Pascal user manual and report; 3rd ed.
Pascal user manual and report; 3rd ed.
ACM Computing Surveys (CSUR)
Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture
A framework for obfuscated interpretation
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Improving Memory Encryption Performance in Secure Processors
IEEE Transactions on Computers
Licensing of microcomputer software
ACM SIGUCCS Newsletter
IBM Systems Journal
Some new approaches for preventing software tampering
Proceedings of the 44th annual Southeast regional conference
Preventing application software piracy: An empirical investigation of technical copy protections
The Journal of Strategic Information Systems
Dynamic graph-based software fingerprinting
ACM Transactions on Programming Languages and Systems (TOPLAS)
TDVMP: Improved Virtual Machine-Based Software Protection with Time Diversity
Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014
Hi-index | 48.22 |
A system that prevents illicit duplication of proprietary software is suggested. It entails the customization of the programs for each computer by encryption. The use of a public key cryptogram for this purpose means that anyone can customize programs, but neither other programmers nor the people having complete access to the target computer can obtain copies that will run on other machines. A possible implementation of the system is considered in some detail. It is based on a hardware security unit that is attached to the computer and that decrypts and obeys some parts of the program.