Sciweavers

264 search results - page 3 / 53
» Software Protection by Hardware and Obfuscation
Sort
View
TSE
2002
65views more  TSE 2002»
13 years 7 months ago
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
Christian S. Collberg, Clark D. Thomborson
IWPC
2009
IEEE
14 years 2 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
DRM
2005
Springer
14 years 1 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
DRM
2003
Springer
14 years 29 days ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
ERSHOV
2003
Springer
14 years 29 days ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov