-
1
-
-
9144272378
-
-
Business Software Alliance and International Data Corporation
-
Business Software Alliance and International Data Corporation. Annual BSA and IDC global software piracy study (2004-2006) http://www.bsa.org/globalstudy
-
(2004)
Annual BSA and IDC global software piracy study
-
-
-
2
-
-
84955621400
-
Tamper resistant software: An implementation
-
Aucsmith, D.: Tamper resistant software: An implementation. In: First Information Hiding Workshop, pp. 317-333 (1996)
-
(1996)
First Information Hiding Workshop
, pp. 317-333
-
-
Aucsmith, D.1
-
3
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
6
-
-
33745803485
-
High assurance computing on open hardware architectures
-
MSR-TR-2003-20, Microsoft Research, Microsoft Corporation, Redmond, Washington, USA March
-
Chen, Y., England, P., Peinado, M., Willman, B.: High assurance computing on open hardware architectures. Research Report MSR-TR-2003-20, Microsoft Research, Microsoft Corporation, Redmond, Washington, USA (March 2003)
-
(2003)
Research Report
-
-
Chen, Y.1
England, P.2
Peinado, M.3
Willman, B.4
-
7
-
-
35248822611
-
Oblivious hashing: A stealthy software integrity verification primitive
-
Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.H.: Oblivious hashing: A stealthy software integrity verification primitive. In: Information Hiding Workshop, pp. 400-414 (2002)
-
(2002)
Information Hiding Workshop
, pp. 400-414
-
-
Chen, Y.1
Venkatesan, R.2
Cary, M.3
Pang, R.4
Sinha, S.5
Jakubowski, M.H.6
-
8
-
-
84947229190
-
An approach to the obfuscation of control-flow of sequential computer programs
-
Chow, S., Gu, Y., Johnson, H., Zakharov, V.A.: An approach to the obfuscation of control-flow of sequential computer programs. In: Information Security, 4th International Conference, pp. 144-155 (2001)
-
(2001)
Information Security, 4th International Conference
, pp. 144-155
-
-
Chow, S.1
Gu, Y.2
Johnson, H.3
Zakharov, V.A.4
-
9
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Technical Report 148, Department of Computer Science, University of Auckland July
-
Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science, University of Auckland (July 1997)
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation-tools for software protection
-
Collberg, C.S., Thomborson, C.D.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Trans. Software Eng. 28(8), 735-746 (2002)
-
(2002)
IEEE Trans. Software Eng
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.D.2
-
11
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
Collberg, C.S., Thomborson, C.D., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: ACM Symposium on Principles of Programming Languages (POPL), pp. 184-196 (1998)
-
(1998)
ACM Symposium on Principles of Programming Languages (POPL)
, pp. 184-196
-
-
Collberg, C.S.1
Thomborson, C.D.2
Low, D.3
-
12
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. Journal of the ACM 43(3), 431-473 (1996)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
13
-
-
4344678198
-
Dynamic self-checking techniques for improved tamper resistance
-
Home, B., Matheson, L.R., Sheehan, C., Tarjan, R.E.: Dynamic self-checking techniques for improved tamper resistance. In: Digital Rights Management Workshop, pp. 141-159 (2001)
-
(2001)
Digital Rights Management Workshop
, pp. 141-159
-
-
Home, B.1
Matheson, L.R.2
Sheehan, C.3
Tarjan, R.E.4
-
14
-
-
38049181069
-
-
http://cdfreaks.com (2006)
-
(2006)
-
-
-
15
-
-
35048895442
-
Positive results and techniques for obfuscation
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 20-39
-
-
Lynn, B.1
Prabhakaran, M.2
Sahai, A.3
-
17
-
-
33646445517
-
-
Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, 3108, pp. 86-97. Springer, Heidelberg (2004)
-
Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 86-97. Springer, Heidelberg (2004)
-
-
-
-
18
-
-
84984040471
-
A second-order bug with delayed effect
-
Pyle, I.C., McLatchie, R.C.F., Grandage, B.: A second-order bug with delayed effect. Software - Practice and Experience 1(3), 231-233 (1971)
-
(1971)
Software - Practice and Experience
, vol.1
, Issue.3
, pp. 231-233
-
-
Pyle, I.C.1
McLatchie, R.C.F.2
Grandage, B.3
-
19
-
-
0012037951
-
Software tamper resistance: Obstructing static analysis of programs
-
Technical Report CS-2000-12, University of Virginia December
-
Wang, C., Hill, J., Knight, J., Davidson, J.: Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12, University of Virginia (December 2000)
-
(2000)
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
20
-
-
33745541383
-
On obfuscating point functions. Cryptology ePrint Archive
-
Report 2005 /001
-
Wee, H.: On obfuscating point functions. Cryptology ePrint Archive, Report 2005 /001 (2005) http://eprint.iacr.org/
-
(2005)
-
-
Wee, H.1
|