메뉴 건너뛰기




Volumn , Issue , 2003, Pages 170-179

Exploiting Self-Modification Mechanism for Program Protection

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER CRIME; COMPUTER HARDWARE; COMPUTER SOFTWARE; CRYPTOGRAPHY; SECURITY OF DATA;

EID: 0345529075     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (60)

References (24)
  • 1
    • 0021408626 scopus 로고
    • Combating software piracy by encryption and key management
    • April
    • Albert, D. J. and Morse, S. P., "Combating software piracy by encryption and key management," IEEE Computer, pp.68-73, April 1984.
    • (1984) IEEE Computer , pp. 68-73
    • Albert, D.J.1    Morse, S.P.2
  • 3
    • 84955621400 scopus 로고    scopus 로고
    • Tamper Resistant Software: An Implementation
    • R. J. Anderson ed., Lecture Notes in Computer Science
    • Aucsmith, D. W., "Tamper Resistant Software: An Implementation," In R. J. Anderson ed. Information Hiding Workshop, Lecture Notes in Computer Science, Vol. 1174, pp.317-333, 1996.
    • (1996) Information Hiding Workshop , vol.1174 , pp. 317-333
    • Aucsmith, D.W.1
  • 9
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection
    • Aug.
    • Collberg, C. and Thomborson, C., "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection," IEEE Transactions on Software Engineering, Vol.28, No.6, pp.735-746, Aug. 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.6 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 13
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • G. Vigna ed., Lecture Notes in Computer Science, Springer-Verlag
    • Hohl, F., "Time limited blackbox security: Protecting mobile agents from malicious hosts," In G. Vigna ed. Mobile Agents Security, Lecture Notes in Computer Science, Vol. 1419, pp.92-113, Springer-Verlag, 1998.
    • (1998) Mobile Agents Security , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 23
  • 24
    • 0012037951 scopus 로고    scopus 로고
    • Software tamper resistance: Obfuscating static analysis of programs
    • Department of Computer Science, University of Virginia, Dec.
    • Wang, C., Hill, J., Knight, J. and Davidson, J., "Software tamper resistance: Obfuscating static analysis of programs," Technical Report SC-2000-12, Department of Computer Science, University of Virginia, Dec. 2000.
    • (2000) Technical Report , vol.SC-2000-12
    • Wang, C.1    Hill, J.2    Knight, J.3    Davidson, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.