-
1
-
-
38849130111
-
-
Cloakware. http://www.cloakware.com.
-
Cloakware
-
-
-
2
-
-
38849123652
-
-
Dotfuscator. http://www.preemptive.com/products/ dotfuscator.
-
Dotfuscator
-
-
-
3
-
-
38849124976
-
-
Safedisc. http://www.macrovision.com/products/ safedisc.
-
Safedisc
-
-
-
4
-
-
38849173181
-
-
SpecCPU benchmark
-
SpecCPU benchmark, http://www.spec.org.
-
-
-
-
8
-
-
0012038522
-
Tamper-resistant software: An implementation
-
D. Aucsmith. Tamper-resistant software: An implementation. In Information Hiding, 1996.
-
(1996)
Information Hiding
-
-
Aucsmith, D.1
-
9
-
-
0011188089
-
On the (im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In CRYPTO 2001.
-
CRYPTO 2001
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
11
-
-
0003130498
-
On the importance of checking cryptographic protocols for faults
-
D. Boneh and R. Lipton. On the importance of checking cryptographic protocols for faults. In Eurocrypt 1997.
-
Eurocrypt 1997
-
-
Boneh, D.1
Lipton, R.2
-
14
-
-
0345381603
-
Oblivious hashing: A stealthy software integrity verification primitive
-
Y. Chen, R. Venkatesan, M. Cary, R. Pang, S. Sinha, and M. H. Jakubowski. Oblivious hashing: A stealthy software integrity verification primitive. In Information Hiding 2002.
-
Information Hiding 2002
-
-
Chen, Y.1
Venkatesan, R.2
Cary, M.3
Pang, R.4
Sinha, S.5
Jakubowski, M.H.6
-
18
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Principles of Programming Languages 1998, POPL'98, pages 184-196, 1998.
-
(1998)
Principles of Programming Languages 1998, POPL'98
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
19
-
-
14344262813
-
Obfuscation of executable code to improve resistance to static disassembly
-
S. Debray and C. Linn. Obfuscation of executable code to improve resistance to static disassembly. In CCS 2003.
-
CCS 2003
-
-
Debray, S.1
Linn, C.2
-
21
-
-
0042349623
-
-
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. Computer, 36(7):55-62, 2003.
-
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. Computer, 36(7):55-62, 2003.
-
-
-
-
24
-
-
38849130752
-
-
Personal communication
-
W. H. Gates. Personal communication.
-
-
-
Gates, W.H.1
-
25
-
-
33846272389
-
Strengthening software self-checksumming via self-modifying code
-
Washington, DC, USA, IEEE Computer Society
-
J. T. Giffin, M. Christodorescu, and L. Kruger. Strengthening software self-checksumming via self-modifying code. In ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference, pages 23-32, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 23-32
-
-
Giffin, J.T.1
Christodorescu, M.2
Kruger, L.3
-
29
-
-
38849095349
-
Protecting digital goods using oblivious checking,
-
US Patent No. 7,080,257, filed on Aug. 30, 2000, granted on July 18, 2006
-
M. H. Jakubowski and R. Venkatesan. Protecting digital goods using oblivious checking, US Patent No. 7,080,257, filed on Aug. 30, 2000, granted on July 18, 2006.
-
-
-
Jakubowski, M.H.1
Venkatesan, R.2
-
30
-
-
0001297528
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Crypto 1996.
-
Crypto 1996
-
-
Kocher, P.1
-
34
-
-
38849186122
-
Architectural support for copy and tamper-resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper-resistant software. In ASPLOS-IX.
-
ASPLOS-IX
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
39
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doom, and P. Khosla. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In SOSP 2005.
-
SOSP 2005
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doom, L.5
Khosla, P.6
-
42
-
-
0004349103
-
Vulcan - binary transformation in a distributed environment
-
Technical Report MSR-TR-2001-50, MSR
-
A. Srivastava, A. Edwards, and H. Vo. Vulcan - binary transformation in a distributed environment. Technical Report MSR-TR-2001-50, MSR, 2001.
-
(2001)
-
-
Srivastava, A.1
Edwards, A.2
Vo, H.3
-
45
-
-
0012037951
-
Software tamper resistance: Obstructing static analysis of programs
-
Technical Report CS-2000-12, University of Virginia, Dec
-
C. Wang, J. Hill, J. Knight, and J. Davidson. Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12, University of Virginia, Dec. 2000.
-
(2000)
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
46
-
-
33745541383
-
On obfuscating point functions
-
H. Wee. On obfuscating point functions. In STOC 2005.
-
STOC 2005
-
-
Wee, H.1
-
48
-
-
12844260675
-
Hide: An infrastructure for efficiently protecting information leakage on the address bus
-
X. Zhuang, T. Zhang, and S. Pande. Hide: An infrastructure for efficiently protecting information leakage on the address bus. In ASPLOS-XI.
-
ASPLOS-XI
-
-
Zhuang, X.1
Zhang, T.2
Pande, S.3
|