Reverse Engineering and Design Recovery: A Taxonomy
IEEE Software
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Reconstructing a Packed DLL Binary for Static Analysis
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
An attack on SMC-based software protection
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Hi-index | 0.00 |
There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code means some level of assurance that the program will execute as expected even if it encounters the illegitimated modifications. We provide the method of protecting software from unauthorized modification. One important technique is an integrity-based encryption, by which a program, while running, checks itself to verify that it has not been modified and conceals some privacy sensitive parts of program.