{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T01:11:50Z","timestamp":1726103510016},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811596087"},{"type":"electronic","value":"9789811596094"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9609-4_8","type":"book-chapter","created":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T16:03:18Z","timestamp":1604246598000},"page":"99-111","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reduction of Data Leakage Using Software Streaming"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2782-271X","authenticated-orcid":false,"given":"Sung-Kyung","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7368-551X","authenticated-orcid":false,"given":"Eun-Tae","family":"Jang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3096-0785","authenticated-orcid":false,"given":"Seung-Ho","family":"Lim","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3377-223X","authenticated-orcid":false,"given":"Ki-Woong","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"8_CR1","unstructured":"Iraq-RQ-170 Homepage. \nhttps:\/\/www.wired.com\/2011\/12\/iran-drone-hack-gps\/\n\n. Accessed 22 Jan 2020"},{"key":"8_CR2","unstructured":"Iran-RQ-170 Homepage. \nhttps:\/\/www.csmonitor.com\/World\/Middle-East\/2011\/1215\/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer\n\n. Accessed 22 Jan 2020"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Banescu, S., Collberg, C., Ganesh, V., Newsham, Z., Pretschner, A.: Code obfuscation against symbolic execution attacks. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 189\u2013200 (2016)","DOI":"10.1145\/2991079.2991114"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-642-24861-0_12","volume-title":"Information Security","author":"H Fang","year":"2011","unstructured":"Fang, H., Wu, Y., Wang, S., Huang, Y.: Multi-stage binary code obfuscation using improved virtual machine. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 168\u2013181. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-24861-0_12"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Xue, C., et al.: Exploiting code diversity to enhance code virtualization protection. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), pp. 620\u2013627. IEEE (2018)","DOI":"10.1109\/PADSW.2018.8644535"},{"key":"8_CR6","unstructured":"VMProtect Homepage. \nhttps:\/\/vmpsoft.com\/\n\n. Accessed 22 Jan 2020"},{"key":"8_CR7","unstructured":"Themida Homepage. \nhttps:\/\/www.oreans.com\/themida.php\n\n. Accessed 22 Jan 2020"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Kim, M.-J., et al.: Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering. In: 2010 13th IEEE International Symposium on Object\/Component\/Service-Oriented Real-Time Distributed Computing, pp. 80\u201386. IEEE (2010)","DOI":"10.1109\/ISORC.2010.23"},{"issue":"12","key":"8_CR9","doi-asserted-by":"publisher","first-page":"2331","DOI":"10.1002\/spe.2622","volume":"48","author":"JH Suk","year":"2018","unstructured":"Suk, J.H., Lee, J.Y., Jin, H., Kim, I.S., Lee, D.H.: UnThemida: commercial obfuscation technique analysis with a fully obfuscated program. Softw. Pract. Exp. 48(12), 2331\u20132349 (2018)","journal-title":"Softw. Pract. Exp."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Yadegari, B., Johannesmeyer, B., Whitely, B., Debray, S.: A generic approach to automatic deobfuscation of executable code. In: 2015 IEEE Symposium on Security and Privacy, pp. 674\u2013691. IEEE (2015)","DOI":"10.1109\/SP.2015.47"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Hasan, S., Awais, M., Shah, M.A.: Full disk encryption: a comparison on data management attributes. In: Proceedings of the 2nd International Conference on Information System and Data Mining, pp. 39\u201343 (2018)","DOI":"10.1145\/3206098.3206118"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/0-306-48709-8_32","volume-title":"Embedded Software for SoC","author":"P Kuacharoen","year":"2003","unstructured":"Kuacharoen, P., Mooney, V.J., Madisetti, V.K.: Software streaming via block streaming. In: Jerraya, A.A., Yoo, S., Verkest, D., Wehn, N. (eds.) Embedded Software for SoC, pp. 435\u2013448. Springer, Boston (2003). \nhttps:\/\/doi.org\/10.1007\/0-306-48709-8_32"},{"key":"8_CR13","unstructured":"Kuacharoen, P., Mooney III, V.J., Madisetti, V.K.: Efficient execution of large applications on portable and wireless clients. In: Proceedings of the Mobility Conference & Exhibition (2004)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Choi, J., Kim, J., Jang, B.: A software wireless streaming architecture supporting telematics device. In: 2007 Digest of Technical Papers International Conference on Consumer Electronics, pp. 1\u20132. IEEE (2007)","DOI":"10.1109\/ICCE.2007.341321"},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1147\/rd.111.0025","volume":"11","author":"RM Tomasulo","year":"1967","unstructured":"Tomasulo, R.M.: An efficient algorithm for exploiting multiple arithmetic units. IBM J. Res. Develop. 11(1), 25\u201333 (1967)","journal-title":"IBM J. Res. Develop."},{"key":"8_CR16","unstructured":"Shield, D.J., Davis, D.L.: Method and apparatus for fast self-destruction of a CMOS integrated circuit. U.S. Patent 5,736,777, issued 7 April 1998"},{"key":"8_CR17","unstructured":"Mishra, P.K., Goyal, D.: Directed fragmentation for unmanned airborne vehicles. U.S. Patent 9,828,097, issued 28 November 2017"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Banerjee, N., Xie, Y., Rahman, M.M., Kim, H., Mastrangelo, C.H.: From chips to dust: the MEMS shatter secure chip. In: 2014 IEEE 27th International Conference on Micro Electro Mechanical Systems (MEMS), pp. 1123\u20131126. IEEE (2014)","DOI":"10.1109\/MEMSYS.2014.6765843"},{"key":"8_CR19","unstructured":"Gu, X., Lou, W., Song, R., Zhao, Y., Zhang, L.: Simulation research on a novel micro-fluidic self-destruct device for microchips. In: 2010 IEEE 5th International Conference on Nano\/Micro Engineered and Molecular Systems, pp. 375\u2013378. IEEE (2010)"},{"key":"8_CR20","first-page":"1","volume":"2019","author":"S Kim","year":"2019","unstructured":"Kim, S., Youn, T.-Y., Choi, D., Park, K.-W.: UAV-undertaker: securely verifiable remote erasure scheme with a countdown-concept for UAV via randomized data synchronization. Wirel. Commun. Mob. Comput. 2019, 1\u201311 (2019)","journal-title":"Wirel. Commun. Mob. Comput."}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9609-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T16:04:38Z","timestamp":1604246678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9609-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811596087","9789811596094"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9609-4_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}