Results 241 to 250 of about 19,937 (276)
Some of the next articles are maybe not open access.

Hopes, fears, and software obfuscation

Communications of the ACM, 2016
What does it mean to be secure?
openaire   +1 more source

A New Code Obfuscation Scheme for Software Protection

2014 IEEE 8th International Symposium on Service Oriented System Engineering, 2014
IT industry loses tens of billions of dollars annually from security attacks such as tampering and malicious reverse engineering. Code obfuscation techniques counter such attacks by transforming code into patterns that resist the attacks. None of the current code obfuscation techniques satisfy all the obfuscation effectiveness criteria such as ...
Aniket Kulkarni, Ravindra Metta
openaire   +1 more source

Applications of Homomorphic Functions to Software Obfuscation

2006
As various computers are connected into a world wide network, software is a target of copyright pirates, attackers, or even terrorists, as a result, software protections become a more and more important issue for software users and developers. There are some technical measures for software protections, such as hardware-based protections and software ...
William Zhu 0001   +2 more
openaire   +1 more source

On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors

2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), 2022
The quest of low production cost and short time-tomarket, as well as the complexity of modern integrated circuits pushed towards a globalization of the supply chain of silicon devices. Such production paradigm raised a number of security threats among which Hardware Trojan Horses (HTHs), that became a serious issue not only for academy but also for ...
Cassano, L   +3 more
openaire   +1 more source

A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security

International Journal of Mobile Computing and Multimedia Communications, 2017
Over the past few decades ago, software developers analyzed robustly several forms of software protection against illegal copying or piracy. With the expansion in digital technology, the risk of illegal copying of software also amplifies. The increasing piracy rate has posed a serious threat to software developers leading to the development of various ...
Pratiksha Gautam, Hemraj Saini
openaire   +1 more source

A Survey on Aims and Environments of Diversification and Obfuscation in Software Security

Proceedings of the 17th International Conference on Computer Systems and Technologies 2016, 2016
Diversification and obfuscation methods are promising approaches used to secure software and prevent malware from functioning. Diversification makes each software instance unique so that malware attacks cannot rely on the knowledge of the program's execution environment and/or internal structure anymore. We present a systematic literature review on the
Mäkelä Jari-Matti   +6 more
openaire   +2 more sources

Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation

2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2016
The software puzzle scheme counters resource-inflated Denial-of-Service (DoS) attacks by requiring each client connecting to the server to correctly solve a cryptographic puzzle before a connection can be established. It is specifically designed to thwart attempts at utilizing high-performance Graphic Processing Units (GPUs) to cut down solution time ...
Yongdong Wu   +3 more
openaire   +1 more source

A Software Engineering Methodology for Developing Secure Obfuscated Software

2019
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software.
Carlos Gonzalez, Ernesto Liñan
openaire   +1 more source

Design and implementation of instruction indirection for embedded software obfuscation

Microprocessors and Microsystems, 2016
Tamper-aware use of the Instruction Register File (IRF) is presented.Two heuristic algorithms are presented to find sub-optimal IRF assignments against tampering.For a small IRF, our precision-oriented algorithm obtained the optimal assignments in most cases.Our time-oriented algorithm completed the calculation in 16 milliseconds for a 1024-entry IRF ...
Naoki Fujieda   +2 more
openaire   +1 more source

A Generalized Obfuscation Method to Protect Software of Mobile Apps

2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), 2019
As the world is becoming more mobile, mobile applications (or apps) are an integral part of our everyday personal and professional lives. Despite their unprecedented utility, these apps can pose serious security risks since a lot of critical or sensitive information is contained in the distributed software.
Jingsong Cui   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy