Results 241 to 250 of about 19,937 (276)
Some of the next articles are maybe not open access.
Hopes, fears, and software obfuscation
Communications of the ACM, 2016What does it mean to be secure?
openaire +1 more source
A New Code Obfuscation Scheme for Software Protection
2014 IEEE 8th International Symposium on Service Oriented System Engineering, 2014IT industry loses tens of billions of dollars annually from security attacks such as tampering and malicious reverse engineering. Code obfuscation techniques counter such attacks by transforming code into patterns that resist the attacks. None of the current code obfuscation techniques satisfy all the obfuscation effectiveness criteria such as ...
Aniket Kulkarni, Ravindra Metta
openaire +1 more source
Applications of Homomorphic Functions to Software Obfuscation
2006As various computers are connected into a world wide network, software is a target of copyright pirates, attackers, or even terrorists, as a result, software protections become a more and more important issue for software users and developers. There are some technical measures for software protections, such as hardware-based protections and software ...
William Zhu 0001 +2 more
openaire +1 more source
On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors
2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), 2022The quest of low production cost and short time-tomarket, as well as the complexity of modern integrated circuits pushed towards a globalization of the supply chain of silicon devices. Such production paradigm raised a number of security threats among which Hardware Trojan Horses (HTHs), that became a serious issue not only for academy but also for ...
Cassano, L +3 more
openaire +1 more source
A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security
International Journal of Mobile Computing and Multimedia Communications, 2017Over the past few decades ago, software developers analyzed robustly several forms of software protection against illegal copying or piracy. With the expansion in digital technology, the risk of illegal copying of software also amplifies. The increasing piracy rate has posed a serious threat to software developers leading to the development of various ...
Pratiksha Gautam, Hemraj Saini
openaire +1 more source
A Survey on Aims and Environments of Diversification and Obfuscation in Software Security
Proceedings of the 17th International Conference on Computer Systems and Technologies 2016, 2016Diversification and obfuscation methods are promising approaches used to secure software and prevent malware from functioning. Diversification makes each software instance unique so that malware attacks cannot rely on the knowledge of the program's execution environment and/or internal structure anymore. We present a systematic literature review on the
Mäkelä Jari-Matti +6 more
openaire +2 more sources
Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation
2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2016The software puzzle scheme counters resource-inflated Denial-of-Service (DoS) attacks by requiring each client connecting to the server to correctly solve a cryptographic puzzle before a connection can be established. It is specifically designed to thwart attempts at utilizing high-performance Graphic Processing Units (GPUs) to cut down solution time ...
Yongdong Wu +3 more
openaire +1 more source
A Software Engineering Methodology for Developing Secure Obfuscated Software
2019We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software.
Carlos Gonzalez, Ernesto Liñan
openaire +1 more source
Design and implementation of instruction indirection for embedded software obfuscation
Microprocessors and Microsystems, 2016Tamper-aware use of the Instruction Register File (IRF) is presented.Two heuristic algorithms are presented to find sub-optimal IRF assignments against tampering.For a small IRF, our precision-oriented algorithm obtained the optimal assignments in most cases.Our time-oriented algorithm completed the calculation in 16 milliseconds for a 1024-entry IRF ...
Naoki Fujieda +2 more
openaire +1 more source
A Generalized Obfuscation Method to Protect Software of Mobile Apps
2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), 2019As the world is becoming more mobile, mobile applications (or apps) are an integral part of our everyday personal and professional lives. Despite their unprecedented utility, these apps can pose serious security risks since a lot of critical or sensitive information is contained in the distributed software.
Jingsong Cui +4 more
openaire +1 more source

