Covert Computation - Hiding code in code through compile-time obfuscation. Schrittwieser, S., Katzenbeisser, S., Kieseberg, P., Huber, M., Leithner, M., Mulazzani, M., & Weippl, E. R. Comput. Secur., 42:13–26, 2014. Paper doi bibtex @article{DBLP:journals/compsec/SchrittwieserKKHLMW14,
author = {Sebastian Schrittwieser and
Stefan Katzenbeisser and
Peter Kieseberg and
Markus Huber and
Manuel Leithner and
Martin Mulazzani and
Edgar R. Weippl},
title = {Covert Computation - Hiding code in code through compile-time obfuscation},
journal = {Comput. Secur.},
volume = {42},
pages = {13--26},
year = {2014},
url = {https://doi.org/10.1016/j.cose.2013.12.006},
doi = {10.1016/j.cose.2013.12.006},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/SchrittwieserKKHLMW14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"PYMuapygtPWXQLnjZ","bibbaseid":"schrittwieser-katzenbeisser-kieseberg-huber-leithner-mulazzani-weippl-covertcomputationhidingcodeincodethroughcompiletimeobfuscation-2014","downloads":0,"creationDate":"2017-03-20T08:02:14.720Z","title":"Covert Computation - Hiding code in code through compile-time obfuscation","author_short":["Schrittwieser, S.","Katzenbeisser, S.","Kieseberg, P.","Huber, M.","Leithner, M.","Mulazzani, M.","Weippl, E. R."],"year":2014,"bibtype":"article","biburl":"http://dblp.org/pers/tb2/w/Weippl:Edgar_R=","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Sebastian"],"propositions":[],"lastnames":["Schrittwieser"],"suffixes":[]},{"firstnames":["Stefan"],"propositions":[],"lastnames":["Katzenbeisser"],"suffixes":[]},{"firstnames":["Peter"],"propositions":[],"lastnames":["Kieseberg"],"suffixes":[]},{"firstnames":["Markus"],"propositions":[],"lastnames":["Huber"],"suffixes":[]},{"firstnames":["Manuel"],"propositions":[],"lastnames":["Leithner"],"suffixes":[]},{"firstnames":["Martin"],"propositions":[],"lastnames":["Mulazzani"],"suffixes":[]},{"firstnames":["Edgar","R."],"propositions":[],"lastnames":["Weippl"],"suffixes":[]}],"title":"Covert Computation - Hiding code in code through compile-time obfuscation","journal":"Comput. Secur.","volume":"42","pages":"13–26","year":"2014","url":"https://doi.org/10.1016/j.cose.2013.12.006","doi":"10.1016/j.cose.2013.12.006","timestamp":"Sat, 09 Apr 2022 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/compsec/SchrittwieserKKHLMW14.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/compsec/SchrittwieserKKHLMW14,\n author = {Sebastian Schrittwieser and\n Stefan Katzenbeisser and\n Peter Kieseberg and\n Markus Huber and\n Manuel Leithner and\n Martin Mulazzani and\n Edgar R. Weippl},\n title = {Covert Computation - Hiding code in code through compile-time obfuscation},\n journal = {Comput. Secur.},\n volume = {42},\n pages = {13--26},\n year = {2014},\n url = {https://doi.org/10.1016/j.cose.2013.12.006},\n doi = {10.1016/j.cose.2013.12.006},\n timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/compsec/SchrittwieserKKHLMW14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Schrittwieser, S.","Katzenbeisser, S.","Kieseberg, P.","Huber, M.","Leithner, M.","Mulazzani, M.","Weippl, E. R."],"key":"DBLP:journals/compsec/SchrittwieserKKHLMW14","id":"DBLP:journals/compsec/SchrittwieserKKHLMW14","bibbaseid":"schrittwieser-katzenbeisser-kieseberg-huber-leithner-mulazzani-weippl-covertcomputationhidingcodeincodethroughcompiletimeobfuscation-2014","role":"author","urls":{"Paper":"https://doi.org/10.1016/j.cose.2013.12.006"},"metadata":{"authorlinks":{}}},"search_terms":["covert","computation","hiding","code","code","through","compile","time","obfuscation","schrittwieser","katzenbeisser","kieseberg","huber","leithner","mulazzani","weippl"],"keywords":[],"authorIDs":["PbrP9YFAtA9NxijbL"],"dataSources":["A3zRESQ88WfwMCJn3"]}