Computer viruses: theory and experiments
Computers and Security
Software protection: myth or reality?
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
ACM Transactions on Computer Systems (TOCS)
Journal of Cryptology
The protection of computer software---its technology and applications
Obfuscated C and other mysteries
Obfuscated C and other mysteries
Batch checking with applications to linear functions
Information Processing Letters
Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Interprocedural may-alias analysis for pointers: beyond k-limiting
PLDI '94 Proceedings of the ACM SIGPLAN 1994 conference on Programming language design and implementation
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
The undecidability of aliasing
ACM Transactions on Programming Languages and Systems (TOPLAS)
Designing programs that check their work
Journal of the ACM (JACM)
Computer related risks
Software protection and simulation on oblivious RAMs
Journal of the ACM (JACM)
Precise flow-insensitive may-alias analysis is NP-hard
ACM Transactions on Programming Languages and Systems (TOPLAS)
IBM Systems Journal
Manufacturing cheap, resilient, and stealthy opaque constructs
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Software reliability via run-time result-checking
Journal of the ACM (JACM)
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Watermarking techniques for intellectual property protection
DAC '98 Proceedings of the 35th annual Design Automation Conference
An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Analysis of watermarking techniques for graph coloring problem
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Global software piracy: you can't get blood out of a turnip
Communications of the ACM
Computing Functions of a Shared Secret
SIAM Journal on Discrete Mathematics
Factors motivating software piracy: a longitudinal study
ICIS '99 Proceedings of the 20th international conference on Information Systems
Hardware protection against software piracy
Communications of the ACM
Architectural support for copy and tamper resistant software
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Program Result Checking: A New Approach to Making Programs More Reliable
ICALP '93 Proceedings of the 20th International Colloquium on Automata, Languages and Programming
Checking Secure Interactions of Smart Card Applets
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
A Graph Theoretic Approach to Software Watermarking
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
A Framework to Protect Mobile Agents by Using Reference States
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Breaking Abstractions and Unstructuring Data Structures
ICCL '98 Proceedings of the 1998 International Conference on Computer Languages
An Overview of Computer Viruses in a Research Environment
An Overview of Computer Viruses in a Research Environment
How to Systematically Classify Computer Security Intrusions
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Software Tamper Resistance: Obstructing Static Analysis of Programs
Software Tamper Resistance: Obstructing Static Analysis of Programs
A security architecture for survivability mechanisms
A security architecture for survivability mechanisms
Krakatoa: decompilation in java (dose bytecode reveal source?)
COOTS'97 Proceedings of the 3rd conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 3
Computer viruses as artificial life
Artificial Life
SP 800-14. Generally Accepted Principles and Practices for Securing Information Technology Systems
SP 800-14. Generally Accepted Principles and Practices for Securing Information Technology Systems
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Sandmark--A Tool for Software Protection Research
IEEE Security and Privacy
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture
Soft-Decision Tracing in Fingerprinted Multimedia Content
IEEE MultiMedia
Taking a Lesson from Stealthy Rootkits
IEEE Security and Privacy
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Algebraic Power Analysis by Abstract Interpretation
Higher-Order and Symbolic Computation
SAFE-OPS: An approach to embedded software security
ACM Transactions on Embedded Computing Systems (TECS)
Improving Memory Encryption Performance in Secure Processors
IEEE Transactions on Computers
VLSI CAD tool protection by birthmarking design solutions
GLSVLSI '05 Proceedings of the 15th ACM Great Lakes symposium on VLSI
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance
IEEE Transactions on Dependable and Secure Computing
Overcoming the obfuscation of Java programs by identifier renaming
Journal of Systems and Software
Obfuscated databases and group privacy
Proceedings of the 12th ACM conference on Computer and communications security
Hybrid static-dynamic attacks against software protection mechanisms
Proceedings of the 5th ACM workshop on Digital rights management
A Method for Detecting Obfuscated Calls in Malicious Binaries
IEEE Transactions on Software Engineering
Control Code Obfuscation by Abstract Interpretation
SEFM '05 Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods
Software integrity protection using timed executable agents
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Architecture Support for 3D Obfuscation
IEEE Transactions on Computers
IBM Systems Journal
Extraction in software watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Performance analysis of binary code protection
WSC '05 Proceedings of the 37th conference on Winter simulation
Software obfuscation from crackers' viewpoint
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
Software watermarking in the frequency domain: implementation, analysis, and attacks
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Recognition in software watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Proteus: virtualization for diversified tamper-resistance
Proceedings of the ACM workshop on Digital rights management
Some new approaches for preventing software tampering
Proceedings of the 44th annual Southeast regional conference
An empirical study of Java bytecode programs
Software—Practice & Experience
Tamper-proofing basis path by using oblivious hashing on Java
ACM SIGPLAN Notices
Static disassembly of obfuscated binaries
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Preventing application software piracy: An empirical investigation of technical copy protections
The Journal of Strategic Information Systems
Proceedings of the 9th workshop on Multimedia & security
Security Strength Measurement for Dongle-Protected Software
IEEE Security and Privacy
Using hypervisor to provide data secrecy for user applications on a per-page basis
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Binary obfuscation using signals
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
A compiler-based infrastructure for software-protection
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
Utilizing national public-key infrastructure in mobile payment systems
Electronic Commerce Research and Applications
Detecting in-flight page changes with web tripwires
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Tamper proofing mechanisms for motion capture data
Proceedings of the 10th ACM workshop on Multimedia and security
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity
Proceedings of the 1st ACM workshop on Virtual machine security
Proceedings of the 2nd Bangalore Annual Compute Conference
Analysis of Program Obfuscation Schemes with Variable Encoding Technique
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Copyright Protection for Modifiable Digital Content Based on Distributed Environment
IEICE - Transactions on Information and Systems
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Euro-Par 2008 Workshops - Parallel Processing
A method for detecting the theft of Java programs through analysis of the control flow information
Information and Software Technology
A graph approach to quantitative analysis of control-flow obfuscating transformations
IEEE Transactions on Information Forensics and Security
Effective implementation of the cell broadband engine™ isolation loader
Proceedings of the 16th ACM conference on Computer and communications security
A semi-dynamic multiple watermarking schemefor java applications
Proceedings of the nineth ACM workshop on Digital rights management
Semantics-based code obfuscation by abstract interpretation
Journal of Computer Security
A Generic Distortion Free Watermarking Technique for Relational Databases
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Context-sensitive analysis of obfuscated x86 executables
Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and program manipulation
Assessment of advanced cryptographic antiviral techniques
International Journal of Electronic Security and Digital Forensics
Delayed and controlled failures in tamper-resistant software
IH'06 Proceedings of the 8th international conference on Information hiding
A model for self-modifying code
IH'06 Proceedings of the 8th international conference on Information hiding
Obfuscating Java: the most pain for the least gain
CC'07 Proceedings of the 16th international conference on Compiler construction
Informed recognition in software watermarking
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Using logic-based reduction for adversarial component recovery
Proceedings of the 2010 ACM Symposium on Applied Computing
A static birthmark of binary executables based on API call structure
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Information hiding in software with mixed Boolean-arithmetic transforms
WISA'07 Proceedings of the 8th international conference on Information security applications
Remote entrusting by run-time software authentication
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Tampering in RFID: A Survey on Risks and Defenses
Mobile Networks and Applications
Live forensics framework for wireless sensor nodes using sandboxing
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Robust combiners for software hardening
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Security and scalability of remote entrusting protection
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Misleading malware similarities analysis by automatic data structure obfuscation
ISC'10 Proceedings of the 13th international conference on Information security
Malware detection using assembly and API call sequences
Journal in Computer Virology
Can code polymorphism limit information leakage?
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Traitor tracing schemes for protected software implementations
Proceedings of the 11th annual ACM workshop on Digital rights management
Replacement attacks on behavior based software birthmark
ISC'11 Proceedings of the 14th international conference on Information security
Multi-stage binary code obfuscation using improved virtual machine
ISC'11 Proceedings of the 14th international conference on Information security
Embedded software security through key-based control flow obfuscation
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
A blind reversible method for watermarking relational databases based on a time-stamping protocol
Expert Systems with Applications: An International Journal
Advances in Software Engineering
Context-sensitive analysis without calling-context
Higher-Order and Symbolic Computation
Network–Level polymorphic shellcode detection using emulation
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Fingerprinting schemes. identifying the guilty sources using side information
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Remote software-based attestation for wireless sensors
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Obfuscation by partial evaluation of distorted interpreters
PEPM '12 Proceedings of the ACM SIGPLAN 2012 workshop on Partial evaluation and program manipulation
Semantic-based code obfuscation by abstract interpretation
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Soft IP protection: watermarking HDL codes
IH'04 Proceedings of the 6th international conference on Information Hiding
An efficient algorithm for resource sharing in peer-to-peer networks
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
Arc3D: a 3D obfuscation architecture
HiPEAC'05 Proceedings of the First international conference on High Performance Embedded Architectures and Compilers
A chaos-based robust software watermarking
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A survey of software watermarking
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
On the QP algorithm in software watermarking
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Watermarking geographical data on spatial topological relations
Multimedia Tools and Applications
TIVA: trusted integrity verification architecture
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Call tree transformation for program obfuscation and copy protection
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Algorithms to watermark software through register allocation
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A low-cost attack on branch-based software watermarking schemes
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Securing agents against malicious host in an intrusion detection system
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Software protection through dynamic code mutation
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Watermarking non-numerical databases
MDAI'06 Proceedings of the Third international conference on Modeling Decisions for Artificial Intelligence
Software-Based copy protection for temporal media during dissemination and playback
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Plagiarizing smartphone applications: attack strategies and defense techniques
ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
A novel watermarking method for software protection in the cloud
Software—Practice & Experience
An improved secure code encryption approach based on indexed table
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
On the concept of software obfuscation in computer security
ISC'07 Proceedings of the 10th international conference on Information Security
An anti-piracy mechanism based on class separation and dynamic loading for Android applications
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Making abstract interpretation incomplete: modeling the potency of obfuscation
SAS'12 Proceedings of the 19th international conference on Static Analysis
Covert computation: hiding code in code for obfuscation purposes
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Measuring similarity of android applications via reversing and K-gram birthmarking
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Computer security with service degradations
ACM SIGSOFT Software Engineering Notes
RopSteg: program steganography with return oriented programming
Proceedings of the 4th ACM conference on Data and application security and privacy
A birthmark-based method for intellectual software asset management
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.01 |
We identify three types of attack on the intellectual property contained in software and three corresponding technical defenses. A defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example, to remove a watermark) will result in nonfunctional code. We briefly survey the available technology for each type of defense.