Sciweavers

19 search results - page 1 / 4
» Tamper Resistant Software Through Intent Protection
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 11 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
ISW
2005
Springer
14 years 4 months ago
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
Hongxia Jin, Ginger Myles, Jeffery Lotspiech
PDCAT
2004
Springer
14 years 4 months ago
Tamper Resistant Software by Integrity-Based Encryption
There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code me...
Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon
DRM
2007
Springer
14 years 5 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
MSS
2005
IEEE
136views Hardware» more  MSS 2005»
14 years 4 months ago
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redund
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emer...
Joseph Tucek, Paul Stanton, Elizabeth Haubert, Rag...