Results 1 to 10 of about 1,981,488 (283)

Revisiting Software Protection [PDF]

open access: yes, 2003
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography. We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions.
A. Herzberg   +25 more
openaire   +5 more sources

Flexible software protection [PDF]

open access: yesComputers & Security, 2022
Submitted to ACM Transactions on Privacy and ...
Van den Broeck, Jens   +2 more
openaire   +3 more sources

Method of diversity software protection based on fusion compilation

open access: yes网络与信息安全学报, 2020
For the obvious characteristics and single mode of the existing common protection methods, with the help of the LLVM framework, a diversity software protection method based on fusion compilation was proposed.
XIONG Xiaobing, SHU Hui, KANG Fei
doaj   +3 more sources

Security protection technology of power monitoring system based on autonomous and controllable operating system platform

open access: yesZhejiang dianli, 2022
Given the increasingly severe security situation at home and abroad, the security of power system has received growing attention. Power monitoring system is one of the most important systems of power system.
XU Yanming   +4 more
doaj   +1 more source

Practical Anti-Fuzzing Techniques With Performance Optimization

open access: yesIEEE Open Journal of the Computer Society, 2023
Fuzzing, an automated software testing technique, has achieved remarkable success in recent years, aiding developers in identifying vulnerabilities. However, fuzzing can also be exploited by attackers to discover zero-day vulnerabilities. To counter this
Zhengxiang Zhou, Cong Wang
doaj   +1 more source

Software protection technology based on code fragmentation

open access: yes网络与信息安全学报, 2020
Aiming at the shortcomings of the current software protection technology, a code fragmentation technology was proposed. This technology is a new software protection technology that takes functions as units, shells functions, randomizes memory layout, and
GUO Jingcheng, SHU Hui, XIONG Xiaobing, KANG Fei
doaj   +3 more sources

TSML: A New Pig Behavior Recognition Method Based on Two-Stream Mutual Learning Network

open access: yesSensors, 2023
Changes in pig behavior are crucial information in the livestock breeding process, and automatic pig behavior recognition is a vital method for improving pig welfare.
Wangli Hao   +6 more
doaj   +1 more source

Public Protection of Software [PDF]

open access: yesACM Transactions on Computer Systems, 1987
One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are ...
Amir Herzberg, Shlomit S. Pinter
openaire   +2 more sources

OVERLOAD AND TRAFFIC MANAGEMENT OF MESSAGE SOURCES WITH DIFFERENT PRIORITY OF SERVICE

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2023
The scheme of dynamic management of traffic and activity of message sources with different priority of service is considered. The scheme is built on the basis of the neuroprognostic analysis model and the gradient descent method.
Valerii Kozlovskyi   +4 more
doaj   +1 more source

Protecting Your Software Updates [PDF]

open access: yesIEEE Security & Privacy, 2013
As described in many blog posts and the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches, which often involves the manual or automated identification of vulnerable code. The authors evaluate how this identification can be automated with the most frequently referenced diffing tools, demonstrating ...
Coppens B.   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy