-
1
-
-
0034828870
-
Cryptographic Security for Mobile Code
-
May
-
J. Algesheimer, C. Cachin, J. Camenisch, G. Karjoth, "Cryptographic Security for Mobile Code", pp. 2-11 in Proc. 2001 IEEE Symposium on Security and Privacy (May 2001).
-
(2001)
Proc. 2001 IEEE Symposium on Security and Privacy
, pp. 2-11
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
-
3
-
-
84957018842
-
Low Cost Attacks on Tamper-Resistant Devices
-
5th International Workshop on Security Protocols
-
R.J. Anderson, M.G. Kuhn, "Low Cost Attacks on Tamper-Resistant Devices", pp. 125-136, 5th International Workshop on Security Protocols, Springer LNCS 1361 (1997).
-
(1997)
Springer LNCS
, vol.1361
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.G.2
-
4
-
-
0030672130
-
A Secure and Reliable Bootstrap Architecture
-
May
-
W.A. Arbaugh, D.J. Farber, J.M. Smith, "A Secure and Reliable Bootstrap Architecture", Proc. 1997 IEEE Symp. Security and Privacy, pp.65-71, May 1997.
-
(1997)
Proc. 1997 IEEE Symp. Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
5
-
-
35248887479
-
-
U.S. Patent 6,185,678 filed Oct.2 issued Feb.6
-
W.A. Arbaugh, D.J. Farber, A.D. Keromytis, J.M. Smith, Secure and Reliable Bootstrap Architecture, U.S. Patent 6,185,678 (filed Oct.2 1998; issued Feb.6 2001).
-
(1998)
Secure and Reliable Bootstrap Architecture
-
-
Arbaugh, W.A.1
Farber, D.J.2
Keromytis, A.D.3
Smith, J.M.4
-
6
-
-
84955621400
-
Tamper Resistant Software: An Implementation
-
Proc. 1st International Information Hiding Workshop (IHW), Cambridge, U.K. 1996
-
D. Aucsmith, "Tamper Resistant Software: An Implementation", Proc. 1st International Information Hiding Workshop (IHW), Cambridge, U.K. 1996, Springer LNCS 1174, pp. 317-333 (1997).
-
(1997)
Springer LNCS
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
8
-
-
1142270162
-
-
B. Balacheff, L. Chen, S. Pearson (ed.), Prentice Hall
-
B. Balacheff, L. Chen, S. Pearson (ed.), D. Plaquin, G. Proudler, Trusted Computing Platforms: TCPA Technology in Context, Prentice Hall, 2002.
-
(2002)
Trusted Computing Platforms: TCPA Technology in Context
-
-
Plaquin, D.1
Proudler, G.2
-
9
-
-
79251578513
-
On the (Im)possibility of Obfuscating Programs
-
Advances in Cryptology - Crypto 2001
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, K. Yang, "On the (Im)possibility of Obfuscating Programs", pp. 1-18, Advances in Cryptology - Crypto 2001, Springer LNCS 2139 (2001).
-
(2001)
Springer LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
10
-
-
84958641478
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Advances in Cryptology - Crypto '97, Revised: Technion - C.S. Dept. - Technical Report CS0910-revised, 1997
-
E. Biham, A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems", pp. 513-525, Advances in Cryptology - Crypto '97, Springer LNCS 1294 (1997). Revised: Technion - C.S. Dept. - Technical Report CS0910-revised, 1997.
-
(1997)
Springer LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
11
-
-
3042641393
-
On the Importance of Eliminating Errors in Cryptographic Computations
-
D. Boneh, R.A. DeMillo, R.J. Lipton, "On the Importance of Eliminating Errors in Cryptographic Computations", J. Cryptology 14(2), pp. 101-119 (2001).
-
(2001)
J. Cryptology
, vol.14
, Issue.2
, pp. 101-119
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
12
-
-
84959058990
-
Protecting Software Code by Guards
-
Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001)
-
H. Chang, M. Atallah, "Protecting Software Code by Guards", Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001), Springer LNCS 2320, pp.160-175 (2002).
-
(2002)
Springer LNCS
, vol.2320
, pp. 160-175
-
-
Chang, H.1
Atallah, M.2
-
13
-
-
35248822611
-
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive
-
Proc. 5th Information Hiding Workshop (IHW), Netherlands (October 2002)
-
Y. Chen, R. Venkatesan, M. Cary, R. Pang, S. Sinha, M. Jakubowski, "Oblivious Hashing: A Stealthy Software Integrity Verification Primitive", Proc. 5th Information Hiding Workshop (IHW), Netherlands (October 2002), Springer LNCS 2578, pp.400-414.
-
Springer LNCS
, vol.2578
, pp. 400-414
-
-
Chen, Y.1
Venkatesan, R.2
Cary, M.3
Pang, R.4
Sinha, S.5
Jakubowski, M.6
-
14
-
-
0002380598
-
Security Issues in Mobile Code Systems
-
Mobile Agents and Security, G. Vigna (ed.)
-
D.M. Chess, "Security Issues in Mobile Code Systems", pp.1-14 in Mobile Agents and Security, G. Vigna (ed.), Springer LNCS 1419 (1998).
-
(1998)
Springer LNCS
, vol.1419
, pp. 1-14
-
-
Chess, D.M.1
-
15
-
-
84947229190
-
An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs
-
Proc. ISC 2001 - 4th International Information Security Conference, Malaga, Spain 1-3 October 2001
-
S. Chow, Y. Gu, H. Johnson, V.A. Zakharov, "An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs", pp. 144-155, Proc. ISC 2001 - 4th International Information Security Conference, Malaga, Spain 1-3 October 2001, Springer LNCS 2200 (2001).
-
(2001)
Springer LNCS
, vol.2200
, pp. 144-155
-
-
Chow, S.1
Gu, Y.2
Johnson, H.3
Zakharov, V.A.4
-
16
-
-
35248842556
-
The Encoder Solution to Implementing Tamper Resistant Software
-
Vancouver, Oct.
-
J.R. Nickerson, S.T. Chow, H.J. Johnson, Y. Gu, "The Encoder Solution to Implementing Tamper Resistant Software", presented at the CERT/IEEE Information Survivability Workshop, Vancouver, Oct. 2001.
-
(2001)
CERT/IEEE Information Survivability Workshop
-
-
Nickerson, J.R.1
Chow, S.T.2
Johnson, H.J.3
Gu, Y.4
-
17
-
-
21144457759
-
White-Box Cryptography and an AES Implementation
-
Proc. 9th International Workshop on Selected Areas in Cryptography (SAC 2002)
-
S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, "White-Box Cryptography and an AES Implementation", Proc. 9th International Workshop on Selected Areas in Cryptography (SAC 2002), Springer LNCS 2595 (2003).
-
(2003)
Springer LNCS
, vol.2595
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.C.4
-
18
-
-
35248898240
-
A White-Box des Implementation for DRM Applications
-
Proc. 2nd ACM Workshop on Digital Rights Management (DRM 2002), to appear
-
S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, "A White-Box DES Implementation for DRM Applications", Proc. 2nd ACM Workshop on Digital Rights Management (DRM 2002), Springer LNCS (to appear).
-
Springer LNCS
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.C.4
-
19
-
-
0027684663
-
Operating System Protection Through Program Evolution
-
1 Oct.
-
F. Cohen, "Operating System Protection Through Program Evolution", Computers and Security 12(6), 1 Oct. 1993, pp. 565-584.
-
(1993)
Computers and Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
20
-
-
0004046658
-
-
Technical Report 148, Dept. Computer Science, University of Auckland July
-
C. Collberg, C. Thomborson, D. Low, "A Taxonomy of Obfuscating Transformations", Technical Report 148, Dept. Computer Science, University of Auckland (July 1997).
-
(1997)
A Taxonomy of Obfuscating Transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
21
-
-
0031649930
-
Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs
-
Jan.
-
C. Collberg, C. Thomborson, D. Low, "Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs", Proc. Symp. Principles of Programming Languages (POPL'98), Jan. 1998.
-
(1998)
Proc. Symp. Principles of Programming Languages (POPL'98)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
23
-
-
0036704573
-
Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection
-
June
-
C.S. Collberg, C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection", IEEE Trans. Software Engineering, Vol. 28 No. 6 (June 2002).
-
(2002)
IEEE Trans. Software Engineering
, vol.28
, Issue.6
-
-
Collberg, C.S.1
Thomborson, C.2
-
25
-
-
35248858733
-
-
8 November
-
ComputerWeekly.com, "U.S. Software Security Takes Off", 8 November 2002, http://www.computerweekly.com/Article117316.htm
-
(2002)
U.S. Software Security Takes off
-
-
-
26
-
-
80455172425
-
-
U.S. Patent 6,330,670 filed Jan.8 issued Dec.11
-
P. England, J.D. DeTreville, B.W. Lampson, Digital Rights Management Operating System, U.S. Patent 6,330,670 (filed Jan.8 1999; issued Dec.11 2001).
-
(1999)
Digital Rights Management Operating System
-
-
England, P.1
DeTreville, J.D.2
Lampson, B.W.3
-
27
-
-
81055147298
-
-
U.S. Patent 6,327,652 filed Jan.8 issued Dec.4
-
P. England, J.D. DeTreville, B.W. Lampson, Loading and Identifying a Digital Rights Management Operating System, U.S. Patent 6,327,652 (filed Jan.8 1999; issued Dec.4 2001).
-
(1999)
Loading and Identifying a Digital Rights Management Operating System
-
-
England, P.1
DeTreville, J.D.2
Lampson, B.W.3
-
28
-
-
0030697765
-
Building Diverse Computer Systems
-
IEEE Computer Society Press
-
S. Forrest, A. Somayaji, D. H. Ackley, "Building Diverse Computer Systems", pp. 67-72, Proc. 6th Workshop on Hot Topics in Operating Systems, IEEE Computer Society Press, 1997.
-
(1997)
Proc. 6th Workshop on Hot Topics in Operating Systems
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.H.3
-
30
-
-
0030149547
-
Software Protection and Simulation on Oblivious RAMs
-
May Based on earlier ideas of Goldreich (STOC'87) and Ostrovsky (STOC'90)
-
O. Goldreich, R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs", Journal of the ACM, vol.43 no.3 (May 1996), pp.431-473. Based on earlier ideas of Goldreich (STOC'87) and Ostrovsky (STOC'90).
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
31
-
-
84885405991
-
Software Protection: Myth or Reality?
-
Advances in Cryptology - CRYPTO'85
-
J. Gosler, "Software Protection: Myth or Reality?", Advances in Cryptology - CRYPTO'85, Springer-Verlag LNCS 218, pp.140-157 (1985).
-
(1985)
Springer-Verlag LNCS
, vol.218
, pp. 140-157
-
-
Gosler, J.1
-
33
-
-
0023456849
-
Public protection of software
-
Nov. Earlier version in Crypto'85
-
A. Herzberg, S.S. Pinter, "Public protection of software", pp.371-393, ACM Trans. Computer Systems, vol.5 no.4 (Nov. 1987). Earlier version in Crypto'85.
-
(1987)
ACM Trans. Computer Systems
, vol.5
, Issue.4
, pp. 371-393
-
-
Herzberg, A.1
Pinter, S.S.2
-
34
-
-
84959055142
-
Dynamic Self-Checking Techniques for Improved Tamper Resistance
-
Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001)
-
B. Horne, L. Matheson, C. Sheehan, R. Tarjan, "Dynamic Self-Checking Techniques for Improved Tamper Resistance", Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001), Springer LNCS 2320, pp.141-159 (2002).
-
(2002)
Springer LNCS
, vol.2320
, pp. 141-159
-
-
Horne, B.1
Matheson, L.2
Sheehan, C.3
Tarjan, R.4
-
35
-
-
35248896352
-
Attacking an Obfuscated Cipher by Injecting Faults
-
Proc. 2nd ACM Workshop on Digital Rights Management (DRM 2002), to appear
-
M. Jacob, D. Boneh, E. Felton, "Attacking an Obfuscated Cipher by Injecting Faults", Proc. 2nd ACM Workshop on Digital Rights Management (DRM 2002), Springer LNCS (to appear).
-
Springer LNCS
-
-
Jacob, M.1
Boneh, D.2
Felton, E.3
-
36
-
-
23044532702
-
Discouraging Software Piracy Using Software Aging
-
Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001)
-
M. Jakobsson, M.K. Reiter, "Discouraging Software Piracy Using Software Aging", Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001), Springer LNCS 2320, pp.1-12 (2002).
-
(2002)
Springer LNCS
, vol.2320
, pp. 1-12
-
-
Jakobsson, M.1
Reiter, M.K.2
-
39
-
-
0034445599
-
Architectural Support for Copy and Tamper Resistant Software
-
Nov.
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, M. Horowitz, "Architectural Support for Copy and Tamper Resistant Software", Proc. 9th International Conf. Architectural Support for Programming Languages and Operating Systems (Nov. 2000).
-
(2000)
Proc. 9th International Conf. Architectural Support for Programming Languages and Operating Systems
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
41
-
-
35248847379
-
-
Next-Generation Secure Computing Base (formerly Palladium), Microsoft web site
-
Next-Generation Secure Computing Base (formerly Palladium), Microsoft web site, http://www.microsoft.com/resources/ngscb/default.mspx.
-
-
-
-
42
-
-
35248884694
-
-
Next-Generation Secure Computing Base - Technical FAQ, Microsoft web site
-
Next-Generation Secure Computing Base - Technical FAQ, Microsoft web site, http://www.microsoft.com/technet/security/news/NGSCB.asp.
-
-
-
-
43
-
-
0344559685
-
Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis
-
Korea, August
-
T. Ogiso, U. Sakabe, M. Soshi, A. Miyaji, "Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis", 3rd Workshop on Information Security Applications (WISA 2002), Korea, August 2002.
-
(2002)
3rd Workshop on Information Security Applications (WISA 2002)
-
-
Ogiso, T.1
Sakabe, U.2
Soshi, M.3
Miyaji, A.4
-
44
-
-
0032680807
-
Information Hiding - A Survey
-
Protection of Multimedia Content, July
-
F. Petitcolas, R.J. Anderson, M.G. Kuhn, "Information Hiding - A Survey", Proc. of the IEEE (Special Issue on Protection of Multimedia Content), vol.87 no.7 (July 1999), pp.1062-1078.
-
(1999)
Proc. of the IEEE
, vol.87
, Issue.7 SPEC. ISSUE
, pp. 1062-1078
-
-
Petitcolas, F.1
Anderson, R.J.2
Kuhn, M.G.3
-
46
-
-
0003197918
-
Protecting Mobile Agents Against Malicious Hosts
-
Mobile Agents and Security, G. Vigna (ed.)
-
T. Sander, C.F. Tschudin, "Protecting Mobile Agents Against Malicious Hosts", pp. 44-60 in Mobile Agents and Security, G. Vigna (ed.), Springer LNCS 1419 (1998).
-
(1998)
Springer LNCS
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
47
-
-
0003714340
-
-
F. Schneider (ed.), report of the Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, (U.S.) National Research Council National Academy Press
-
F. Schneider (ed.), Trust in Cyberspace, report of the Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, (U.S.) National Research Council (National Academy Press, 1999).
-
(1999)
Trust in Cyberspace
-
-
-
48
-
-
35248878690
-
-
Trusted Computing Group
-
Trusted Computing Group, http://www.trustedcomputinggroup.org/home.
-
-
-
-
49
-
-
84956866637
-
Playing Hide and Seek with Keys
-
Financial Cryptography'99
-
N. van Someren, A. Shamir, "Playing Hide and Seek with Keys", pp. 118-124, Financial Cryptography'99, Springer LNCS 1648 (1999).
-
(1999)
Springer LNCS
, vol.1648
, pp. 118-124
-
-
Van Someren, N.1
Shamir, A.2
-
50
-
-
0001736099
-
Average-Case Computational Complexity Theory
-
L. Hemaspaandra and A. Selman (eds.), Springer
-
J. Wang, "Average-Case Computational Complexity Theory", pp.295-328 in: Complexity Theory Retrospective II, L. Hemaspaandra and A. Selman (eds.), Springer, 1997.
-
(1997)
Complexity Theory Retrospective II
, pp. 295-328
-
-
Wang, J.1
-
51
-
-
0012037951
-
-
Dept. of Computer Science, Univ. of Virginia, Tech. Report CS-2000-12 May Updated in [52]
-
C. Wang, J. Hill, J. Knight, J. Davidson, "Software Tamper Resistance: Obstructing Static Analysis of Programs", Dept. of Computer Science, Univ. of Virginia, Tech. Report CS-2000-12 (May 2000). Updated in [52].
-
(2000)
Software Tamper Resistance: Obstructing Static Analysis of Programs
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
|