메뉴 건너뛰기




Volumn , Issue , 2006, Pages 47-58

Proteus: Virtualization for diversified tamper-resistance

Author keywords

Copyright protection; Diversity; Intellectual property; Obfuscation; Tamper resistance; Virtualization

Indexed keywords

COMPUTER CRIME; COPYRIGHTS; ELECTRONIC CRIME COUNTERMEASURES; SECURITY OF DATA; VIRTUAL REALITY;

EID: 34547409501     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1179509.1179521     Document Type: Conference Paper
Times cited : (47)

References (41)
  • 2
    • 34547443713 scopus 로고    scopus 로고
    • A model for self-modifying code
    • The 8th Information Hiding Conference, to appear
    • Bertrand Anckaert, Matias Madou, and Koen De Bosschere. A model for self-modifying code. In The 8th Information Hiding Conference, LNCS (to appear), 2006.
    • (2006) LNCS
    • Anckaert, B.1    Madou, M.2    Bosschere, K.D.3
  • 4
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • The 1st Information Hiding Conference, of
    • David Aucsmith. Tamper resistant software: an implementation. In The 1st Information Hiding Conference, volume 1174 of LNCS, pages 317-333, 1996.
    • (1996) LNCS , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 5
    • 0017792448 scopus 로고    scopus 로고
    • Algirdas Avizienis and L Chen. On the implementation of n-version programming for software fault tolerance during execution. In The IEEE Computer Software and Applications Conference, pages 149-155, 1977
    • Algirdas Avizienis and L Chen. On the implementation of n-version programming for software fault tolerance during execution. In The IEEE Computer Software and Applications Conference, pages 149-155, 1977.
  • 8
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Sandeep Bhatkar, Daniel DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In The 12th USENIX Security Symposium, pages 105-120, 2003.
    • (2003) The 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    DuVarney, D.2    Sekar, R.3
  • 10
    • 84959058990 scopus 로고    scopus 로고
    • Protecting software code by guards
    • The 1st ACM Workshop on Digital Eights Management, of
    • Hoi Chang and Mikhail Atallah. Protecting software code by guards. In The 1st ACM Workshop on Digital Eights Management, volume 2320 of LNCS, pages 160-175, 2002.
    • (2002) LNCS , vol.2320 , pp. 160-175
    • Chang, H.1    Atallah, M.2
  • 11
    • 35248822611 scopus 로고    scopus 로고
    • Oblivious hashing: A stealthy software integrity verification primitive
    • The 5th Information Hiding Conference, of
    • Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, and Mariusz Jakubowski. Oblivious hashing: a stealthy software integrity verification primitive. In The 5th Information Hiding Conference, volume 2578 of LNCS, pages 400-414, 2002.
    • (2002) LNCS , vol.2578 , pp. 400-414
    • Chen, Y.1    Venkatesan, R.2    Cary, M.3    Pang, R.4    Sinha, S.5    Jakubowski, M.6
  • 12
    • 14944374640 scopus 로고    scopus 로고
    • Mitigating buffer overflows by operating system randomization
    • Technical Report CMU-CS-02-197, Department of Computer Science, Carnegie Mellon University
    • Monica Chew and Dawn Song. Mitigating buffer overflows by operating system randomization. Technical Report CMU-CS-02-197, Department of Computer Science, Carnegie Mellon University, 2002.
    • (2002)
    • Chew, M.1    Song, D.2
  • 13
    • 84947229190 scopus 로고    scopus 로고
    • An approach to the obfuscation of control-flow of sequential computer programs
    • The 4th Information Security Conference, of
    • Stanley Chow, Yuan Gu, Harold Johnson, and Vladimir Zakharov. An approach to the obfuscation of control-flow of sequential computer programs. In The 4th Information Security Conference, volume 2200 of LNCS, pages 144-155, 2001.
    • (2001) LNCS , vol.2200 , pp. 144-155
    • Chow, S.1    Gu, Y.2    Johnson, H.3    Zakharov, V.4
  • 15
    • 0027684663 scopus 로고
    • Operating system evolution through program evolution
    • Frederick Cohen. Operating system evolution through program evolution. Computers and Security, 12(6):565-584, 1993.
