메뉴 건너뛰기




Volumn 1, Issue , 2005, Pages 209-215

Novel Obfuscation algorithms for software security

Author keywords

Code Obfuscation; Software protection techniques; Software security

Indexed keywords

CRYPTOGRAPHY; FOURIER TRANSFORMS; SOFTWARE ENGINEERING;

EID: 33751085817     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (30)
  • 1
    • 3042825654 scopus 로고    scopus 로고
    • Software Protection- Security's Last Stand
    • January/February
    • M.R. Stytz, J. A. Whittaker, "Software Protection- Security's Last Stand", IEEE Security and Privacy, January/February 2003, pp. 95-98.
    • (2003) IEEE Security and Privacy , pp. 95-98
    • Stytz, M.R.1    Whittaker, J.A.2
  • 3
    • 2342591623 scopus 로고    scopus 로고
    • Software Security for open source systems
    • February
    • C. Cowan, "Software Security for open source systems", IEEE Security & Privacy, February 2003
    • (2003) IEEE Security & Privacy
    • Cowan, C.1
  • 4
    • 2342563769 scopus 로고    scopus 로고
    • Considering Defense in Depth for Software Applications
    • February
    • M.R Stytz, "Considering Defense in Depth for Software Applications", IEEE Security & Privacy, February 2004.
    • (2004) IEEE Security & Privacy
    • Stytz, M.R.1
  • 5
    • 3042738504 scopus 로고    scopus 로고
    • Why Secure Applications are difficult to write
    • April
    • J.Whittaker, "Why Secure Applications are difficult to write", IEEE Security & Privacy, April 2003
    • (2003) IEEE Security & Privacy
    • Whittaker, J.1
  • 6
    • 41149171445 scopus 로고    scopus 로고
    • Alliance
    • Business Software Alliance http://global.bsa.org/usa/press/newsreleases/ 2002-06-10.1129.phtml?CFID=4661&CFTOKEN=73044918
    • Business Software
  • 7
  • 8
    • 0041916251 scopus 로고    scopus 로고
    • Watermarking, Tamper Proofing and Obfuscation - Tools for Software Protection
    • Technical Report, February
    • C.Collberg, C.Thomborson, "Watermarking, Tamper Proofing and Obfuscation - Tools for Software Protection", Technical Report, February 2000-03.
    • (2003)
    • Collberg, C.1    Thomborson, C.2
  • 9
    • 11144220098 scopus 로고    scopus 로고
    • Encryption, hashing, & obfuscation
    • April
    • P. Tyma, "Encryption, hashing, & obfuscation", ZD Net April 2003
    • (2003) ZD Net
    • Tyma, P.1
  • 11
    • 0006604914 scopus 로고    scopus 로고
    • Java Control Flow Obfuscation
    • Thesis Report University of Auckland, June 3
    • D. Low, "Java Control Flow Obfuscation", Thesis Report University of Auckland, June 3 1998
    • (1998)
    • Low, D.1
  • 12
    • 11144229255 scopus 로고    scopus 로고
    • General Method of Program Code Obfuscation
    • PhD Dissertation, Wroclaw University of Technology, Institute of Engineering Cybernetics
    • G.Wrobliwski, "General Method of Program Code Obfuscation", PhD Dissertation, Wroclaw University of Technology, Institute of Engineering Cybernetics, 2002
    • (2002)
    • Wrobliwski, G.1
  • 15
    • 84860066696 scopus 로고    scopus 로고
    • Jobfuscator http://download.com.com/3000-2417-10205637.html
    • Jobfuscator
  • 18
    • 60749124246 scopus 로고    scopus 로고
    • Conquering calculus the easy road to understanding mathematics
    • W. J. Hane, "Conquering calculus the easy road to understanding mathematics", Peruses publishing, 1998
    • (1998) Peruses publishing
    • Hane, W.J.1
  • 19
    • 60749113189 scopus 로고    scopus 로고
    • Teaching mathematics and its applications
    • Dec
    • K Ming Teo, "Teaching mathematics and its applications", International Journal of the IMA, Volume 21 Issue 4, Dec 2002
    • (2002) International Journal of the IMA , vol.21 , Issue.4
    • Ming Teo, K.1
  • 20
    • 60749118396 scopus 로고    scopus 로고
    • Advanced Calculus a Friendly Approach
    • W.A.J. Kosmala, "Advanced Calculus a Friendly Approach", Prentice Hall, 1998
    • (1998) Prentice Hall
    • Kosmala, W.A.J.1
  • 21
    • 1242304439 scopus 로고    scopus 로고
    • Protecting Java Code via Code Obfuscation
    • Spring
    • D. Low, "Protecting Java Code via Code Obfuscation", ACM Crossroads Student Magazine, Spring 1998
    • (1998) ACM Crossroads Student Magazine
    • Low, D.1
  • 22
    • 0003482564 scopus 로고    scopus 로고
    • Information Hiding Techniques for Steganography and Digital Watermarking
    • Artech House
    • S. Katzenbeisser, "Information Hiding Techniques for Steganography and Digital Watermarking", Boston Artech House, 2000
    • (2000) Boston
    • Katzenbeisser, S.1
  • 23
    • 0004046658 scopus 로고    scopus 로고
    • Taxonomy of Obfuscation Transformations
    • Technical Report #148, July
    • C. Collberg, C. Thomborson and D. Low, "Taxonomy of Obfuscation Transformations", Technical Report #148, July 1997
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 24
    • 60749107016 scopus 로고    scopus 로고
    • Cryptography and Data Security Lecture notes
    • Department of Computer Science
    • L. Ertaul, "Cryptography and Data Security Lecture notes", CSU-Hayward Department of Computer Science, http://www.mcs.csuhayward. edu/~lertaul/CS6520CourseWI NTER2005.html
    • CSU-Hayward
    • Ertaul, L.1
  • 25
    • 60749113479 scopus 로고    scopus 로고
    • Making, Breaking Codes: An Introduction to Cryptology
    • Upper Saddle River, NJ
    • P. Garrett, "Making, Breaking Codes: An Introduction to Cryptology", Prentice Hall, Upper Saddle River, NJ, 2001
    • (2001) Prentice Hall
    • Garrett, P.1
  • 29
    • 85176685655 scopus 로고    scopus 로고
    • C. Collberg, P. Clark, Breaking abstractions and structuring data structures, IEEE Computer Language ICCL'98
    • C. Collberg, P. Clark, "Breaking abstractions and structuring data structures", IEEE Computer Language ICCL'98


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.