Run-Time Randomization to Mitigate Tampering View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2007

AUTHORS

Bertrand Anckaert , Mariusz Jakubowski , Ramarathnam Venkatesan , Koen De Bosschere

ABSTRACT

The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical copies. The ideas presented in this paper are a compromise between distributing identical copies and unique executions by diversifying at run time, based upon additional chaff input and variable program state. This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers, or a subset of the input space. More... »

PAGES

153-168

References to SciGraph publications

  • 2002. Dynamic Self-Checking Techniques for Improved Tamper Resistance in SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT
  • 2002. Protecting Software Code by Guards in SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT
  • 2002-12-18. Oblivious Hashing: A Stealthy Software Integrity Verification Primitive in INFORMATION HIDING
  • 2004. The Obfuscation Executive in INFORMATION SECURITY
  • 2001. On the (Im)possibility of Obfuscating Programs in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • Book

    TITLE

    Advances in Information and Computer Security

    ISBN

    978-3-540-75650-7
    978-3-540-75651-4

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11

    DOI

    http://dx.doi.org/10.1007/978-3-540-75651-4_11

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1049257952


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Ghent University, Electronics and Information Systems Department, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Anckaert", 
            "givenName": "Bertrand", 
            "id": "sg:person.013243217423.37", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Microsoft (United States)", 
              "id": "https://www.grid.ac/institutes/grid.419815.0", 
              "name": [
                "Microsoft Research, Cryptography and Anti-Piracy Group, One Microsoft Way, Redmond, WA 98052, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Jakubowski", 
            "givenName": "Mariusz", 
            "id": "sg:person.014636160423.87", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014636160423.87"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Microsoft (United States)", 
              "id": "https://www.grid.ac/institutes/grid.419815.0", 
              "name": [
                "Microsoft Research, Cryptography and Anti-Piracy Group, One Microsoft Way, Redmond, WA 98052, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Venkatesan", 
            "givenName": "Ramarathnam", 
            "id": "sg:person.014063763433.38", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014063763433.38"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Ghent University, Electronics and Information Systems Department, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Bosschere", 
            "givenName": "Koen", 
            "id": "sg:person.013465130107.96", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1053283.1053286", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005591589"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/312203.312214", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015202247"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/977091.977139", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018540397"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/268946.268962", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022024311"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/93542.93550", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023218421"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1030083.1030124", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023536170"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/0167-4048(93)90054-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027872363"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/0167-4048(93)90054-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027872363"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30144-8_36", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029290335", 
              "https://doi.org/10.1007/978-3-540-30144-8_36"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30144-8_36", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029290335", 
              "https://doi.org/10.1007/978-3-540-30144-8_36"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1086642.1086645", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029418974"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-47870-1_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038284211", 
              "https://doi.org/10.1007/3-540-47870-1_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36415-3_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039509516", 
              "https://doi.org/10.1007/3-540-36415-3_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36415-3_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039509516", 
              "https://doi.org/10.1007/3-540-36415-3_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039594573", 
              "https://doi.org/10.1007/3-540-44647-8_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-47870-1_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047590996", 
              "https://doi.org/10.1007/3-540-47870-1_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1179509.1179521", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050843053"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1134760.1220164", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053327430"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/390016.808467", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063170611"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csac.2005.53", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093201082"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sp.2005.2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095083868"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/hotos.1997.595185", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095758678"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2007", 
        "datePublishedReg": "2007-01-01", 
        "description": "The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical copies. The ideas presented in this paper are a compromise between distributing identical copies and unique executions by diversifying at run time, based upon additional chaff input and variable program state. This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers, or a subset of the input space.", 
        "editor": [
          {
            "familyName": "Miyaji", 
            "givenName": "Atsuko", 
            "type": "Person"
          }, 
          {
            "familyName": "Kikuchi", 
            "givenName": "Hiroaki", 
            "type": "Person"
          }, 
          {
            "familyName": "Rannenberg", 
            "givenName": "Kai", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-540-75651-4_11", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-540-75650-7", 
            "978-3-540-75651-4"
          ], 
          "name": "Advances in Information and Computer Security", 
          "type": "Book"
        }, 
        "name": "Run-Time Randomization to Mitigate Tampering", 
        "pagination": "153-168", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-540-75651-4_11"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "eaa7da4b935b821f1d9b64c8b1af2d1d33c950ca95f4724ca873a9eb47c842f5"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1049257952"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-540-75651-4_11", 
          "https://app.dimensions.ai/details/publication/pub.1049257952"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T05:31", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000346_0000000346/records_99809_00000003.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-540-75651-4_11"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'


     

    This table displays all metadata directly associated to this object as RDF triples.

