-
2
-
-
34547443713
-
A model for self-modifying code
-
The 8th Information Hiding Conference, to appear
-
Bertrand Anckaert, Matias Madou, and Koen De Bosschere. A model for self-modifying code. In The 8th Information Hiding Conference, LNCS (to appear), 2006.
-
(2006)
LNCS
-
-
Anckaert, B.1
Madou, M.2
Bosschere, K.D.3
-
4
-
-
84955621400
-
Tamper resistant software: An implementation
-
The 1st Information Hiding Conference, of
-
David Aucsmith. Tamper resistant software: an implementation. In The 1st Information Hiding Conference, volume 1174 of LNCS, pages 317-333, 1996.
-
(1996)
LNCS
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
5
-
-
0017792448
-
-
Algirdas Avizienis and L Chen. On the implementation of n-version programming for software fault tolerance during execution. In The IEEE Computer Software and Applications Conference, pages 149-155, 1977
-
Algirdas Avizienis and L Chen. On the implementation of n-version programming for software fault tolerance during execution. In The IEEE Computer Software and Applications Conference, pages 149-155, 1977.
-
-
-
-
6
-
-
34547421445
-
-
Lee Badger, Larry D'Anna, Doug Kilpatrick, Brian Matt, Andrew Reisse, and Tom Van Vleck. Self-protecting mobile agents obfuscation evaluation report, 2001.
-
(2001)
Self-protecting mobile agents obfuscation evaluation report
-
-
Badger, L.1
D'Anna, L.2
Kilpatrick, D.3
Matt, B.4
Reisse, A.5
Van Vleck, T.6
-
7
-
-
16644362894
-
Randomized instruction set emulation
-
3-40
-
Elena Gabriela Barrantes, David Ackley, Stephanie Forrest, and Darko Stefanovi. Randomized instruction set emulation. A CM Transactions on Information and System Security, 8(1):3-40, 2005.
-
(2005)
A CM Transactions on Information and System Security
, vol.8
, Issue.1
-
-
Gabriela Barrantes, E.1
Ackley, D.2
Forrest, S.3
Stefanovi, D.4
-
8
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Sandeep Bhatkar, Daniel DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In The 12th USENIX Security Symposium, pages 105-120, 2003.
-
(2003)
The 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.2
Sekar, R.3
-
10
-
-
84959058990
-
Protecting software code by guards
-
The 1st ACM Workshop on Digital Eights Management, of
-
Hoi Chang and Mikhail Atallah. Protecting software code by guards. In The 1st ACM Workshop on Digital Eights Management, volume 2320 of LNCS, pages 160-175, 2002.
-
(2002)
LNCS
, vol.2320
, pp. 160-175
-
-
Chang, H.1
Atallah, M.2
-
11
-
-
35248822611
-
Oblivious hashing: A stealthy software integrity verification primitive
-
The 5th Information Hiding Conference, of
-
Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, and Mariusz Jakubowski. Oblivious hashing: a stealthy software integrity verification primitive. In The 5th Information Hiding Conference, volume 2578 of LNCS, pages 400-414, 2002.
-
(2002)
LNCS
, vol.2578
, pp. 400-414
-
-
Chen, Y.1
Venkatesan, R.2
Cary, M.3
Pang, R.4
Sinha, S.5
Jakubowski, M.6
-
12
-
-
14944374640
-
Mitigating buffer overflows by operating system randomization
-
Technical Report CMU-CS-02-197, Department of Computer Science, Carnegie Mellon University
-
Monica Chew and Dawn Song. Mitigating buffer overflows by operating system randomization. Technical Report CMU-CS-02-197, Department of Computer Science, Carnegie Mellon University, 2002.
-
(2002)
-
-
Chew, M.1
Song, D.2
-
13
-
-
84947229190
-
An approach to the obfuscation of control-flow of sequential computer programs
-
The 4th Information Security Conference, of
-
Stanley Chow, Yuan Gu, Harold Johnson, and Vladimir Zakharov. An approach to the obfuscation of control-flow of sequential computer programs. In The 4th Information Security Conference, volume 2200 of LNCS, pages 144-155, 2001.
-
(2001)
LNCS
, vol.2200
, pp. 144-155
-
-
Chow, S.1
Gu, Y.2
Johnson, H.3
Zakharov, V.4
-
15
-
-
0027684663
-
Operating system evolution through program evolution
-
Frederick Cohen. Operating system evolution through program evolution. Computers and Security, 12(6):565-584, 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
16
-
-
3042819306
-
Sandmark - a tool for software protection research
-
Christian Collberg, Ginger Myles, and Andrew Huntwork. Sandmark - a tool for software protection research. IEEE Security and Privacy, 1(4):40-49, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 40-49
-
-
Collberg, C.1
Myles, G.2
Huntwork, A.3
-
18
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - tools for software protection
-
Christian Collberg and Clark Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28(8):735-746, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
-
20
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
Christian Collberg, Clark Thomborson, and Douglas Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In The 25th Conference on Principles of Programming Languages, pages 184-196, 1998.
-
(1998)
The 25th Conference on Principles of Programming Languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
22
-
-
34547430763
-
-
Self-protecting mobile agents obfuscation report
-
Larry D'Anna, Brian Matt, Andrew Reisse, Tom Van Vleck, Steve Schwab, and Patric LeBlanc. Self-protecting mobile agents obfuscation report, 2003.
-
(2003)
-
-
D'Anna, L.1
Matt, B.2
Reisse, A.3
Van Vleck, T.4
Schwab, S.5
LeBlanc, P.6
-
24
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Oded Goldreich and Rafail Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
25
-
-
84959055142
-
Dynamic self-checking techniques for improved tamper resistance
-
The 1st ACM Workshop on Digital Bights Management, of
-
Bill Home, Lesley Matheson, Casey Sheehan, and Robert Tarjan. Dynamic self-checking techniques for improved tamper resistance. In The 1st ACM Workshop on Digital Bights Management, volume 2320 of LNCS, pages 141-159, 2002.
-
(2002)
LNCS
, vol.2320
, pp. 141-159
-
-
Home, B.1
Matheson, L.2
Sheehan, C.3
Tarjan, R.4
-
26
-
-
0345529075
-
-
Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, and Ken ichi Matsumoto. Exploiting self-modification mechanism for program protection. In The 27th Annual International Computer Software and Applications Conference, pages 170-181, 2003
-
Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, and Ken ichi Matsumoto. Exploiting self-modification mechanism for program protection. In The 27th Annual International Computer Software and Applications Conference, pages 170-181, 2003.
-
-
-
-
29
-
-
33744935812
-
Software protection through dynamic code mutation
-
Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya Debray, Bjorn De Sutter, and Koen De Bosschere. Software protection through dynamic code mutation. In The 6th International Workshop on Information Security Applications, volume 3786 of LNCS, pages 194-206, 2005.
-
(2005)
The 6th International Workshop on Information Security Applications, volume 3786 of LNCS
, pp. 194-206
-
-
Madou, M.1
Anckaert, B.2
Moseley, P.3
Debray, S.4
Sutter, B.D.5
Bosschere, K.D.6
-
30
-
-
0041848575
-
Preventing piracy, reverse engineering, and tampering
-
Gleb Naumovich and Nasir Memon. Preventing piracy, reverse engineering, and tampering. Computer, 36(7):64-71, 2003.
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 64-71
-
-
Naumovich, G.1
Memon, N.2
-
34
-
-
0016829070
-
System structure for software fault tolerance
-
Brian Randell. System structure for software fault tolerance. SIGPLAN Notices, 10(6):437-449, 1975.
-
(1975)
SIGPLAN Notices
, vol.10
, Issue.6
, pp. 437-449
-
-
Randell, B.1
-
36
-
-
21144442036
-
Revisiting software protection
-
The 6th Conference on Information Security, of
-
Paul van Oorschot. Revisiting software protection. In The 6th Conference on Information Security, volume 2851 of LNCS, pages 1-13, 2003.
-
(2003)
LNCS
, vol.2851
, pp. 1-13
-
-
van Oorschot, P.1
-
37
-
-
34547473265
-
Varadarajan and Ramarathnam Venkatesan. Limited obliviousness for data structures and efficient execution of programs
-
Technical report, Microsoft Research
-
Avinash Varadarajan and Ramarathnam Venkatesan. Limited obliviousness for data structures and efficient execution of programs. Technical report, Microsoft Research, 2006.
-
(2006)
-
-
Avinash1
-
38
-
-
84947285817
-
A graph theoretic approach to software watermarking
-
The 4th Information Hiding Conference, of
-
Ramarathnam Venkatesan, Vijay Vazirani, and Saurabh Sinha. A graph theoretic approach to software watermarking. In The 4th Information Hiding Conference, volume 2137 of LNCS, pages 157-168, 2001.
-
(2001)
LNCS
, vol.2137
, pp. 157-168
-
-
Venkatesan, R.1
Vazirani, V.2
Sinha, S.3
-
39
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
Chenxi Wang, Jack Davidson, Jonathan Hill, and John Knight. Protection of software-based survivability mechanisms. In The 2nd International Conference of Dependable Systems and Networks, pages 193-202, 2001.
-
(2001)
The 2nd International Conference of Dependable Systems and Networks
, pp. 193-202
-
-
Wang, C.1
Davidson, J.2
Hill, J.3
Knight, J.4
-
41
-
-
34547467422
-
Diversity via code transformations: A solution for NGNA renewable security
-
Yongxin Zhou and Alec Main. Diversity via code transformations: A solution for NGNA renewable security. In NCTA - The National Show, 2006.
-
(2006)
NCTA - The National Show
-
-
Zhou, Y.1
Main, A.2
|