-
1
-
-
38149032860
-
Run-time randomization to mitigate tampering
-
Berlin, Oct.
-
B. Anckaert, M. Jakubowski, R. Venkatesan, and K. D. Bosschere. Run-time randomization to mitigate tampering. In Proceedings of the second International Workshop on Security, number 4752, pages 153-168, Berlin, Oct. 2007.
-
(2007)
Proceedings of the Second International Workshop on Security
, Issue.4752
, pp. 153-168
-
-
Anckaert, B.1
Jakubowski, M.2
Venkatesan, R.3
Bosschere, K.D.4
-
4
-
-
84955621400
-
Tamper resistant software: An implementation
-
R. J. Anderson, editor. Springer-Verlag, May
-
D. Aucsmith. Tamper resistant software: An implementation. In R. J. Anderson, editor, Information Hiding, pages 317-333. Springer-Verlag, May 1996.
-
(1996)
Information Hiding
, pp. 317-333
-
-
Aucsmith, D.1
-
5
-
-
16644362894
-
Randomized instruction set emulation
-
DOI 10.1145/1053283.1053286
-
E. G. Barrantes, D. H. Ackley, S. Forrest, and D. Stefanovic. Randomized instruction set emulation. ACM Transactions on Information and System Security (TISSEC), 8(1):3-40, Feb. 2005. (Pubitemid 40479428)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovic, D.4
-
6
-
-
79952172643
-
Codebender: Remote software protection using orthogonal replacement
-
M. Ceccato and P. Tonella. Codebender: Remote software protection using orthogonal replacement. IEEE Software, 28(2):28-34, 2011.
-
(2011)
IEEE Software
, vol.28
, Issue.2
, pp. 28-34
-
-
Ceccato, M.1
Tonella, P.2
-
10
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
Jan.
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In POPL'98, Jan. 1998.
-
(1998)
POPL'98
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
11
-
-
14944350676
-
Self-protecting mobile agents obfuscation report - Final report
-
June
-
L.D'Anna, B.Matt, A. Reisse, T.V. Vleck, S. Schwab, and P. LeBlanc. Self-protecting mobile agents obfuscation report - Final report. Technical Report 03-015, NAI Labs, June 2003.
-
(2003)
Technical Report 03-015, NAI Labs
-
-
D'anna, L.1
Matt, B.2
Reisse, A.3
Vleck, T.V.4
Schwab, S.5
Leblanc, P.6
-
12
-
-
84954462346
-
A practical implementation of the timing attack
-
J.-F. Dhem, F. Koeune, P.-A. Leroux, P. Mestré, J.-J. Quisquater, and J.-L. Willems. A practical implementation of the timing attack. In CARDIS, pages 167-182, 1998.
-
(1998)
CARDIS
, pp. 167-182
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestré, P.4
Quisquater, J.-J.5
Willems, J.-L.6
-
13
-
-
84976675319
-
Stack caching for interpreters
-
M. A. Ertl. Stack caching for interpreters. SIGPLAN Not., 30(6):315-327, 1995.
-
(1995)
SIGPLAN Not.
, vol.30
, Issue.6
, pp. 315-327
-
-
Ertl, M.A.1
-
18
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Mobile Agents and Security
-
F. Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. In Mobile Agents and Security, pages 92-113, 1998. (Pubitemid 128104564)
-
(1998)
Lecture Notes in Computer Science
, Issue.1419
, pp. 92-113
-
-
Hohl, F.1
-
19
-
-
35248901117
-
Discouraging software piracy using software aging
-
M. Jakobsson and M. K. Reiter. Discouraging software piracy using software aging. In DRM Workshop, pages 1-12, 2001.
-
(2001)
DRM Workshop
, pp. 1-12
-
-
Jakobsson, M.1
Reiter, M.K.2
-
20
-
-
84959039613
-
CIL: Intermediate language and tools for analysis and transformation of C programs
-
Grenoble
-
G. C. Necula, S. Mcpeak, S. P. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In Compiler Construction, pages 213-228, Grenoble, 2002.
-
(2002)
Compiler Construction
, pp. 213-228
-
-
Necula, G.C.1
McPeak, S.2
Rahul, S.P.3
Weimer, W.4
-
21
-
-
84872110094
-
Optimizing ANSI C with superoperators
-
ACM Press, Jan.
-
T. Proebsting. Optimizing ANSI C with superoperators. In POPL'96. ACM Press, Jan. 1996.
-
(1996)
POPL'96
-
-
Proebsting, T.1
-
23
-
-
27244434460
-
Design and implementation of a tcg-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a tcg-based integrity measurement architecture. In SSYM'04, pages 16-16, 2004.
-
(2004)
SSYM'04
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
24
-
-
49049113110
-
Application-oriented trust in distributed computing
-
R. Scandariato, Y. Ofek, P. Falcarin, and M. Baldi. Application-oriented trust in distributed computing. Availability, Reliability and Security, International Conference on, 0:434-439, 2008.
-
(2008)
Availability, Reliability and Security, International Conference on
, pp. 434-439
-
-
Scandariato, R.1
Ofek, Y.2
Falcarin, P.3
Baldi, M.4
-
27
-
-
33845427178
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
DOI 10.1145/1095809.1095812
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. SIGOPS Oper. Syst. Rev., 39(5):1-16, 2005. (Pubitemid 44892201)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 1-16
-
-
Seshadri, A.1
Perrig, A.2
Luk, M.3
Van Doom, L.4
Shi, E.5
Khosla, P.6
-
28
-
-
78651389253
-
Detecting malware variants via function-call graph similarity
-
Oct.
-
S. Shang, N. Zheng, J. Xu, M. Xu, and H. Zhang. Detecting malware variants via function-call graph similarity. In MALWARE, pages 113 -120, Oct. 2010.
-
(2010)
MALWARE
, pp. 113-120
-
-
Shang, S.1
Zheng, N.2
Xu, J.3
Xu, M.4
Zhang, H.5
-
29
-
-
29144524010
-
Mutatis mutandis: Safe and predictable dynamic software updating
-
ACM
-
G. Stoyle, M. Hicks, G. Bierman, P. Sewell, and I. Neamtiu. Mutatis mutandis: safe and predictable dynamic software updating. In POPL '05, pages 183-194. ACM, 2005.
-
(2005)
POPL '05
, pp. 183-194
-
-
Stoyle, G.1
Hicks, M.2
Bierman, G.3
Sewell, P.4
Neamtiu, I.5
-
30
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
C. Wang, J. Hill, J. Knight, and J. Davidson. Protection of software-based survivability mechanisms. Dsn, 00:0193, 2001.
-
(2001)
Dsn
, pp. 0193
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
|