-
1
-
-
0021408626
-
Combating software piracy by encryption and key management
-
April
-
Albert, D. J. and Morse, S. P., "Combating software piracy by encryption and key management," IEEE Computer, pp.68-73, April 1984.
-
(1984)
IEEE Computer
, pp. 68-73
-
-
Albert, D.J.1
Morse, S.P.2
-
2
-
-
0344128127
-
Mobile Music Distribution and its Security Protection
-
May. in Japanese
-
Anazawa, T., "Mobile Music Distribution and its Security Protection,", IEICE(The Institute of Electronics,Information and Communication Engineers) Office System Workshop, pp.3-12, May 2001. (in Japanese)
-
(2001)
IEICE (The Institute of Electronics,Information and Communication Engineers) Office System Workshop
, pp. 3-12
-
-
Anazawa, T.1
-
3
-
-
84955621400
-
Tamper Resistant Software: An Implementation
-
R. J. Anderson ed., Lecture Notes in Computer Science
-
Aucsmith, D. W., "Tamper Resistant Software: An Implementation," In R. J. Anderson ed. Information Hiding Workshop, Lecture Notes in Computer Science, Vol. 1174, pp.317-333, 1996.
-
(1996)
Information Hiding Workshop
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.W.1
-
4
-
-
0012064474
-
-
United States Patent, No. 5,892,899, Assignee: Intel Corporation, Apr.
-
Aucsmith, D. W. and Graunke, G. L., "Tamper resistant methods and apparatus," United States Patent, No. 5,892,899, Assignee: Intel Corporation, Apr. 1999.
-
(1999)
Tamper Resistant Methods and Apparatus
-
-
Aucsmith, D.W.1
Graunke, G.L.2
-
5
-
-
33747091296
-
-
United States Patent, No. 4,278,837, July
-
Best, R. M., "Crypto microprocessor for executing enciphered programs," United States Patent, No. 4,278,837, July 1981.
-
(1981)
Crypto Microprocessor for Executing Enciphered Programs
-
-
Best, R.M.1
-
6
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
U. of Auckland, New Zealand
-
Collberg, C., Thomborson, C. and Low, D., "A taxonomy of obfuscating transformations," Technical Report of Dept. of Computer Science, U. of Auckland, No. 148, New Zealand, 1997.
-
(1997)
Technical Report of Dept. of Computer Science
, vol.148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
7
-
-
0031649930
-
Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs
-
San Diego, California
-
Collberg, C., Thomborson, C. and Low, D., "Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs," ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages(POPL98), San Diego, California, 1998.
-
(1998)
ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages(POPL98)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
0031620963
-
Breaking Abstractions and Unstructuring Data Structures
-
Chicago, IL, May
-
Collberg, C., Thomborson, C. and Low, D., "Breaking Abstractions and Unstructuring Data Structures," IEEE International Conference on Computer Languages(ICCL'98), Chicago, IL, May 1998.
-
(1998)
IEEE International Conference on Computer Languages(ICCL'98)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
9
-
-
0036704573
-
Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection
-
Aug.
-
Collberg, C. and Thomborson, C., "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection," IEEE Transactions on Software Engineering, Vol.28, No.6, pp.735-746, Aug. 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.6
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
10
-
-
0344559687
-
-
United States Patent, No. 6,006,328, Dec.
-
Drake, C. N., "Computer software authentication, protection, and security system," United States Patent, No. 6,006,328, Dec. 1999.
-
(1999)
Computer Software Authentication, Protection, and Security System
-
-
Drake, C.N.1
-
12
-
-
0345421843
-
-
United States Patent, No. 4,847,902, Assignee: Prime Computer, Inc., July
-
Hampson, B. E., "Digital computer system for executing encrypted programs," United States Patent, No. 4,847,902, Assignee: Prime Computer, Inc., July 1989.
-
(1989)
Digital Computer System for Executing Encrypted Programs
-
-
Hampson, B.E.1
-
13
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
G. Vigna ed., Lecture Notes in Computer Science, Springer-Verlag
-
Hohl, F., "Time limited blackbox security: Protecting mobile agents from malicious hosts," In G. Vigna ed. Mobile Agents Security, Lecture Notes in Computer Science, Vol. 1419, pp.92-113, Springer-Verlag, 1998.
-
(1998)
Mobile Agents Security
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
14
-
-
0344128125
-
Tamper Resistant Technology for Software
-
in Japanese
-
Ishima, H., Saitoh, K., Kamei, M., Shin, K., "Tamper Resistant Technology for Software," Fuji Xerox Technical Report, No. 13, pp.20-28, 2000. (in Japanese)
-
(2000)
Fuji Xerox Technical Report, No. 13
, Issue.13
, pp. 20-28
-
-
Ishima, H.1
Saitoh, K.2
Kamei, M.3
Shin, K.4
-
15
-
-
0344990739
-
On Constructing Tamper Resistant Software
-
in Japanese
-
Kamoshida, A., Matsumoto, T., Inoue, S., "On Constructing Tamper Resistant Software," Technical Report of IEICE (The Institute of Electronics,Information and Communication Engineers), Vol.97, No.461, pp.69-78, 1997. (in Japanese)
-
(1997)
Technical Report of IEICE (The Institute of Electronics,Information and Communication Engineers)
, vol.97
, Issue.461
, pp. 69-78
-
-
Kamoshida, A.1
Matsumoto, T.2
Inoue, S.3
-
16
-
-
0345421841
-
Protecting Software Programs by Replacing Instructions at Run-time
-
Dec. (in Japanese)
-
Kanzaki, Y., Monden, A., Nakamura, M., Matsumoto, K., "Protecting Software Programs by Replacing Instructions at Run-time," Technical Report of IEICE (The Institute of Electronics,Information and Communication Engineers), Vol.102, No.511, pp.13-19, Dec. 2002. (in Japanese)
-
(2002)
Technical Report of IEICE (The Institute of Electronics, Information and Communication Engineers)
, vol.102
, Issue.511
, pp. 13-19
-
-
Kanzaki, Y.1
Monden, A.2
Nakamura, M.3
Matsumoto, K.4
-
17
-
-
0041863079
-
A tentative approach to constructing tamper-resistant software
-
Cumbia, UK
-
Mambo, M., Murayama, T. and Okamoto, E., "A tentative approach to constructing tamper-resistant software," In Proc. New Security Paradigm Workshop, Cumbia, UK, 1997.
-
(1997)
Proc. New Security Paradigm Workshop
-
-
Mambo, M.1
Murayama, T.2
Okamoto, E.3
-
18
-
-
0344128124
-
Methods for Scrambling Programs Containing Loops
-
July. in Japanese
-
Monden, A., Takada, Y., Torii, K., "Methods for Scrambling Programs Containing Loops," The Transactions of the IEICE (The Institute of Electronics,Information and Communication Engineers), Vol.J80-D-I, No.7, pp.644-652, July 1997. (in Japanese)
-
(1997)
The Transactions of the IEICE (The Institute of Electronics,Information and Communication Engineers)
, vol.J80-D-I
, Issue.7
, pp. 644-652
-
-
Monden, A.1
Takada, Y.2
Torii, K.3
-
19
-
-
0344559686
-
-
Japan Patent Pending, 2002-355881, Dec. (in Japanese)
-
Monden, A. and Kanzaki, Y., "Program, apparatus and method for adding self-modifying code," Japan Patent Pending, 2002-355881, Dec. 2002. (in Japanese)
-
(2002)
Program, Apparatus and Method for Adding Self-modifying Code
-
-
Monden, A.1
Kanzaki, Y.2
-
20
-
-
0345421842
-
-
United States Patent, No. 6,178,509, Assignee: Intel Corporation, Jan.
-
Nardone, J. M., Mangold, R.P., Pfotenhauer, J. L., Shippy, K. L., Aucsmith, D. W., Maliszewski, R. L. and Graunke, G. L., "Tamper resistant methods and apparatus," United States Patent, No. 6,178,509, Assignee: Intel Corporation, Jan. 2001.
-
(2001)
Tamper Resistant Methods and Apparatus
-
-
Nardone, J.M.1
Mangold, R.P.2
Pfotenhauer, J.L.3
Shippy, K.L.4
Aucsmith, D.W.5
Maliszewski, R.L.6
Graunke, G.L.7
-
21
-
-
0344559685
-
"Software tamper resistance based on the difficulty of inter-procedural analysis
-
August
-
Ogiso, T., Sakabe, Y., Soshi, M. and Miyaji, A., "Software tamper resistance based on the difficulty of inter-procedural analysis," In Proc. International Workshop on Information Security Applications (WISA2002), pp. 437-452, August 2002.
-
(2002)
Proc. International Workshop on Information Security Applications (WISA2002)
, pp. 437-452
-
-
Ogiso, T.1
Sakabe, Y.2
Soshi, M.3
Miyaji, A.4
-
22
-
-
0344128123
-
-
United States Patent, No. 5,224,160, Assignee: Siemens Nixdorf Informations system AG, June
-
Paulini, W. and Wessel, D., "Process for securing and for checking the integrity of the secured programs," United States Patent, No. 5,224,160, Assignee: Siemens Nixdorf Informations system AG, June 1993.
-
(1993)
Process for Securing and for Checking the Integrity of the Secured Programs
-
-
Paulini, W.1
Wessel, D.2
-
23
-
-
0344990740
-
-
United States Patent, No. 6,102,966, Assignee: PreEmptive Solutions, Inc., Aug.
-
Tyma, P. M., "Method for renaming identifiers of a computer program," United States Patent, No. 6,102,966, Assignee: PreEmptive Solutions, Inc., Aug. 2000.
-
(2000)
Method for Renaming Identifiers of a Computer Program
-
-
Tyma, P.M.1
-
24
-
-
0012037951
-
Software tamper resistance: Obfuscating static analysis of programs
-
Department of Computer Science, University of Virginia, Dec.
-
Wang, C., Hill, J., Knight, J. and Davidson, J., "Software tamper resistance: Obfuscating static analysis of programs," Technical Report SC-2000-12, Department of Computer Science, University of Virginia, Dec. 2000.
-
(2000)
Technical Report
, vol.SC-2000-12
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
|