Results 1 to 10 of about 1,996,535 (294)

Revisiting software protection [PDF]

open access: yes, 2003
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.
A. Herzberg   +25 more
core   +4 more sources

A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs

open access: yesIEEE Access, 2018
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect.
Qing Su, Fan He, Naiqi Wu, Zhiyi Lin
doaj   +3 more sources

Attack simulation based software protection assessment method [PDF]

open access: yes, 2016
Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections.
Paolo Falcarin, Elena Gómez-Martínez
exaly   +5 more sources

Flexible software protection [PDF]

open access: yesComputers & Security, 2022
Submitted to ACM Transactions on Privacy and ...
Van den Broeck, Jens   +2 more
openaire   +3 more sources

Method of diversity software protection based on fusion compilation

open access: yes网络与信息安全学报, 2020
For the obvious characteristics and single mode of the existing common protection methods, with the help of the LLVM framework, a diversity software protection method based on fusion compilation was proposed.
XIONG Xiaobing, SHU Hui, KANG Fei
doaj   +3 more sources

Security protection technology of power monitoring system based on autonomous and controllable operating system platform

open access: yesZhejiang dianli, 2022
Given the increasingly severe security situation at home and abroad, the security of power system has received growing attention. Power monitoring system is one of the most important systems of power system.
XU Yanming   +4 more
doaj   +1 more source

Practical Anti-Fuzzing Techniques With Performance Optimization

open access: yesIEEE Open Journal of the Computer Society, 2023
Fuzzing, an automated software testing technique, has achieved remarkable success in recent years, aiding developers in identifying vulnerabilities. However, fuzzing can also be exploited by attackers to discover zero-day vulnerabilities. To counter this
Zhengxiang Zhou, Cong Wang
doaj   +1 more source

Software protection technology based on code fragmentation

open access: yes网络与信息安全学报, 2020
Aiming at the shortcomings of the current software protection technology, a code fragmentation technology was proposed. This technology is a new software protection technology that takes functions as units, shells functions, randomizes memory layout, and
GUO Jingcheng, SHU Hui, XIONG Xiaobing, KANG Fei
doaj   +3 more sources

TSML: A New Pig Behavior Recognition Method Based on Two-Stream Mutual Learning Network

open access: yesSensors, 2023
Changes in pig behavior are crucial information in the livestock breeding process, and automatic pig behavior recognition is a vital method for improving pig welfare.
Wangli Hao   +6 more
doaj   +1 more source

Public Protection of Software [PDF]

open access: yesACM Transactions on Computer Systems, 1987
One of the overwhelming problems that software producers must contend with is the unauthorized use and distribution of their products. Copyright laws concerning software are rarely enforced, thereby causing major losses to the software companies. Technical means of protecting software from illegal duplication are required, but the available means are ...
Amir Herzberg, Shlomit S. Pinter
openaire   +2 more sources

Home - About - Disclaimer - Privacy