-
1
-
-
84955621400
-
Tamper resistant software: An implementation
-
Anderson, R, ed, Information Hiding, Springer, Heidelberg
-
Aucsmith, D.: Tamper resistant software: an implementation. In: Anderson, R. (ed.) Information Hiding. LNCS, vol. 1174, pp. 317-333. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
3
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Kilián, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilián, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
5
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Canetti, R.: Towards realizing random oracles: hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
8
-
-
84947229190
-
An approach to obfuscation of control-flow of sequential programs
-
Wilhelm, R, ed, Informatics, Springer, Heidelberg
-
Chow, S., Gu, Y., Johnson, H., Zakharov, V.: An approach to obfuscation of control-flow of sequential programs. In: Wilhelm, R. (ed.) Informatics. LNCS, vol. 2000, pp. 144-155. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2000
, pp. 144-155
-
-
Chow, S.1
Gu, Y.2
Johnson, H.3
Zakharov, V.4
-
9
-
-
0027684663
-
Operating system protection through program evolution
-
Cohen, F.: Operating system protection through program evolution. Computers and Security 12(6), 565-584 (1993)
-
(1993)
Computers and Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
10
-
-
0004046658
-
A Taxonomy of Obfuscating Transformations
-
Tech. Report, N 148, Univ. of Auckland
-
Collberg, C., Thomborson, C., Low, D.: A Taxonomy of Obfuscating Transformations. Tech. Report, N 148, Univ. of Auckland (1997)
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
11
-
-
0031649930
-
Manufacturing cheap, resilient and stealthy opaque constructs
-
Collberg, C., Thomborson, C., Low, D., Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient and stealthy opaque constructs. In: Symposium on Principles of Programming Languages, pp. 184-196 (1998)
-
(1998)
Symposium on Principles of Programming Languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
Collberg, C.4
Thomborson, C.5
Low, D.6
-
12
-
-
0036704573
-
Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection
-
Collberg, C., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. IEEE Transactions on Software Engineering 28(6) (2002)
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.6
-
-
Collberg, C.1
Thomborson, C.2
-
13
-
-
26444541676
-
Semantic-based code obfuscation by abstract interpretation
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Dalla Preda, M., Giacobazzi, R.: Semantic-based code obfuscation by abstract interpretation. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 1325-1336. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 1325-1336
-
-
Dalla Preda, M.1
Giacobazzi, R.2
-
14
-
-
14944350676
-
-
Report #03-015, Network Associates Laboratories June
-
D'Anna, L., Matt, B., Reisse, A., Van Vleck, T., Schwab, S., LeBlanc, P.: Self- Protecting Mobile Agents Obfuscation Report, Report #03-015, Network Associates Laboratories (June 2003)
-
(2003)
Self- Protecting Mobile Agents Obfuscation Report
-
-
D'Anna, L.1
Matt, B.2
Reisse, A.3
Van Vleck, T.4
Schwab, S.5
LeBlanc, P.6
-
19
-
-
38049015775
-
-
Goldwasser, S., Rothblum, G.N.: On best possible obfuction. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 194-213. Springer, Heidelberg (2007)
-
Goldwasser, S., Rothblum, G.N.: On best possible obfuction. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194-213. Springer, Heidelberg (2007)
-
-
-
-
20
-
-
84937414062
-
Zero-knowledge and code obfuscation
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Hada, S.: Zero-knowledge and code obfuscation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 443-457. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 443-457
-
-
Hada, S.1
-
21
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Vigna, G, ed, Mobile Agents and Security, Springer, Heidelberg
-
Hohl, F.: Time limited blackbox security: protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92-113. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
22
-
-
38049056625
-
-
Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for cryptographic purpose. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 214-232. Springer, Heidelberg (2007)
-
Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for cryptographic purpose. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 214-232. Springer, Heidelberg (2007)
-
-
-
-
24
-
-
35048895442
-
Positive results and techniques for obfuscation
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 20-39
-
-
Lynn, B.1
Prabhakaran, M.2
Sahai, A.3
-
25
-
-
0041475743
-
Software obfuscation on a theoretical basis and its implementation
-
Ogiso, T., Sakabe, Y., Soshi, M., Miyaji, A.: Software obfuscation on a theoretical basis and its implementation. IEEE Trans. Fundamentals E86-A(1) (2003)
-
(2003)
IEEE Trans. Fundamentals
, vol.E86-A
, Issue.1
-
-
Ogiso, T.1
Sakabe, Y.2
Soshi, M.3
Miyaji, A.4
-
26
-
-
33745177806
-
Private searching on streaming data
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Ostrovsky, R., Skeith, W.E.: Private searching on streaming data. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 223-240. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 223-240
-
-
Ostrovsky, R.1
Skeith, W.E.2
-
28
-
-
0021518106
-
A theory of learnable
-
Valiant, L.: A theory of learnable. Communications of the ACM 27(11), 1134-1142 (1984)
-
(1984)
Communications of the ACM
, vol.27
, Issue.11
, pp. 1134-1142
-
-
Valiant, L.1
-
29
-
-
33244496918
-
-
Varnovsky, N.P., Zakharov, V.A.: On the possibility of provably secure obfuscating programs. In: Broy, M., Zamulin, A.V. (eds.) PSI 2003. LNCS, 2890, pp. 91-102. Springer, Heidelberg (2004)
-
Varnovsky, N.P., Zakharov, V.A.: On the possibility of provably secure obfuscating programs. In: Broy, M., Zamulin, A.V. (eds.) PSI 2003. LNCS, vol. 2890, pp. 91-102. Springer, Heidelberg (2004)
-
-
-
-
31
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
Wang, C., Davidson, J., Hill, J., Knight, J.: Protection of software-based survivability mechanisms. In: International Conference of Dependable Systems and Networks (2001)
-
(2001)
International Conference of Dependable Systems and Networks
-
-
Wang, C.1
Davidson, J.2
Hill, J.3
Knight, J.4
|