Protecting Software Code by Guards
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Breaking Abstractions and Unstructuring Data Structures
ICCL '98 Proceedings of the 1998 International Conference on Computer Languages
Reversing: The Hacker's Guide to Reverse Engineering
Reversing: The Hacker's Guide to Reverse Engineering
Performance analysis of binary code protection
WSC '05 Proceedings of the 37th conference on Winter simulation
An open-source cryptographic coprocessor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Computation of the Hadamard Transform and the R- Transform in Ordered Form
IEEE Transactions on Computers
Transform-exempted calculation of sum of absolute Hadamard transformed differences
IEEE Transactions on Circuits and Systems for Video Technology
The Importance of Social Network Structure in the Open Source Software Developer Community
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
Towards tamper resistant code encryption: practice and experience
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An Introduction to Mathematical Cryptography
An Introduction to Mathematical Cryptography
Design and cryptanalysis of transform-based analog speech scramblers
IEEE Journal on Selected Areas in Communications
An improved secure code encryption approach based on indexed table
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Hi-index | 0.00 |
Software security has become one of the active areas of research due to various cyber threats and attacks that can be very dangerous. A majority of these software threats directly affects the security aspects such as confidentiality, integrity and accessibility. These software threats such as reverse engineering, tampering, etc., exploit the authenticated data of the software. Various techniques have been developed to deal with the software threats and attacks. But, most of the existing software protection techniques do not provide reliable security against various attacks. Recently, Cryptographic approaches are found to be very effective in handling the software threats and attacks. Code encryption has received much attention in the field of software security. This paper proposes a novel software protection code encryption scheme based on the index table. This approach uses a novel and efficient encryption technique called quasigroup encryption for encryption the indexed table. It provides least resemblance of the original data when encrypted. Quasigroups effectively produce an astronomical number of keys which confuses the hackers in identifying the original data. But, quasi group encryption is not efficient in diffusing the statistics of the plain text. Hence, this approach uses chained Hadamard transforms and Number Theoretic Transforms to introduce diffusion along with the quasigroup transformation. The experimental results evaluate the performance of the proposed encryption approach based on the time cost and space cost and it is observed that the proposed approach provides significant results.