Sciweavers

416 search results - page 7 / 84
» Some new approaches for preventing software tampering
Sort
View
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 3 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
JIT
2004
Springer
131views Database» more  JIT 2004»
14 years 23 days ago
Agile Software Engineering: A New System for an Expanding Business Model at SCHUFA
A software development unit called to renew or replace an existing corporate system may face some special problems in an established company with a lot of well-trained behavioral p...
Rainer Burkhardt, Volker Gruhn
SCAI
1993
13 years 8 months ago
A Case-Based Answer to Some Problems of Knowledge-Based Systems
Among the most important challenges for contemporary AI research are the development of methods for improved robustness, adaptability, and overall interactiveness of systems. Inter...
Agnar Aamodt
SAC
2009
ACM
14 years 2 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
IH
1998
Springer
13 years 11 months ago
On Software Protection via Function Hiding
Software piracy is a major economic problem: it leads to revenue losses, it favors big software houses that are less hurt by these losses and it prevents new software economy model...
Tomas Sander, Christian F. Tschudin