메뉴 건너뛰기




Volumn 4437 LNCS, Issue , 2007, Pages 216-231

Delayed and controlled failures in tamper-resistant software

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; NUMERICAL METHODS; PROBABILISTIC LOGICS; PROBLEM SOLVING; RESPONSE TIME (COMPUTER SYSTEMS);

EID: 38049096323     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74124-4_15     Document Type: Conference Paper
Times cited : (16)

References (20)
  • 1
    • 9144272378 scopus 로고    scopus 로고
    • Business Software Alliance and International Data Corporation
    • Business Software Alliance and International Data Corporation. Annual BSA and IDC global software piracy study (2004-2006) http://www.bsa.org/globalstudy
    • (2004) Annual BSA and IDC global software piracy study
  • 2
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • Aucsmith, D.: Tamper resistant software: An implementation. In: First Information Hiding Workshop, pp. 317-333 (1996)
    • (1996) First Information Hiding Workshop , pp. 317-333
    • Aucsmith, D.1
  • 3
    • 79251578513 scopus 로고    scopus 로고
    • On the (im)possibility of obfuscating programs
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 6
    • 33745803485 scopus 로고    scopus 로고
    • High assurance computing on open hardware architectures
    • MSR-TR-2003-20, Microsoft Research, Microsoft Corporation, Redmond, Washington, USA March
    • Chen, Y., England, P., Peinado, M., Willman, B.: High assurance computing on open hardware architectures. Research Report MSR-TR-2003-20, Microsoft Research, Microsoft Corporation, Redmond, Washington, USA (March 2003)
    • (2003) Research Report
    • Chen, Y.1    England, P.2    Peinado, M.3    Willman, B.4
  • 9
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Technical Report 148, Department of Computer Science, University of Auckland July
    • Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland (July 1997)
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 10
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation-tools for software protection
    • Collberg, C.S., Thomborson, C.D.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Trans. Software Eng. 28(8), 735-746 (2002)
    • (2002) IEEE Trans. Software Eng , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.S.1    Thomborson, C.D.2
  • 12
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the ACM 43(3), 431-473 (1996)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 14
    • 38049181069 scopus 로고    scopus 로고
    • http://cdfreaks.com (2006)
    • (2006)
  • 15
    • 35048895442 scopus 로고    scopus 로고
    • Positive results and techniques for obfuscation
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 20-39
    • Lynn, B.1    Prabhakaran, M.2    Sahai, A.3
  • 17
    • 33646445517 scopus 로고    scopus 로고
    • Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, 3108, pp. 86-97. Springer, Heidelberg (2004)
    • Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 86-97. Springer, Heidelberg (2004)
  • 19
    • 0012037951 scopus 로고    scopus 로고
    • Software tamper resistance: Obstructing static analysis of programs
    • Technical Report CS-2000-12, University of Virginia December
    • Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12, University of Virginia (December 2000)
    • (2000)
    • Wang, C.1    Hill, J.2    Knight, J.3    Davidson, J.4
  • 20
    • 33745541383 scopus 로고    scopus 로고
    • On obfuscating point functions. Cryptology ePrint Archive
    • Report 2005 /001
    • Wee, H.: On obfuscating point functions. Cryptology ePrint Archive, Report 2005 /001 (2005) http://eprint.iacr.org/
    • (2005)
    • Wee, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.