    161 TRIPLES      23 PREDICATES      46 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-540-75651-4_11 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author Nf45387a39a1541f0b471325b22d21bf6
    4 schema:citation sg:pub.10.1007/3-540-36415-3_26
    5 sg:pub.10.1007/3-540-44647-8_1
    6 sg:pub.10.1007/3-540-47870-1_10
    7 sg:pub.10.1007/3-540-47870-1_9
    8 sg:pub.10.1007/978-3-540-30144-8_36
    9 https://doi.org/10.1016/0167-4048(93)90054-9
    10 https://doi.org/10.1109/csac.2005.53
    11 https://doi.org/10.1109/hotos.1997.595185
    12 https://doi.org/10.1109/sp.2005.2
    13 https://doi.org/10.1145/1030083.1030124
    14 https://doi.org/10.1145/1053283.1053286
    15 https://doi.org/10.1145/1086642.1086645
    16 https://doi.org/10.1145/1134760.1220164
    17 https://doi.org/10.1145/1179509.1179521
    18 https://doi.org/10.1145/268946.268962
    19 https://doi.org/10.1145/312203.312214
    20 https://doi.org/10.1145/390016.808467
    21 https://doi.org/10.1145/93542.93550
    22 https://doi.org/10.1145/977091.977139
    23 schema:datePublished 2007
    24 schema:datePublishedReg 2007-01-01
    25 schema:description The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical copies. The ideas presented in this paper are a compromise between distributing identical copies and unique executions by diversifying at run time, based upon additional chaff input and variable program state. This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers, or a subset of the input space.
    26 schema:editor N307751f5d6764287aa9f05049b7b1f78
    27 schema:genre chapter
    28 schema:inLanguage en
    29 schema:isAccessibleForFree false
    30 schema:isPartOf N2d66fe6ed70341d2849423ea55af6242
    31 schema:name Run-Time Randomization to Mitigate Tampering
    32 schema:pagination 153-168
    33 schema:productId N454dd9a6a9534574b9b998145f73c340
    34 N6c0e60f209d44a449d050938453f0c96
    35 N77fec95c78204c2cb55248a06a8f0d55
    36 schema:publisher N1259c982fff548839568aff25c384d68
    37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049257952
    38 https://doi.org/10.1007/978-3-540-75651-4_11
    39 schema:sdDatePublished 2019-04-16T05:31
    40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    41 schema:sdPublisher Ne68ea5eac6e7494ba4968a40a7a9b580
    42 schema:url https://link.springer.com/10.1007%2F978-3-540-75651-4_11
    43 sgo:license sg:explorer/license/
    44 sgo:sdDataset chapters
    45 rdf:type schema:Chapter
    46 N1259c982fff548839568aff25c384d68 schema:location Berlin, Heidelberg
    47 schema:name Springer Berlin Heidelberg
    48 rdf:type schema:Organisation
    49 N2d66fe6ed70341d2849423ea55af6242 schema:isbn 978-3-540-75650-7
    50 978-3-540-75651-4
    51 schema:name Advances in Information and Computer Security
    52 rdf:type schema:Book
    53 N307751f5d6764287aa9f05049b7b1f78 rdf:first N31b3c837f71e4cd0b3b8a6148372630a
    54 rdf:rest Na9f594514f104daa9b638a2408ea2315
    55 N31b3c837f71e4cd0b3b8a6148372630a schema:familyName Miyaji
    56 schema:givenName Atsuko
    57 rdf:type schema:Person
    58 N3f4b454cc0c64c12a9e54b6434f8cd4e schema:familyName Kikuchi
    59 schema:givenName Hiroaki
    60 rdf:type schema:Person
    61 N454dd9a6a9534574b9b998145f73c340 schema:name readcube_id
    62 schema:value eaa7da4b935b821f1d9b64c8b1af2d1d33c950ca95f4724ca873a9eb47c842f5
    63 rdf:type schema:PropertyValue
    64 N6714e419e1f644a78328c72eb3445bd8 schema:familyName Rannenberg
    65 schema:givenName Kai
    66 rdf:type schema:Person
    67 N6c0e60f209d44a449d050938453f0c96 schema:name doi
    68 schema:value 10.1007/978-3-540-75651-4_11
    69 rdf:type schema:PropertyValue
    70 N77fec95c78204c2cb55248a06a8f0d55 schema:name dimensions_id
    71 schema:value pub.1049257952
    72 rdf:type schema:PropertyValue
    73 Na9f594514f104daa9b638a2408ea2315 rdf:first N3f4b454cc0c64c12a9e54b6434f8cd4e
    74 rdf:rest Ncc3fce0c355a44cd9755bb6f4c856d7a
    75 Naaef990358294e569b164e46bbe33670 rdf:first sg:person.014063763433.38
    76 rdf:rest Nced8341d06f545d3b137a3ca25ae8b51
    77 Ncc3fce0c355a44cd9755bb6f4c856d7a rdf:first N6714e419e1f644a78328c72eb3445bd8
    78 rdf:rest rdf:nil
    79 Nced8341d06f545d3b137a3ca25ae8b51 rdf:first sg:person.013465130107.96
    80 rdf:rest rdf:nil
    81 Ne68ea5eac6e7494ba4968a40a7a9b580 schema:name Springer Nature - SN SciGraph project
    82 rdf:type schema:Organization
    83 Nf45387a39a1541f0b471325b22d21bf6 rdf:first sg:person.013243217423.37
    84 rdf:rest Nfcbac8d11e8c48d8b3ef4bcb6889f4d9
    85 Nfcbac8d11e8c48d8b3ef4bcb6889f4d9 rdf:first sg:person.014636160423.87
    86 rdf:rest Naaef990358294e569b164e46bbe33670
    87 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    88 schema:name Information and Computing Sciences
