Sciweavers

83 search results - page 1 / 17
» Advanced Software Protection Now
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 11 months ago
Advanced Software Protection Now
We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalitie...
Diego Bendersky, Ariel Futoransky, Luciano Notarfr...
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 11 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
ESSOS
2009
Springer
14 years 5 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
DRM
2005
Springer
14 years 4 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
TDP
2008
92views more  TDP 2008»
13 years 10 months ago
Data Access in a Cyber World: Making Use of Cyberinfrastructure
The vast amount of data now collected on human beings and organizations as a result of cyberinfrastructure advances has created similarly vast opportunities for social sc...
Julia Lane, Pascal Heus, Tim Mulcahy