Results 1 to 10 of about 1,981,488 (283)
Revisiting Software Protection [PDF]
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography. We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions.
A. Herzberg +25 more
openaire +5 more sources
Flexible software protection [PDF]
Submitted to ACM Transactions on Privacy and ...
Van den Broeck, Jens +2 more
openaire +3 more sources
Method of diversity software protection based on fusion compilation
For the obvious characteristics and single mode of the existing common protection methods, with the help of the LLVM framework, a diversity software protection method based on fusion compilation was proposed.
XIONG Xiaobing, SHU Hui, KANG Fei
doaj +3 more sources
Given the increasingly severe security situation at home and abroad, the security of power system has received growing attention. Power monitoring system is one of the most important systems of power system.
XU Yanming +4 more
doaj +1 more source
Practical Anti-Fuzzing Techniques With Performance Optimization
Fuzzing, an automated software testing technique, has achieved remarkable success in recent years, aiding developers in identifying vulnerabilities. However, fuzzing can also be exploited by attackers to discover zero-day vulnerabilities. To counter this
Zhengxiang Zhou, Cong Wang
doaj +1 more source
Software protection technology based on code fragmentation
Aiming at the shortcomings of the current software protection technology, a code fragmentation technology was proposed. This technology is a new software protection technology that takes functions as units, shells functions, randomizes memory layout, and
GUO Jingcheng, SHU Hui, XIONG Xiaobing, KANG Fei
doaj +3 more sources
TSML: A New Pig Behavior Recognition Method Based on Two-Stream Mutual Learning Network
Changes in pig behavior are crucial information in the livestock breeding process, and automatic pig behavior recognition is a vital method for improving pig welfare.
Wangli Hao +6 more
doaj +1 more source
Public Protection of Software [PDF]
One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are ...
Amir Herzberg, Shlomit S. Pinter
openaire +2 more sources
OVERLOAD AND TRAFFIC MANAGEMENT OF MESSAGE SOURCES WITH DIFFERENT PRIORITY OF SERVICE
The scheme of dynamic management of traffic and activity of message sources with different priority of service is considered. The scheme is built on the basis of the neuroprognostic analysis model and the gradient descent method.
Valerii Kozlovskyi +4 more
doaj +1 more source
Protecting Your Software Updates [PDF]
As described in many blog posts and the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches, which often involves the manual or automated identification of vulnerable code. The authors evaluate how this identification can be automated with the most frequently referenced diffing tools, demonstrating ...
Coppens B. +2 more
openaire +2 more sources

