-
3
-
-
0028532579
-
Why cryptosystems fail
-
Nov
-
R. Anderson, ?Why Cryptosystems Fail, ? Comm. ACM, vol. 37, no. 11, Nov. 1994
-
(1994)
Comm ACM
, vol.37
, Issue.11
-
-
Anderson, R.1
-
4
-
-
0027542367
-
Layout reconstruction of complex silicon chips
-
Feb
-
S. Blythe, B. Fraboni, S. Lall, H. Ahmed, and U. Riu, ?Layout Reconstruction of Complex Silicon Chips, ? IEEE J. Solid-State Circuits, vol. 28, no. 2, Feb. 1993
-
(1993)
IEEE J. Solid-State Circuits
, vol.28
, Issue.2
-
-
Blythe, S.1
Fraboni, B.2
Lall, S.3
Ahmed, H.4
Riu, U.5
-
6
-
-
0012037951
-
Software tamper resistance: Obstructing static analysis of programs
-
Univ. of Virginia
-
C. Wang, J. Hill, J. Knight, and J. Davidson, ?Software Tamper Resistance: Obstructing Static Analysis of Programs, ? technical report, Dept. of Computer Science, Univ. of Virginia, 2000
-
(2000)
Technical Report, Dept. of Computer Science
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
7
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
July
-
C. Wang, J. Hill, J. Knight, and J. Davidson, ?Protection of Software-Based Survivability Mechanisms, ? Proc. Int?l Conf. Dependable Systems and Networks, July 2001
-
(2001)
Proc. Int?l Conf. Dependable Systems and Networks
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
9
-
-
0029214558
-
Designing programs that check their work
-
M. Blum and S. Kannan, ?Designing Programs that Check Their Work, ? J. ACM, vol. 42, no. 1, 1995
-
(1995)
J ACM
, vol.42
, Issue.1
-
-
Blum, M.1
Kannan, S.2
-
10
-
-
0031274275
-
Software reliability via run-time result-checking
-
H. Wasserman and M. Blum, ?Software Reliability via Run-Time Result-Checking, ? J. ACM, vol. 44, no. 6, 1997
-
(1997)
J ACM
, vol.44
, Issue.6
-
-
Wasserman, H.1
Blum, M.2
-
11
-
-
84874031635
-
Spot-checkers
-
May
-
F. Ergun, S. Kannan, S.R. Kumar, R. Rubinfeld, and M. Vishwanathan, ?Spot-Checkers, ? Proc. ACM Symp. Theory of Computing (STOC ?98), May 1998
-
(1998)
Proc ACM Symp. Theory of Computing (STOC ?98)
-
-
Ergun, F.1
Kannan, S.2
Kumar, S.R.3
Rubinfeld, R.4
Vishwanathan, M.5
-
12
-
-
84955621400
-
Tamper resistant software: An implementation
-
Springer-Verlag
-
D. Aucsmith, ?Tamper Resistant Software: An Implementation, ? Information Hiding, pp. 317-333, Springer-Verlag, 1996
-
(1996)
Information Hiding
, pp. 317-333
-
-
Aucsmith, D.1
-
13
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation-tools for software protection
-
Aug
-
C.S. Collberg and C. Thomborson, ?Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection, ? IEEE, Trans. Software Eng., vol. 28, no. 8, Aug. 2002
-
(2002)
IEEE Trans. Software Eng
, vol.28
, Issue.8
-
-
Collberg, C.S.1
Thomborson, C.2
-
14
-
-
4344678198
-
Dynamic self-checking techniques for improved tamper resistance
-
MAY/JUNE
-
B. Horne, L. Matheson, C. Sheehan, and R.E. Tarjan, ?Dynamic Self-Checking Techniques for Improved Tamper Resistance, ? Proc. First ACM Workshop Digital Rights Management (DRM), pp. 141-159, 2002, 308 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 3, MAY/JUNE 2005
-
(2005)
Proc. First ACM Workshop Digital Rights Management (DRM) 2002, 308 IEEE TRANSACTIONS on MOBILE COMPUTING
, vol.4
, Issue.3
, pp. 141-159
-
-
Horne, B.1
Matheson, L.2
Sheehan, C.3
Tarjan, R.E.4
-
16
-
-
85026761935
-
On the (im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, ?On the (Im)possibility of Obfuscating Programs, ? Proc. 21st Ann. IACR Crypto Conf., 2001. Functions, ? Comm. Algebra, vol. 27, no. 5, 1999
-
(1999)
Proc. 21st Ann. IACR Crypto Conf 2001 Functions, ? Comm. Algebra
, vol.27
, Issue.5
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
17
-
-
0011255179
-
Introducing trusted third parties to the mobile agent paradigm
-
LNCS 1603, Springer-Verlag
-
U.G. Wilhelm, S. Staamann, and L. Buttyan, ?Introducing Trusted Third Parties to the Mobile Agent Paradigm, ? Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS 1603, Springer-Verlag, 1999
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
-
-
Wilhelm, U.G.1
Staamann, S.2
Buttyan, L.3
-
18
-
-
0002717089
-
Cryptographic traces for mobile agents
-
G. Vigna, ?Cryptographic Traces for Mobile Agents, ? Mobile Agents and Security, 1998
-
(1998)
Mobile Agents and Security
-
-
Vigna, G.1
-
19
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
F. Hohl, ?Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts, ? Mobile Agents and Security, 1998
-
(1998)
Mobile Agents and Security
-
-
Hohl, F.1
-
22
-
-
19944369062
-
Soft tamper-proofing via program integrity verification in wireless sensor networks
-
May/June
-
Taejoon Park, Kang G. Shin, ?Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks?, IEEE Transactions on mobile computing, VOL. 4, NO. 3, May/June 2005
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.3
-
-
Park, T.1
Shin, K.G.2
-
23
-
-
85026766895
-
-
Squawk Project
-
Squawk Project, http://labs.oracle.com/projects/squawk/
-
-
-
-
24
-
-
85026732286
-
-
Nergal The advanced return-into-lib(c) exploits (PaX case . Phrack Magazine
-
Nergal. The advanced return-into-lib(c) exploits (PaX case . Phrack Magazine.)
-
-
-
-
30
-
-
33745137852
-
Accurate prediction of power consumption in sensor networks
-
O. Landsiedel, K. Wehrle, and S. Gotz, ?Accurate prediction of power consumption in sensor networks, ? in Proc. 2nd IEEE Workshop on Embedded Networked Sensors (EmNetS-II). IEEE Computer Society, 2005, pp. 37-44
-
(2005)
Proc. 2nd IEEE Workshop on Embedded Networked Sensors (EmNetS-II). IEEE Computer Society
, pp. 37-44
-
-
Landsiedel, O.1
Wehrle, K.2
Gotz, S.3
-
31
-
-
33744909363
-
Avrora: Scalable sensor network simulation with precise timing
-
B. L. Titzer, D. K. Lee, and J. Palsberg, ?Avrora: scalable sensor network simulation with precise timing, ? in Proc. 4th Int?l Conf. Information Processing Sensor Networks (IPSN ?05), 2005, p. 67
-
(2005)
Proc. 4th Int?l Conf. Information Processing Sensor Networks (IPSN ?05
, pp. 67
-
-
Titzer, B.L.1
Lee, D.K.2
Palsberg, J.3
-
32
-
-
85026732869
-
-
http://www.xbow.com
-
-
-
|