Results 21 to 30 of about 1,981,488 (283)
Resilient Self-Debugging Software Protection [PDF]
Debuggers are a popular reverse engineering and tampering tool. Self-debugging is an effective technique for applications to defend themselves against hostile debuggers. In penetration tests on state-of-the-art self-debugging, we observed several opportunities through which it could be attacked, however.
Abrath, Bert +3 more
openaire +3 more sources
Some Fundamental Cybersecurity Concepts
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj +1 more source
This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works ...
Alan Litchfield, Jeff Herbert
doaj +1 more source
Attack simulation based software protection assessment method [PDF]
Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections.
d'Annoville, Jerome +6 more
core +3 more sources
Assessing the reliability of diverse fault-tolerant software-based systems [PDF]
We discuss a problem in the safety assessment of automatic control and protection systems. There is an increasing dependence on software for performing safety-critical functions, like the safety shut-down of dangerous plants.
Littlewood, B. +2 more
core +1 more source
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect.
Qing Su, Fan He, Naiqi Wu, Zhiyi Lin
doaj +1 more source
Education Mobility as a Service: A Study of the Features of a Novel Mobility Platform
The European Union’s Erasmus+ program strongly supports mobility for finding training or work opportunities. However, in the era of pandemics, there is a need to find remedies for restricted movement.
Małgorzata Gawlik-Kobylińska +3 more
doaj +1 more source
Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments
In spite of recent remarkable advances in binary code analysis, adversaries are still using diverse anti-reversing techniques for obfuscating code and making analysis difficult.
PARK, J. +3 more
doaj +1 more source
MODEL OF THE FLAT FAIRING ANTENNA DIELECTRIC LAYER WITH AERODYNAMIC HEATING
To protect the antenna systems of modern aircraft, radio-transparent dielectric fairings are widely used. At low flight speeds, when designing and evaluating the characteristics of the fairing-antenna, it is assumed that the dielectric constant is a ...
Valerii Kozlovskiy +4 more
doaj +1 more source
Software-Based Protection against Changeware [PDF]
We call changeware software that surreptitiously modifies resources of software applications, e.g., configuration files. Changeware is developed by malicious entities which gain profit if their changeware is executed by large numbers of end-users of the targeted software.
Sebastian Banescu +5 more
openaire +2 more sources

