{"id":"https://openalex.org/W2050152162","doi":"https://doi.org/10.1145/1314276.1314291","title":"Mechanism for software tamper resistance","display_name":"Mechanism for software tamper resistance","publication_year":2007,"publication_date":"2007-10-29","ids":{"openalex":"https://openalex.org/W2050152162","doi":"https://doi.org/10.1145/1314276.1314291","mag":"2050152162"},"language":"en","primary_location":{"id":"doi:10.1145/1314276.1314291","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1314276.1314291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 ACM workshop on Digital Rights Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087182298","display_name":"Wil Michiels","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131230","display_name":"Philips (United States)","ror":"https://ror.org/03kw6wr76","country_code":"US","type":"company","lineage":["https://openalex.org/I4210122849","https://openalex.org/I4210131230"]},{"id":"https://openalex.org/I4210122849","display_name":"Philips (Netherlands)","ror":"https://ror.org/02p2bgp27","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210122849"]}],"countries":["NL","US"],"is_corresponding":true,"raw_author_name":"W. Michiels","raw_affiliation_strings":["Philips Research, Eindhoven, Netherlands","Philips Research, Eindhoven, NETHERLANDS"],"affiliations":[{"raw_affiliation_string":"Philips Research, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I4210122849"]},{"raw_affiliation_string":"Philips Research, Eindhoven, NETHERLANDS","institution_ids":["https://openalex.org/I4210131230"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014518621","display_name":"Paul Gorissen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122849","display_name":"Philips (Netherlands)","ror":"https://ror.org/02p2bgp27","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210122849"]},{"id":"https://openalex.org/I4210131230","display_name":"Philips (United States)","ror":"https://ror.org/03kw6wr76","country_code":"US","type":"company","lineage":["https://openalex.org/I4210122849","https://openalex.org/I4210131230"]}],"countries":["NL","US"],"is_corresponding":false,"raw_author_name":"P. Gorissen","raw_affiliation_strings":["Philips Research, Eindhoven, Netherlands","Philips Research, Eindhoven, NETHERLANDS"],"affiliations":[{"raw_affiliation_string":"Philips Research, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I4210122849"]},{"raw_affiliation_string":"Philips Research, Eindhoven, NETHERLANDS","institution_ids":["https://openalex.org/I4210131230"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087182298"],"corresponding_institution_ids":["https://openalex.org/I4210122849","https://openalex.org/I4210131230"],"apc_list":null,"apc_paid":null,"fwci":2.2168,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.8813892,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"82","last_page":"89"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/white-box","display_name":"White box","score":0.8001296520233154},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7978944778442383},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6583132147789001},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.5645812749862671},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5593628883361816},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49642568826675415},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4784381687641144},{"id":"https://openalex.org/keywords/lookup-table","display_name":"Lookup table","score":0.4486701786518097},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.4226263463497162},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.38410529494285583},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3389834761619568},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30197781324386597},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.107235848903656}],"concepts":[{"id":"https://openalex.org/C180932941","wikidata":"https://www.wikidata.org/wiki/Q997233","display_name":"White box","level":2,"score":0.8001296520233154},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7978944778442383},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6583132147789001},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.5645812749862671},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5593628883361816},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49642568826675415},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4784381687641144},{"id":"https://openalex.org/C134835016","wikidata":"https://www.wikidata.org/wiki/Q690265","display_name":"Lookup