메뉴 건너뛰기




Volumn 2851, Issue , 2003, Pages 1-13

Revisiting software protection

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 21144442036     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10958513_1     Document Type: Article
Times cited : (63)

References (52)
  • 3
    • 84957018842 scopus 로고    scopus 로고
    • Low Cost Attacks on Tamper-Resistant Devices
    • 5th International Workshop on Security Protocols
    • R.J. Anderson, M.G. Kuhn, "Low Cost Attacks on Tamper-Resistant Devices", pp. 125-136, 5th International Workshop on Security Protocols, Springer LNCS 1361 (1997).
    • (1997) Springer LNCS , vol.1361 , pp. 125-136
    • Anderson, R.J.1    Kuhn, M.G.2
  • 6
    • 84955621400 scopus 로고    scopus 로고
    • Tamper Resistant Software: An Implementation
    • Proc. 1st International Information Hiding Workshop (IHW), Cambridge, U.K. 1996
    • D. Aucsmith, "Tamper Resistant Software: An Implementation", Proc. 1st International Information Hiding Workshop (IHW), Cambridge, U.K. 1996, Springer LNCS 1174, pp. 317-333 (1997).
    • (1997) Springer LNCS , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 10
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • Advances in Cryptology - Crypto '97, Revised: Technion - C.S. Dept. - Technical Report CS0910-revised, 1997
    • E. Biham, A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems", pp. 513-525, Advances in Cryptology - Crypto '97, Springer LNCS 1294 (1997). Revised: Technion - C.S. Dept. - Technical Report CS0910-revised, 1997.
    • (1997) Springer LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 11
    • 3042641393 scopus 로고    scopus 로고
    • On the Importance of Eliminating Errors in Cryptographic Computations
    • D. Boneh, R.A. DeMillo, R.J. Lipton, "On the Importance of Eliminating Errors in Cryptographic Computations", J. Cryptology 14(2), pp. 101-119 (2001).
    • (2001) J. Cryptology , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 12
    • 84959058990 scopus 로고    scopus 로고
    • Protecting Software Code by Guards
    • Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001)
    • H. Chang, M. Atallah, "Protecting Software Code by Guards", Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001), Springer LNCS 2320, pp.160-175 (2002).
    • (2002) Springer LNCS , vol.2320 , pp. 160-175
    • Chang, H.1    Atallah, M.2
  • 13
    • 35248822611 scopus 로고    scopus 로고
    • Oblivious Hashing: A Stealthy Software Integrity Verification Primitive
    • Proc. 5th Information Hiding Workshop (IHW), Netherlands (October 2002)
    • Y. Chen, R. Venkatesan, M. Cary, R. Pang, S. Sinha, M. Jakubowski, "Oblivious Hashing: A Stealthy Software Integrity Verification Primitive", Proc. 5th Information Hiding Workshop (IHW), Netherlands (October 2002), Springer LNCS 2578, pp.400-414.
    • Springer LNCS , vol.2578 , pp. 400-414
    • Chen, Y.1    Venkatesan, R.2    Cary, M.3    Pang, R.4    Sinha, S.5    Jakubowski, M.6
  • 14
    • 0002380598 scopus 로고    scopus 로고
    • Security Issues in Mobile Code Systems
    • Mobile Agents and Security, G. Vigna (ed.)
    • D.M. Chess, "Security Issues in Mobile Code Systems", pp.1-14 in Mobile Agents and Security, G. Vigna (ed.), Springer LNCS 1419 (1998).
    • (1998) Springer LNCS , vol.1419 , pp. 1-14
    • Chess, D.M.1
  • 15
    • 84947229190 scopus 로고    scopus 로고
    • An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs
    • Proc. ISC 2001 - 4th International Information Security Conference, Malaga, Spain 1-3 October 2001
    • S. Chow, Y. Gu, H. Johnson, V.A. Zakharov, "An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs", pp. 144-155, Proc. ISC 2001 - 4th International Information Security Conference, Malaga, Spain 1-3 October 2001, Springer LNCS 2200 (2001).
    • (2001) Springer LNCS , vol.2200 , pp. 144-155
    • Chow, S.1    Gu, Y.2    Johnson, H.3    Zakharov, V.A.4
  • 17
    • 21144457759 scopus 로고    scopus 로고
    • White-Box Cryptography and an AES Implementation
    • Proc. 9th International Workshop on Selected Areas in Cryptography (SAC 2002)
    • S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, "White-Box Cryptography and an AES Implementation", Proc. 9th International Workshop on Selected Areas in Cryptography (SAC 2002), Springer LNCS 2595 (2003).
    • (2003) Springer LNCS , vol.2595
    • Chow, S.1    Eisen, P.2    Johnson, H.3    Van Oorschot, P.C.4
  • 18
    • 35248898240 scopus 로고    scopus 로고
    • A White-Box des Implementation for DRM Applications
    • Proc. 2nd ACM Workshop on Digital Rights Management (DRM 2002), to appear
    • S. Chow, P. Eisen, H. Johnson, P.C. van Oorschot, "A White-Box DES Implementation for DRM Applications", Proc. 2nd ACM Workshop on Digital Rights Management (DRM 2002), Springer LNCS (to appear).
    • Springer LNCS
    • Chow, S.1    Eisen, P.2    Johnson, H.3    Van Oorschot, P.C.4
  • 19
    • 0027684663 scopus 로고
    • Operating System Protection Through Program Evolution
    • 1 Oct.
    • F. Cohen, "Operating System Protection Through Program Evolution", Computers and Security 12(6), 1 Oct. 1993, pp. 565-584.
    • (1993) Computers and Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.1
  • 23
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection
    • June
    • C.S. Collberg, C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection", IEEE Trans. Software Engineering, Vol. 28 No. 6 (June 2002).
    • (2002) IEEE Trans. Software Engineering , vol.28 , Issue.6
    • Collberg, C.S.1    Thomborson, C.2
  • 25
    • 35248858733 scopus 로고    scopus 로고
    • 8 November
    • ComputerWeekly.com, "U.S. Software Security Takes Off", 8 November 2002, http://www.computerweekly.com/Article117316.htm
    • (2002) U.S. Software Security Takes off
  • 30
    • 0030149547 scopus 로고    scopus 로고
    • Software Protection and Simulation on Oblivious RAMs
    • May Based on earlier ideas of Goldreich (STOC'87) and Ostrovsky (STOC'90)
    • O. Goldreich, R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs", Journal of the ACM, vol.43 no.3 (May 1996), pp.431-473. Based on earlier ideas of Goldreich (STOC'87) and Ostrovsky (STOC'90).
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 31
    • 84885405991 scopus 로고
    • Software Protection: Myth or Reality?
    • Advances in Cryptology - CRYPTO'85
    • J. Gosler, "Software Protection: Myth or Reality?", Advances in Cryptology - CRYPTO'85, Springer-Verlag LNCS 218, pp.140-157 (1985).
    • (1985) Springer-Verlag LNCS , vol.218 , pp. 140-157
    • Gosler, J.1
  • 33
    • 0023456849 scopus 로고
    • Public protection of software
    • Nov. Earlier version in Crypto'85
    • A. Herzberg, S.S. Pinter, "Public protection of software", pp.371-393, ACM Trans. Computer Systems, vol.5 no.4 (Nov. 1987). Earlier version in Crypto'85.
    • (1987) ACM Trans. Computer Systems , vol.5 , Issue.4 , pp. 371-393
    • Herzberg, A.1    Pinter, S.S.2
  • 34
    • 84959055142 scopus 로고    scopus 로고
    • Dynamic Self-Checking Techniques for Improved Tamper Resistance
    • Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001)
    • B. Horne, L. Matheson, C. Sheehan, R. Tarjan, "Dynamic Self-Checking Techniques for Improved Tamper Resistance", Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001), Springer LNCS 2320, pp.141-159 (2002).
    • (2002) Springer LNCS , vol.2320 , pp. 141-159
    • Horne, B.1    Matheson, L.2    Sheehan, C.3    Tarjan, R.4
  • 35
    • 35248896352 scopus 로고    scopus 로고
    • Attacking an Obfuscated Cipher by Injecting Faults
    • Proc. 2nd ACM Workshop on Digital Rights Management (DRM 2002), to appear
    • M. Jacob, D. Boneh, E. Felton, "Attacking an Obfuscated Cipher by Injecting Faults", Proc. 2nd ACM Workshop on Digital Rights Management (DRM 2002), Springer LNCS (to appear).
    • Springer LNCS
    • Jacob, M.1    Boneh, D.2    Felton, E.3
  • 36
    • 23044532702 scopus 로고    scopus 로고
    • Discouraging Software Piracy Using Software Aging
    • Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001)
    • M. Jakobsson, M.K. Reiter, "Discouraging Software Piracy Using Software Aging", Proc. 1st ACM Workshop on Digital Rights Management (DRM 2001), Springer LNCS 2320, pp.1-12 (2002).
    • (2002) Springer LNCS , vol.2320 , pp. 1-12
    • Jakobsson, M.1    Reiter, M.K.2
  • 41
    • 35248847379 scopus 로고    scopus 로고
    • Next-Generation Secure Computing Base (formerly Palladium), Microsoft web site
    • Next-Generation Secure Computing Base (formerly Palladium), Microsoft web site, http://www.microsoft.com/resources/ngscb/default.mspx.
  • 42
    • 35248884694 scopus 로고    scopus 로고
    • Next-Generation Secure Computing Base - Technical FAQ, Microsoft web site
    • Next-Generation Secure Computing Base - Technical FAQ, Microsoft web site, http://www.microsoft.com/technet/security/news/NGSCB.asp.
  • 44
    • 0032680807 scopus 로고    scopus 로고
    • Information Hiding - A Survey
    • Protection of Multimedia Content, July
    • F. Petitcolas, R.J. Anderson, M.G. Kuhn, "Information Hiding - A Survey", Proc. of the IEEE (Special Issue on Protection of Multimedia Content), vol.87 no.7 (July 1999), pp.1062-1078.
    • (1999) Proc. of the IEEE , vol.87 , Issue.7 SPEC. ISSUE , pp. 1062-1078
    • Petitcolas, F.1    Anderson, R.J.2    Kuhn, M.G.3
  • 46
    • 0003197918 scopus 로고    scopus 로고
    • Protecting Mobile Agents Against Malicious Hosts
    • Mobile Agents and Security, G. Vigna (ed.)
    • T. Sander, C.F. Tschudin, "Protecting Mobile Agents Against Malicious Hosts", pp. 44-60 in Mobile Agents and Security, G. Vigna (ed.), Springer LNCS 1419 (1998).
    • (1998) Springer LNCS , vol.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 47
    • 0003714340 scopus 로고    scopus 로고
    • F. Schneider (ed.), report of the Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, (U.S.) National Research Council National Academy Press
    • F. Schneider (ed.), Trust in Cyberspace, report of the Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, (U.S.) National Research Council (National Academy Press, 1999).
    • (1999) Trust in Cyberspace
  • 48
    • 35248878690 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group, http://www.trustedcomputinggroup.org/home.
  • 49
    • 84956866637 scopus 로고    scopus 로고
    • Playing Hide and Seek with Keys
    • Financial Cryptography'99
    • N. van Someren, A. Shamir, "Playing Hide and Seek with Keys", pp. 118-124, Financial Cryptography'99, Springer LNCS 1648 (1999).
    • (1999) Springer LNCS , vol.1648 , pp. 118-124
    • Van Someren, N.1    Shamir, A.2
  • 50
    • 0001736099 scopus 로고    scopus 로고
    • Average-Case Computational Complexity Theory
    • L. Hemaspaandra and A. Selman (eds.), Springer
    • J. Wang, "Average-Case Computational Complexity Theory", pp.295-328 in: Complexity Theory Retrospective II, L. Hemaspaandra and A. Selman (eds.), Springer, 1997.
    • (1997) Complexity Theory Retrospective II , pp. 295-328
    • Wang, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.