nil
    74 Nb126025833724492ac7bccad077078fc rdf:first Nc1c2753f7531496baf4d803c88ab1824
    75 rdf:rest N85e9962ebffc45ae897d7c21cca4c866
    76 Nb244362b41d543338028f2df331ff0e3 rdf:first sg:person.013465130107.96
    77 rdf:rest rdf:nil
    78 Nc1496c81ce3443f180cdaceb1d943311 schema:location Berlin, Heidelberg
    79 schema:name Springer Berlin Heidelberg
    80 rdf:type schema:Organisation
    81 Nc1c2753f7531496baf4d803c88ab1824 schema:familyName Kikuchi
    82 schema:givenName Hiroaki
    83 rdf:type schema:Person
    84 Nc4af1c50fdff4d20821c7828f2418183 schema:familyName Miyaji
    85 schema:givenName Atsuko
    86 rdf:type schema:Person
    87 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    88 schema:name Information and Computing Sciences
    89 rdf:type schema:DefinedTerm
    90 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    91 schema:name Computer Software
    92 rdf:type schema:DefinedTerm
    93 sg:person.013243217423.37 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    94 schema:familyName Anckaert
    95 schema:givenName Bertrand
    96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37
    97 rdf:type schema:Person
    98 sg:person.013465130107.96 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    99 schema:familyName De Bosschere
    100 schema:givenName Koen
    101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96
    102 rdf:type schema:Person
    103 sg:person.014063763433.38 schema:affiliation https://www.grid.ac/institutes/grid.419815.0
    104 schema:familyName Venkatesan
    105 schema:givenName Ramarathnam
    106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014063763433.38
    107 rdf:type schema:Person
    108 sg:person.014636160423.87 schema:affiliation https://www.grid.ac/institutes/grid.419815.0
    109 schema:familyName Jakubowski
    110 schema:givenName Mariusz
    111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014636160423.87
    112 rdf:type schema:Person
    113 sg:pub.10.1007/3-540-36415-3_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039509516
    114 https://doi.org/10.1007/3-540-36415-3_26
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/3-540-44647-8_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039594573
    117 https://doi.org/10.1007/3-540-44647-8_1
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/3-540-47870-1_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047590996
    120 https://doi.org/10.1007/3-540-47870-1_10
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/3-540-47870-1_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038284211
    123 https://doi.org/10.1007/3-540-47870-1_9
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/978-3-540-30144-8_36 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029290335
    126 https://doi.org/10.1007/978-3-540-30144-8_36
    127 rdf:type schema:CreativeWork
    128 https://doi.org/10.1016/0167-4048(93)90054-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027872363
    129 rdf:type schema:CreativeWork
    130 https://doi.org/10.1109/csac.2005.53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093201082
    131 rdf:type schema:CreativeWork
    132 https://doi.org/10.1109/hotos.1997.595185 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095758678
    133 rdf:type schema:CreativeWork
    134 https://doi.org/10.1109/sp.2005.2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095083868
    135 rdf:type schema:CreativeWork
    136 https://doi.org/10.1145/1030083.1030124 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023536170
    137 rdf:type schema:CreativeWork
    138 https://doi.org/10.1145/1053283.1053286 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005591589
    139 rdf:type schema:CreativeWork
    140 https://doi.org/10.1145/1086642.1086645 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029418974
    141 rdf:type schema:CreativeWork
    142 https://doi.org/10.1145/1134760.1220164 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053327430
    143 rdf:type schema:CreativeWork
    144 https://doi.org/10.1145/1179509.1179521 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050843053
    145 rdf:type schema:CreativeWork
    146 https://doi.org/10.1145/268946.268962 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022024311
    147 rdf:type schema:CreativeWork
    148 https://doi.org/10.1145/312203.312214 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015202247
    149 rdf:type schema:CreativeWork
    150 https://doi.org/10.1145/390016.808467 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063170611
    151 rdf:type schema:CreativeWork
    152 https://doi.org/10.1145/93542.93550 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023218421
    153 rdf:type schema:CreativeWork
    154 https://doi.org/10.1145/977091.977139 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018540397
    155 rdf:type schema:CreativeWork
    156 https://www.grid.ac/institutes/grid.419815.0 schema:alternateName Microsoft (United States)
    157 schema:name Microsoft Research, Cryptography and Anti-Piracy Group, One Microsoft Way, Redmond, WA 98052, USA
    158 rdf:type schema:Organization
    159 https://www.grid.ac/institutes/grid.5342.0 schema:alternateName Ghent University
    160 schema:name Ghent University, Electronics and Information Systems Department, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium
    161 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...