White-Box Cryptography and an AES Implementation
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Randomized instruction set emulation to disrupt binary code injection attacks
Proceedings of the 10th ACM conference on Computer and communications security
A framework for obfuscated interpretation
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Software piracy prevention through diversity
Proceedings of the 4th ACM workshop on Digital rights management
Randomized instruction set emulation
ACM Transactions on Information and System Security (TISSEC)
Message authentication by integrity with public corroboration
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Proteus: virtualization for diversified tamper-resistance
Proceedings of the ACM workshop on Digital rights management
How to build a trusted database system on untrusted storage
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Proceedings of the 9th workshop on Multimedia & security
Program obfuscation: a quantitative approach
Proceedings of the 2007 ACM workshop on Quality of protection
Mechanism for software tamper resistance: an application of white-box cryptography
Proceedings of the 2007 ACM workshop on Digital Rights Management
Software issues in digital forensics
ACM SIGOPS Operating Systems Review
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
Hiding Software Watermarks in Loop Structures
SAS '08 Proceedings of the 15th international symposium on Static Analysis
Proceedings of the 4th ACM European conference on Computer systems
Obfuscating Java: the most pain for the least gain
CC'07 Proceedings of the 16th international conference on Compiler construction
Run-time randomization to mitigate tampering
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
E unibus pluram: massive-scale software diversity as a defense mechanism
Proceedings of the 2010 workshop on New security paradigms
ICISS'10 Proceedings of the 6th international conference on Information systems security
Network–Level polymorphic shellcode detection using emulation
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Remote software-based attestation for wireless sensors
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Obfuscation by partial evaluation of distorted interpreters
PEPM '12 Proceedings of the ACM SIGPLAN 2012 workshop on Partial evaluation and program manipulation
Using purpose capturing signatures to defeat computer virus mutating
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Software-Based copy protection for temporal media during dissemination and playback
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Instruction embedding for improved obfuscation
Proceedings of the 50th Annual Southeast Regional Conference
On the concept of software obfuscation in computer security
ISC'07 Proceedings of the 10th international conference on Information Security
Feedback-driven binary code diversification
ACM Transactions on Architecture and Code Optimization (TACO) - Special Issue on High-Performance Embedded Architectures and Compilers
ChameleonSoft: Software Behavior Encryption for Moving Target Defense
Mobile Networks and Applications
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
VILO: a rapid learning nearest-neighbor classifier for malware triage
Journal in Computer Virology
Librando: transparent code randomization for just-in-time compilers
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Transparent ROP exploit mitigation using indirect branch tracing
SEC'13 Proceedings of the 22nd USENIX conference on Security
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |