Results 21 to 30 of about 1,981,488 (283)

Resilient Self-Debugging Software Protection [PDF]

open access: yes2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020
Debuggers are a popular reverse engineering and tampering tool. Self-debugging is an effective technique for applications to defend themselves against hostile debuggers. In penetration tests on state-of-the-art self-debugging, we observed several opportunities through which it could be attacked, however.
Abrath, Bert   +3 more
openaire   +3 more sources

Some Fundamental Cybersecurity Concepts

open access: yesIEEE Access, 2014
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj   +1 more source

ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation

open access: yesCryptography, 2018
This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works ...
Alan Litchfield, Jeff Herbert
doaj   +1 more source

Attack simulation based software protection assessment method [PDF]

open access: yes, 2016
Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections.
d'Annoville, Jerome   +6 more
core   +3 more sources

Assessing the reliability of diverse fault-tolerant software-based systems [PDF]

open access: yes, 2002
We discuss a problem in the safety assessment of automatic control and protection systems. There is an increasing dependence on software for performing safety-critical functions, like the safety shut-down of dangerous plants.
Littlewood, B.   +2 more
core   +1 more source

A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs

open access: yesIEEE Access, 2018
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect.
Qing Su, Fan He, Naiqi Wu, Zhiyi Lin
doaj   +1 more source

Education Mobility as a Service: A Study of the Features of a Novel Mobility Platform

open access: yesApplied Sciences, 2023
The European Union’s Erasmus+ program strongly supports mobility for finding training or work opportunities. However, in the era of pandemics, there is a need to find remedies for restricted movement.
Małgorzata Gawlik-Kobylińska   +3 more
doaj   +1 more source

Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments

open access: yesAdvances in Electrical and Computer Engineering, 2019
In spite of recent remarkable advances in binary code analysis, adversaries are still using diverse anti-reversing techniques for obfuscating code and making analysis difficult.
PARK, J.   +3 more
doaj   +1 more source

MODEL OF THE FLAT FAIRING ANTENNA DIELECTRIC LAYER WITH AERODYNAMIC HEATING

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2023
To protect the antenna systems of modern aircraft, radio-transparent dielectric fairings are widely used. At low flight speeds, when designing and evaluating the characteristics of the fairing-antenna, it is assumed that the dielectric constant is a ...
Valerii Kozlovskiy   +4 more
doaj   +1 more source

Software-Based Protection against Changeware [PDF]

open access: yesProceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
We call changeware software that surreptitiously modifies resources of software applications, e.g., configuration files. Changeware is developed by malicious entities which gain profit if their changeware is executed by large numbers of end-users of the targeted software.
Sebastian Banescu   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy