Run-Time Randomization to Mitigate Tampering View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2007

AUTHORS

Bertrand Anckaert , Mariusz Jakubowski , Ramarathnam Venkatesan , Koen De Bosschere

ABSTRACT

The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical copies. The ideas presented in this paper are a compromise between distributing identical copies and unique executions by diversifying at run time, based upon additional chaff input and variable program state. This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers, or a subset of the input space. More... »

PAGES

153-168

References to SciGraph publications

  • 2002. Dynamic Self-Checking Techniques for Improved Tamper Resistance in SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT
  • 2002. Protecting Software Code by Guards in SECURITY AND PRIVACY IN DIGITAL RIGHTS MANAGEMENT
  • 2002-12-18. Oblivious Hashing: A Stealthy Software Integrity Verification Primitive in INFORMATION HIDING
  • 2004. The Obfuscation Executive in INFORMATION SECURITY
  • 2001. On the (Im)possibility of Obfuscating Programs in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • Book

    TITLE

    Advances in Information and Computer Security

    ISBN

    978-3-540-75650-7
    978-3-540-75651-4

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11

    DOI

    http://dx.doi.org/10.1007/978-3-540-75651-4_11

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1049257952


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Ghent University, Electronics and Information Systems Department, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Anckaert", 
            "givenName": "Bertrand", 
            "id": "sg:person.013243217423.37", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Microsoft (United States)", 
              "id": "https://www.grid.ac/institutes/grid.419815.0", 
              "name": [
                "Microsoft Research, Cryptography and Anti-Piracy Group, One Microsoft Way, Redmond, WA 98052, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Jakubowski", 
            "givenName": "Mariusz", 
            "id": "sg:person.014636160423.87", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014636160423.87"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Microsoft (United States)", 
              "id": "https://www.grid.ac/institutes/grid.419815.0", 
              "name": [
                "Microsoft Research, Cryptography and Anti-Piracy Group, One Microsoft Way, Redmond, WA 98052, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Venkatesan", 
            "givenName": "Ramarathnam", 
            "id": "sg:person.014063763433.38", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014063763433.38"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Ghent University, Electronics and Information Systems Department, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Bosschere", 
            "givenName": "Koen", 
            "id": "sg:person.013465130107.96", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1053283.1053286", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005591589"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/312203.312214", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015202247"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/977091.977139", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018540397"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/268946.268962", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022024311"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/93542.93550", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023218421"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1030083.1030124", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023536170"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/0167-4048(93)90054-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027872363"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/0167-4048(93)90054-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027872363"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30144-8_36", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029290335", 
              "https://doi.org/10.1007/978-3-540-30144-8_36"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30144-8_36", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029290335", 
              "https://doi.org/10.1007/978-3-540-30144-8_36"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1086642.1086645", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029418974"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-47870-1_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038284211", 
              "https://doi.org/10.1007/3-540-47870-1_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36415-3_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039509516", 
              "https://doi.org/10.1007/3-540-36415-3_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36415-3_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039509516", 
              "https://doi.org/10.1007/3-540-36415-3_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039594573", 
              "https://doi.org/10.1007/3-540-44647-8_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-47870-1_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047590996", 
              "https://doi.org/10.1007/3-540-47870-1_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1179509.1179521", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050843053"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1134760.1220164", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053327430"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/390016.808467", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063170611"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/csac.2005.53", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093201082"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sp.2005.2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095083868"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/hotos.1997.595185", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095758678"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2007", 
        "datePublishedReg": "2007-01-01", 
        "description": "The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical copies. The ideas presented in this paper are a compromise between distributing identical copies and unique executions by diversifying at run time, based upon additional chaff input and variable program state. This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers, or a subset of the input space.", 
        "editor": [
          {
            "familyName": "Miyaji", 
            "givenName": "Atsuko", 
            "type": "Person"
          }, 
          {
            "familyName": "Kikuchi", 
            "givenName": "Hiroaki", 
            "type": "Person"
          }, 
          {
            "familyName": "Rannenberg", 
            "givenName": "Kai", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-540-75651-4_11", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-540-75650-7", 
            "978-3-540-75651-4"
          ], 
          "name": "Advances in Information and Computer Security", 
          "type": "Book"
        }, 
        "name": "Run-Time Randomization to Mitigate Tampering", 
        "pagination": "153-168", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-540-75651-4_11"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "eaa7da4b935b821f1d9b64c8b1af2d1d33c950ca95f4724ca873a9eb47c842f5"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1049257952"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-540-75651-4_11", 
          "https://app.dimensions.ai/details/publication/pub.1049257952"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T05:31", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000346_0000000346/records_99809_00000003.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-540-75651-4_11"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-75651-4_11'


     

    This table displays all metadata directly associated to this object as RDF triples.

    161 TRIPLES      23 PREDICATES      46 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-540-75651-4_11 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author Nac51d4e05ffb44d2903aa534204dfc25
    4 schema:citation sg:pub.10.1007/3-540-36415-3_26
    5 sg:pub.10.1007/3-540-44647-8_1
    6 sg:pub.10.1007/3-540-47870-1_10
    7 sg:pub.10.1007/3-540-47870-1_9
    8 sg:pub.10.1007/978-3-540-30144-8_36
    9 https://doi.org/10.1016/0167-4048(93)90054-9
    10 https://doi.org/10.1109/csac.2005.53
    11 https://doi.org/10.1109/hotos.1997.595185
    12 https://doi.org/10.1109/sp.2005.2
    13 https://doi.org/10.1145/1030083.1030124
    14 https://doi.org/10.1145/1053283.1053286
    15 https://doi.org/10.1145/1086642.1086645
    16 https://doi.org/10.1145/1134760.1220164
    17 https://doi.org/10.1145/1179509.1179521
    18 https://doi.org/10.1145/268946.268962
    19 https://doi.org/10.1145/312203.312214
    20 https://doi.org/10.1145/390016.808467
    21 https://doi.org/10.1145/93542.93550
    22 https://doi.org/10.1145/977091.977139
    23 schema:datePublished 2007
    24 schema:datePublishedReg 2007-01-01
    25 schema:description The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical copies. The ideas presented in this paper are a compromise between distributing identical copies and unique executions by diversifying at run time, based upon additional chaff input and variable program state. This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers, or a subset of the input space.
    26 schema:editor N4481107f75aa4506b30403252c33fb59
    27 schema:genre chapter
    28 schema:inLanguage en
    29 schema:isAccessibleForFree false
    30 schema:isPartOf N4fe245425cfd4907a89a5f69c7f6bb30
    31 schema:name Run-Time Randomization to Mitigate Tampering
    32 schema:pagination 153-168
    33 schema:productId N118b70da00a34544a56fbb11da8e2c59
    34 N3bcde46330bd4c64a490b52f7b013cf9
    35 N50c99cd49ed149e4a846f6c3310172b3
    36 schema:publisher Nbe2a88d1efdd4ae79b7feea6a9fff48b
    37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049257952
    38 https://doi.org/10.1007/978-3-540-75651-4_11
    39 schema:sdDatePublished 2019-04-16T05:31
    40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    41 schema:sdPublisher N63ade2d954b94e15a2a8b4df5ee7e2f5
    42 schema:url https://link.springer.com/10.1007%2F978-3-540-75651-4_11
    43 sgo:license sg:explorer/license/
    44 sgo:sdDataset chapters
    45 rdf:type schema:Chapter
    46 N002d5d4af36d47beb782558d21bef82f rdf:first N98c3bc77137f4553a3736ed401ac3c41
    47 rdf:rest rdf:nil
    48 N118b70da00a34544a56fbb11da8e2c59 schema:name doi
    49 schema:value 10.1007/978-3-540-75651-4_11
    50 rdf:type schema:PropertyValue
    51 N26b1a597930e45d88633b8aa78cdb0bb schema:familyName Kikuchi
    52 schema:givenName Hiroaki
    53 rdf:type schema:Person
    54 N35b70db9b475443f97cb2fe4c6b27840 rdf:first N26b1a597930e45d88633b8aa78cdb0bb
    55 rdf:rest N002d5d4af36d47beb782558d21bef82f
    56 N3bcde46330bd4c64a490b52f7b013cf9 schema:name dimensions_id
    57 schema:value pub.1049257952
    58 rdf:type schema:PropertyValue
    59 N4481107f75aa4506b30403252c33fb59 rdf:first N58fc0dff3f2c4437a7d5fa8e87683152
    60 rdf:rest N35b70db9b475443f97cb2fe4c6b27840
    61 N4fe245425cfd4907a89a5f69c7f6bb30 schema:isbn 978-3-540-75650-7
    62 978-3-540-75651-4
    63 schema:name Advances in Information and Computer Security
    64 rdf:type schema:Book
    65 N50c99cd49ed149e4a846f6c3310172b3 schema:name readcube_id
    66 schema:value eaa7da4b935b821f1d9b64c8b1af2d1d33c950ca95f4724ca873a9eb47c842f5
    67 rdf:type schema:PropertyValue
    68 N58fc0dff3f2c4437a7d5fa8e87683152 schema:familyName Miyaji
    69 schema:givenName Atsuko
    70 rdf:type schema:Person
    71 N63ade2d954b94e15a2a8b4df5ee7e2f5 schema:name Springer Nature - SN SciGraph project
    72 rdf:type schema:Organization
    73 N98c3bc77137f4553a3736ed401ac3c41 schema:familyName Rannenberg
    74 schema:givenName Kai
    75 rdf:type schema:Person
    76 Nac51d4e05ffb44d2903aa534204dfc25 rdf:first sg:person.013243217423.37
    77 rdf:rest Nbba3df14c7bf405b86bbc89bcd0047e3
    78 Nbba3df14c7bf405b86bbc89bcd0047e3 rdf:first sg:person.014636160423.87
    79 rdf:rest Nde317a665ffa40a98ef66b45c831678b
    80 Nbe2a88d1efdd4ae79b7feea6a9fff48b schema:location Berlin, Heidelberg
    81 schema:name Springer Berlin Heidelberg
    82 rdf:type schema:Organisation
    83 Nca44eb4250c34a7cacbb70267f5ce3ed rdf:first sg:person.013465130107.96
    84 rdf:rest rdf:nil
    85 Nde317a665ffa40a98ef66b45c831678b rdf:first sg:person.014063763433.38
    86 rdf:rest Nca44eb4250c34a7cacbb70267f5ce3ed
    87 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    88 schema:name Information and Computing Sciences
    89 rdf:type schema:DefinedTerm
    90 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    91 schema:name Computer Software
    92 rdf:type schema:DefinedTerm
    93 sg:person.013243217423.37 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    94 schema:familyName Anckaert
    95 schema:givenName Bertrand
    96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37
    97 rdf:type schema:Person
    98 sg:person.013465130107.96 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    99 schema:familyName De Bosschere
    100 schema:givenName Koen
    101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96
    102 rdf:type schema:Person
    103 sg:person.014063763433.38 schema:affiliation https://www.grid.ac/institutes/grid.419815.0
    104 schema:familyName Venkatesan
    105 schema:givenName Ramarathnam
    106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014063763433.38
    107 rdf:type schema:Person
    108 sg:person.014636160423.87 schema:affiliation https://www.grid.ac/institutes/grid.419815.0
    109 schema:familyName Jakubowski
    110 schema:givenName Mariusz
    111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014636160423.87
    112 rdf:type schema:Person
    113 sg:pub.10.1007/3-540-36415-3_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039509516
    114 https://doi.org/10.1007/3-540-36415-3_26
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/3-540-44647-8_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039594573
    117 https://doi.org/10.1007/3-540-44647-8_1
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/3-540-47870-1_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047590996
    120 https://doi.org/10.1007/3-540-47870-1_10
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/3-540-47870-1_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038284211
    123 https://doi.org/10.1007/3-540-47870-1_9
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/978-3-540-30144-8_36 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029290335
    126 https://doi.org/10.1007/978-3-540-30144-8_36
    127 rdf:type schema:CreativeWork
    128 https://doi.org/10.1016/0167-4048(93)90054-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027872363
    129 rdf:type schema:CreativeWork
    130 https://doi.org/10.1109/csac.2005.53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093201082
    131 rdf:type schema:CreativeWork
    132 https://doi.org/10.1109/hotos.1997.595185 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095758678
    133 rdf:type schema:CreativeWork
    134 https://doi.org/10.1109/sp.2005.2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095083868
    135 rdf:type schema:CreativeWork
    136 https://doi.org/10.1145/1030083.1030124 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023536170
    137 rdf:type schema:CreativeWork
    138 https://doi.org/10.1145/1053283.1053286 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005591589
    139 rdf:type schema:CreativeWork
    140 https://doi.org/10.1145/1086642.1086645 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029418974
    141 rdf:type schema:CreativeWork
    142 https://doi.org/10.1145/1134760.1220164 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053327430
    143 rdf:type schema:CreativeWork
    144 https://doi.org/10.1145/1179509.1179521 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050843053
    145 rdf:type schema:CreativeWork
    146 https://doi.org/10.1145/268946.268962 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022024311
    147 rdf:type schema:CreativeWork
    148 https://doi.org/10.1145/312203.312214 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015202247
    149 rdf:type schema:CreativeWork
    150 https://doi.org/10.1145/390016.808467 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063170611
    151 rdf:type schema:CreativeWork
    152 https://doi.org/10.1145/93542.93550 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023218421
    153 rdf:type schema:CreativeWork
    154 https://doi.org/10.1145/977091.977139 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018540397
    155 rdf:type schema:CreativeWork
    156 https://www.grid.ac/institutes/grid.419815.0 schema:alternateName Microsoft (United States)
    157 schema:name Microsoft Research, Cryptography and Anti-Piracy Group, One Microsoft Way, Redmond, WA 98052, USA
    158 rdf:type schema:Organization
    159 https://www.grid.ac/institutes/grid.5342.0 schema:alternateName Ghent University
    160 schema:name Ghent University, Electronics and Information Systems Department, Sint-Pietersnieuwstraat 41, 9000 Ghent, Belgium
    161 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...