    • (1993) Computers and Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.1
  • 16
    • 3042819306 scopus 로고    scopus 로고
    • Sandmark - a tool for software protection research
    • Christian Collberg, Ginger Myles, and Andrew Huntwork. Sandmark - a tool for software protection research. IEEE Security and Privacy, 1(4):40-49, 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.4 , pp. 40-49
    • Collberg, C.1    Myles, G.2    Huntwork, A.3
  • 18
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - tools for software protection
    • Christian Collberg and Clark Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28(8):735-746, 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 24
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 25
    • 84959055142 scopus 로고    scopus 로고
    • Dynamic self-checking techniques for improved tamper resistance
    • The 1st ACM Workshop on Digital Bights Management, of
    • Bill Home, Lesley Matheson, Casey Sheehan, and Robert Tarjan. Dynamic self-checking techniques for improved tamper resistance. In The 1st ACM Workshop on Digital Bights Management, volume 2320 of LNCS, pages 141-159, 2002.
    • (2002) LNCS , vol.2320 , pp. 141-159
    • Home, B.1    Matheson, L.2    Sheehan, C.3    Tarjan, R.4
  • 26
    • 0345529075 scopus 로고    scopus 로고
    • Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, and Ken ichi Matsumoto. Exploiting self-modification mechanism for program protection. In The 27th Annual International Computer Software and Applications Conference, pages 170-181, 2003
    • Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, and Ken ichi Matsumoto. Exploiting self-modification mechanism for program protection. In The 27th Annual International Computer Software and Applications Conference, pages 170-181, 2003.
  • 30
    • 0041848575 scopus 로고    scopus 로고
    • Preventing piracy, reverse engineering, and tampering
    • Gleb Naumovich and Nasir Memon. Preventing piracy, reverse engineering, and tampering. Computer, 36(7):64-71, 2003.
    • (2003) Computer , vol.36 , Issue.7 , pp. 64-71
    • Naumovich, G.1    Memon, N.2
  • 34
    • 0016829070 scopus 로고
    • System structure for software fault tolerance
    • Brian Randell. System structure for software fault tolerance. SIGPLAN Notices, 10(6):437-449, 1975.
    • (1975) SIGPLAN Notices , vol.10 , Issue.6 , pp. 437-449
    • Randell, B.1
  • 36
    • 21144442036 scopus 로고    scopus 로고
    • Revisiting software protection
    • The 6th Conference on Information Security, of
    • Paul van Oorschot. Revisiting software protection. In The 6th Conference on Information Security, volume 2851 of LNCS, pages 1-13, 2003.
    • (2003) LNCS , vol.2851 , pp. 1-13
    • van Oorschot, P.1
  • 37
    • 34547473265 scopus 로고    scopus 로고
    • Varadarajan and Ramarathnam Venkatesan. Limited obliviousness for data structures and efficient execution of programs
    • Technical report, Microsoft Research
    • Avinash Varadarajan and Ramarathnam Venkatesan. Limited obliviousness for data structures and efficient execution of programs. Technical report, Microsoft Research, 2006.
    • (2006)
    • Avinash1
  • 38
    • 84947285817 scopus 로고    scopus 로고
    • A graph theoretic approach to software watermarking
    • The 4th Information Hiding Conference, of
    • Ramarathnam Venkatesan, Vijay Vazirani, and Saurabh Sinha. A graph theoretic approach to software watermarking. In The 4th Information Hiding Conference, volume 2137 of LNCS, pages 157-168, 2001.
    • (2001) LNCS , vol.2137 , pp. 157-168
    • Venkatesan, R.1    Vazirani, V.2    Sinha, S.3
  • 41
    • 34547467422 scopus 로고    scopus 로고
    • Diversity via code transformations: A solution for NGNA renewable security
    • Yongxin Zhou and Alec Main. Diversity via code transformations: A solution for NGNA renewable security. In NCTA - The National Show, 2006.
    • (2006) NCTA - The National Show
    • Zhou, Y.1    Main, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.