Writing Secure Code
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Protecting Software Code by Guards
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Software Protection: Security's Last Stand?
IEEE Security and Privacy
Forensic Analysis for Tamper Resistant Software
ISSRE '03 Proceedings of the 14th International Symposium on Software Reliability Engineering
Reversing: The Hacker's Guide to Reverse Engineering
Reversing: The Hacker's Guide to Reverse Engineering
Performance analysis of binary code protection
WSC '05 Proceedings of the 37th conference on Winter simulation
An open-source cryptographic coprocessor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Towards tamper resistant code encryption: practice and experience
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Hi-index | 0.00 |
Software in recent scenario has been highly susceptible to various attacks and threats. Reverse engineering is one of the key technique by which an intruder can understand the inner working of the software. Software protection techniques have be established in order to provide security and authentication to the software. But most of the existing software protection techniques do not provide reliable security against various attacks. Cryptographic approaches are observed to be very efficient in providing security and authentication to the software. Encryption of the code in the software has received much attention in the software engineering domain and various researches are being done in that area. This paper proposes a novel software protection code encryption scheme based on the index table. This approach uses a novel and efficient encryption technique for encryption the indexed table. The encryption technique used is the quasigroup approach which provides least resemblance of the original data when encrypted. The performance of the proposed approach is evaluated based on the time cost and space cost and it is observed that the proposed approach provides significant results and performance.