table","level":2,"score":0.4486701786518097},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.4226263463497162},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.38410529494285583},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3389834761619568},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30197781324386597},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.107235848903656}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1314276.1314291","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1314276.1314291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 ACM workshop on Digital Rights Management","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/2101ca73-ddf5-4cec-a970-072e22f53ae9","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/2101ca73-ddf5-4cec-a970-072e22f53ae9","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Michiels, W P A J & Gorissen, P 2007, Mechanism for software tamper resistance : an application of white-box cryptography. in DRM'07 - Proceedings of the 2007 ACM Workshop on Digital Rights Management, 29 October 2007, Alexandria, Virginia. Association for Computing Machinery, Inc., New York, pp. 82-89, 2007 ACM Workshop on Digital Rights Management, DRM'07, Alexandria, VA, United States, 29/10/07. https://doi.org/10.1145/1314276.1314291","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/2101ca73-ddf5-4cec-a970-072e22f53ae9","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/2101ca73-ddf5-4cec-a970-072e22f53ae9","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"DRM'07 - Proceedings of the 2007 ACM Workshop on Digital Rights Management, 29 October 2007, Alexandria, Virginia, 82 - 89","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1505973206","https://openalex.org/W1509316335","https://openalex.org/W1515664404","https://openalex.org/W1543331277","https://openalex.org/W1544845910","https://openalex.org/W1567046609","https://openalex.org/W1572300106","https://openalex.org/W1572375309","https://openalex.org/W1575540561","https://openalex.org/W1580417272","https://openalex.org/W1718337629","https://openalex.org/W1917830443","https://openalex.org/W2086277109","https://openalex.org/W2116433890","https://openalex.org/W2140514778","https://openalex.org/W2144882558","https://openalex.org/W2148888468","https://openalex.org/W2163114293","https://openalex.org/W2291051231","https://openalex.org/W2913005514","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1985115047","https://openalex.org/W2986543571","https://openalex.org/W2919954404","https://openalex.org/W2968276623","https://openalex.org/W2955579865","https://openalex.org/W2534971686","https://openalex.org/W1846793529","https://openalex.org/W3214586009","https://openalex.org/W2802166783","https://openalex.org/W4380083395"],"abstract_inverted_index":{"In":[0,13,86,119],"software":[1,26,44,133,142],"protection":[2],"we":[3,122],"typically":[4],"have":[5,21],"to":[6,20,24,39,53,102,131,200,203],"deal":[7],"with":[8,108],"the":[9,25,55,87,90,93,113,139,152,163,168,176,184,191,204],"white-box":[10,36,59,65,75,88,129,159,185,205],"attack":[11],"model.":[12],"this":[14,120],"model":[15],"an":[16,51,180,198],"attacker":[17,52,199],"is":[18,38,48,97,195,212],"assumed":[19],"full":[22,28],"access":[23],"and":[27,69],"control":[29],"over":[30],"its":[31,209],"execution.":[32],"The":[33,136],"goal":[34],"of":[35,92,105,115,117,141,154,157],"cryptography":[37],"implement":[40],"cryptographic":[41],"algorithms":[42],"in":[43,112,175,179,183,190],"such":[45,207],"that":[46,126,172,193,208],"it":[47,194],"hard":[49],"for":[50,67,80,197],"extract":[54],"key":[56,91],"by":[57],"a":[58,103,109,124,128,158,173],"attack.":[60],"Chow":[61],"et":[62],"al.":[63],"present":[64,123],"implementations":[66,76,89],"AES":[68],"DES.":[70],"Based":[71],"on":[72],"their":[73],"ideas,":[74],"can":[77],"be":[78],"derived":[79],"other":[81],"block":[82,95],"ciphers":[83],"as":[84,144,167],"well.":[85],"underlying":[94],"cipher":[96],"expanded":[98],"from":[99],"several":[100],"bytes":[101],"collection":[104,153],"lookup":[106,145,155],"tables":[107,156],"total":[110],"size":[111],"order":[114],"hundreds":[116],"kilobytes.":[118],"paper":[121,192],"technique":[125,137],"uses":[127],"implementation":[130,206],"make":[132,201],"tamper":[134,165],"resistant.":[135],"interprets":[138],"binary":[140],"code":[143,164,177],"tables,":[146],"which":[147],"are":[148],"next":[149],"incorporated":[150],"into":[151],"implementation.":[160,186],"This":[161],"makes":[162],"resistant":[166],"dual":[169],"interpretation":[170],"implies":[171],"change":[174,182],"results":[178],"unintentional":[181],"We":[187],"also":[188],"indicate":[189],"difficult":[196],"modifications":[202],"original":[210],"operation":[211],"restored.":[213]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
