{"id":"https://openalex.org/W2984608250","doi":"https://doi.org/10.1145/3319535.3353563","title":"3rd International Workshop on Software Protection (SPRO 2019)","display_name":"3rd International Workshop on Software Protection (SPRO 2019)","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2984608250","doi":"https://doi.org/10.1145/3319535.3353563","mag":"2984608250"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3353563","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3353563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070634380","display_name":"Paolo Falcarin","orcid":"https://orcid.org/0000-0003-1933-5348"},"institutions":[{"id":"https://openalex.org/I157227730","display_name":"University of East London","ror":"https://ror.org/057jrqr44","country_code":"GB","type":"education","lineage":["https://openalex.org/I157227730"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Paolo Falcarin","raw_affiliation_strings":["University of East London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of East London, London, United Kingdom","institution_ids":["https://openalex.org/I157227730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072113856","display_name":"Michael Zunke","orcid":null},"institutions":[{"id":"https://openalex.org/I4210123028","display_name":"Thales (Germany)","ror":"https://ror.org/031xjr712","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210123028","https://openalex.org/I4210140930"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael MiZu Zunke","raw_affiliation_strings":["Thales Group, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Thales Group, Munich, Germany","institution_ids":["https://openalex.org/I4210123028"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070634380"],"corresponding_institution_ids":["https://openalex.org/I157227730"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12691788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2719","last_page":"2720"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9086999893188477,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.8216451406478882},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6579014658927917},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6041216254234314},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5802177786827087},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5588349103927612},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5550640821456909},{"id":"https://openalex.org/keywords/business-continuity","display_name":"Business continuity","score":0.5034353137016296},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.4714720547199249},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.45302268862724304},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4468539357185364},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.3209412395954132},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2994921803474426},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11762219667434692}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.8216451406478882},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6579014658927917},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6041216254234314},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5802177786827087},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5588349103927612},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5550640821456909},{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.5034353137016296},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.4714720547199249},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.45302268862724304},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4468539357185364},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.3209412395954132},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2994921803474426},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11762219667434692},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3353563","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3353563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2770234245"],"abstract_inverted_index":{"Software":[0],"Protection":[1],"techniques":[2,57],"aim":[3],"to":[4,16,60,79,93],"defend":[5],"the":[6,21,28,53,65,95],"confidentiality":[7],"and":[8,24,85,101],"integrity":[9],"of":[10,27,45,55],"software":[11,89,108],"applications":[12],"that":[13,19],"are":[14],"exposed":[15],"an":[17,43],"adversary":[18],"shares":[20],"execution":[22],"host":[23],"access":[25],"privileges":[26],"application.":[29],"This":[30,41],"scenario":[31],"is":[32,42,58],"often":[33],"denoted":[34],"as":[35],"protection":[36,90],"against":[37],"MATE":[38],"(Man-At-The-End)":[39],"attacks.":[40],"area":[44],"growing":[46],"importance":[47],"for":[48],"industry:":[49],"in":[50,72,88,97,102],"many":[51],"cases":[52],"deployment":[54],"such":[56],"crucial":[59],"ensure":[61],"business":[62],"continuity.":[63],"Following":[64],"second":[66],"SPRO":[67],"workshop":[68],"co-located":[69],"with":[70,106],"CCS-2016":[71],"Vienna,":[73],"Austria,":[74],"this":[75],"third":[76],"edition":[77],"aims":[78],"establish":[80],"a":[81],"tradition":[82],"where":[83],"academics":[84],"industrial":[86,107],"experts":[87],"can":[91],"meet":[92],"confront":[94],"challenges":[96],"designing":[98],"stronger":[99],"protections":[100],"developing":[103],"better":[104],"integration":[105],"development":[109],"life":[110],"cycle":[111],"requirements.":[112]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
