{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:51:38Z","timestamp":1725749498707},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/scam.2007.27","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T16:50:08Z","timestamp":1209401408000},"page":"27-36","source":"Crossref","is-referenced-by-count":18,"title":["Barrier Slicing for Remote Software Trusting"],"prefix":"10.1109","author":[{"given":"Mariano","family":"Ceccato","sequence":"first","affiliation":[]},{"given":"Mila Dalla","family":"Preda","sequence":"additional","affiliation":[]},{"given":"Jasvir","family":"Nagra","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Collberg","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Tonella","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Side effects are not sufficient to authenticate software","author":"umesh shankar","year":"2004","journal-title":"Technical Report UCB\/CSD-04-1363 EECS Department"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.24"},{"journal-title":"Program Slices Formal Psychological and Practical Investigations ofan Automatic Program Abstraction Method","year":"1979","author":"weiser","key":"ref12"},{"key":"ref13","first-page":"325","article-title":"Hiding program slices for software security","author":"zhang","year":"2003","journal-title":"CGO '03 Proceedings of the international symposium on Code generation and optimization"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/B:SQJO.0000039792.93414.a5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2003.1238034"},{"article-title":"Trusted computer security evaluation criteria","year":"1985","author":"of defense","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138874"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"ref7","first-page":"223","article-title":"Design and Implementation of a TCG-Based Integrity Measurement Architecture","author":"sailer","year":"2004"},{"key":"ref2","article-title":"Establishing the genuinity of remote computer systems","author":"kennell","year":"2003","journal-title":"Proceedings of 12th USENIX Security Symposium"},{"key":"ref1","article-title":"Microsoft “Palladium”: A Business Overview","author":"carroll","year":"2002","journal-title":"Microsoft Content Security Business Unit August"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"}],"event":{"name":"Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)","start":{"date-parts":[[2007,9,30]]},"location":"Paris, France","end":{"date-parts":[[2007,10,1]]}},"container-title":["Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362882\/4362883\/04362895.pdf?arnumber=4362895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T21:20:54Z","timestamp":1489612854000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362895\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/scam.2007.27","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}