    89 rdf:type schema:DefinedTerm
    90 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    91 schema:name Computer Software
    92 rdf:type schema:DefinedTerm
    93 sg:person.013243217423.37 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    94 schema:familyName Anckaert
    95 schema:givenName Bertrand
    96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37
    97 rdf:type schema:Person
    98 sg:person.013465130107.96 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    99 schema:familyName De Bosschere
    100 schema:givenName Koen
    101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96
    102 rdf:type schema:Person
    103 sg:person.014063763433.38 schema:affiliation https://www.grid.ac/institutes/grid.419815.0
    104 schema:familyName Venkatesan
    105 schema:givenName Ramarathnam
    106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014063763433.38
    107 rdf:type schema:Person
    108 sg:person.014636160423.87 schema:affiliation https://www.grid.ac/institutes/grid.419815.0
    109 schema:familyName Jakubowski
    110 schema:givenName Mariusz
    111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014636160423.87
    112 rdf:type schema:Person
    113 sg:pub.10.1007/3-540-36415-3_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039509516
    114 https://doi.org/10.1007/3-540-36415-3_26
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/3-540-44647-8_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039594573
    117 https://doi.org/10.1007/3-540-44647-8_1
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/3-540-47870-1_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047590996
    120 https://doi.org/10.1007/3-540-47870-1_10
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/3-540-47870-1_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038284211
    123 https://doi.org/10.1007/3-540-47870-1_9
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/978-3-540-30144-8_36 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029290335
    126 https://doi.org/10.1007/978-3-540-30144-8_36
    127 rdf:type schema:CreativeWork
    128 https://doi.org/10.1016/0167-4048(93)90054-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027872363
    129 rdf:type schema:CreativeWork
    130 https://doi.org/10.1109/csac.2005.53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093201082
    131 rdf:type schema:CreativeWork
    132 https://doi.org/10.1109/hotos.1997.595185 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095758678
    133 rdf:type schema:CreativeWork
    134 https://doi.org/10.1109/sp.2005.2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095083868
    135 rdf:type schema:CreativeWork
    136 https://doi.org/10.1145/1030083.1030124 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023536170
    137 rdf:type schema:CreativeWork
    138 https://doi.org/10.1145/1053283.1053286 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005591589
    139 rdf:type schema:CreativeWork
    140 https://doi.org/10.1145/1086642.1086645 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029418974
    141 rdf:type schema:CreativeWork
    142 https://doi.org/10.1145/1134760.1220164 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053327430
    143 rdf:type schema:CreativeWork
    144 https://doi.org/10.1145/1179509.1179521 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050843053
    145 rdf:type schema:CreativeWork
    146 https://doi.org/10.1145/268946.268962 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022024311
    147 rdf:type schema:CreativeWork
    148 https://doi.org/10.1145/312203.312214 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015202247
    149 rdf:type schema:CreativeWork
    150 https://doi.org/10.1145/390016.808467 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063170611
    151 rdf:type schema:CreativeWork
    152 https://doi.org/10.1145/93542.93550 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023218421
    153 rdf:type schema:CreativeWork
    154 https://doi.org/10.1145/977091.977139 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018540397
    155 rdf:type schema:CreativeWork
    156 https://www.grid.ac/institutes/grid.419815.0 schema:alternateName Microsoft (United States)
    157 schema:name Microsoft Research, Cryptography and Anti-Piracy Group, One Microsoft Way, Redmond, WA 98052, USA
    158 rdf:type schema:Organization
    159 https://www.grid.ac/institutes/grid.5342.0 schema:alternateName Ghent University
    160 schema:name Ghent University, Electronics and Information Systems Department, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium
    161 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...