Results 1 to 10 of about 1,996,535 (294)
Revisiting software protection [PDF]
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.
A. Herzberg +25 more
core +4 more sources
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect.
Qing Su, Fan He, Naiqi Wu, Zhiyi Lin
doaj +3 more sources
Attack simulation based software protection assessment method [PDF]
Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections.
Paolo Falcarin, Elena Gómez-Martínez
exaly +5 more sources
Flexible software protection [PDF]
Submitted to ACM Transactions on Privacy and ...
Van den Broeck, Jens +2 more
openaire +3 more sources
Method of diversity software protection based on fusion compilation
For the obvious characteristics and single mode of the existing common protection methods, with the help of the LLVM framework, a diversity software protection method based on fusion compilation was proposed.
XIONG Xiaobing, SHU Hui, KANG Fei
doaj +3 more sources
Given the increasingly severe security situation at home and abroad, the security of power system has received growing attention. Power monitoring system is one of the most important systems of power system.
XU Yanming +4 more
doaj +1 more source
Practical Anti-Fuzzing Techniques With Performance Optimization
Fuzzing, an automated software testing technique, has achieved remarkable success in recent years, aiding developers in identifying vulnerabilities. However, fuzzing can also be exploited by attackers to discover zero-day vulnerabilities. To counter this
Zhengxiang Zhou, Cong Wang
doaj +1 more source
Software protection technology based on code fragmentation
Aiming at the shortcomings of the current software protection technology, a code fragmentation technology was proposed. This technology is a new software protection technology that takes functions as units, shells functions, randomizes memory layout, and
GUO Jingcheng, SHU Hui, XIONG Xiaobing, KANG Fei
doaj +3 more sources
TSML: A New Pig Behavior Recognition Method Based on Two-Stream Mutual Learning Network
Changes in pig behavior are crucial information in the livestock breeding process, and automatic pig behavior recognition is a vital method for improving pig welfare.
Wangli Hao +6 more
doaj +1 more source
Public Protection of Software [PDF]
One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are ...
Amir Herzberg, Shlomit S. Pinter
openaire +2 more sources

