Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Privacy-preserving global customization
Proceedings of the 2nd ACM conference on Electronic commerce
A functional taxonomy for software watermarking
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
Leakage-proof program partitioning
CASES '02 Proceedings of the 2002 international conference on Compilers, architecture, and synthesis for embedded systems
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
ACM Transactions on Internet Technology (TOIT)
TDB: A Database System for Digital Rights Management
EDBT '02 Proceedings of the 8th International Conference on Extending Database Technology: Advances in Database Technology
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Authenticated Operation of Open Computing Devices
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Copyright Protection of Object-Oriented Software
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Secure Fingerprinting Using Public-Key Cryptography (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Playing "Hide and Seek" with Stored Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Dynamic Self-Checking Techniques for Improved Tamper Resistance
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Protecting Software Code by Guards
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Protection of Software-Based Survivability Mechanisms
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Fingerprints for Copyright Software Protection
ISW '99 Proceedings of the Second International Workshop on Information Security
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software
ISW '00 Proceedings of the Third International Workshop on Information Security
Supporting E-commerce in Wireless Networks
IMWS '01 Revised Papers from the NSF Workshop on Developing an Infrastructure for Mobile and Wireless Systems
Tamper-resistant whole program partitioning
Proceedings of the 2003 ACM SIGPLAN conference on Language, compiler, and tool for embedded systems
Obfuscation of executable code to improve resistance to static disassembly
Proceedings of the 10th ACM conference on Computer and communications security
Secure routing with tamper resistant module for mobile Ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Flexible Software Protection Using Hardware/Software Codesign Techniques
Proceedings of the conference on Design, automation and test in Europe - Volume 1
Emerging challenges in designing secure mobile appliances
Ambient intelligence
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Modeling and implementation of digital rights
Journal of Systems and Software
SAFE-OPS: An approach to embedded software security
ACM Transactions on Embedded Computing Systems (TECS)
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance
IEEE Transactions on Dependable and Secure Computing
Obfuscated databases and group privacy
Proceedings of the 12th ACM conference on Computer and communications security
Control flow based obfuscation
Proceedings of the 5th ACM workshop on Digital rights management
Architecture Support for 3D Obfuscation
IEEE Transactions on Computers
IBM Systems Journal
State space reconfigurability: an implementation architecture for self modifying finite automata
CASES '06 Proceedings of the 2006 international conference on Compilers, architecture and synthesis for embedded systems
Proteus: virtualization for diversified tamper-resistance
Proceedings of the ACM workshop on Digital rights management
Some new approaches for preventing software tampering
Proceedings of the 44th annual Southeast regional conference
Protecting online games against cheating
NetGames '06 Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games
Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation
Extending tamper-proof hardware security to untrusted execution environments
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
How to build a trusted database system on untrusted storage
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Address obfuscation: an efficient approach to combat a board range of memory error exploits
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Key evolution-based tamper resistance: a subgroup extension
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Deducing similarities in Java sources from bytecodes
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Proceedings of the 9th workshop on Multimedia & security
Program obfuscation: a quantitative approach
Proceedings of the 2007 ACM workshop on Quality of protection
Mechanism for software tamper resistance: an application of white-box cryptography
Proceedings of the 2007 ACM workshop on Digital Rights Management
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
Electronic Notes in Theoretical Computer Science (ENTCS)
Binary obfuscation using signals
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Software issues in digital forensics
ACM SIGOPS Operating Systems Review
A compiler-based infrastructure for software-protection
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
Remote attestation on legacy operating systems with trusted platform modules
Science of Computer Programming
The Superdiversifier: Peephole Individualization for Software Protection
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
The Long-Short-Key Primitive and Its Applications to Key Security
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
A compiler-hardware approach to software protection for embedded systems
Computers and Electrical Engineering
Euro-Par 2008 Workshops - Parallel Processing
A graph approach to quantitative analysis of control-flow obfuscating transformations
IEEE Transactions on Information Forensics and Security
Tamper-Tolerant Software: Modeling and Implementation
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Delayed and controlled failures in tamper-resistant software
IH'06 Proceedings of the 8th international conference on Information hiding
A model for self-modifying code
IH'06 Proceedings of the 8th international conference on Information hiding
A graph game model for software tamper protection
IH'07 Proceedings of the 9th international conference on Information hiding
Towards tamper resistant code encryption: practice and experience
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Gross product simulation with pooling of linear and nonlinear regression models
Proceedings of the 6th International Workshop on Enterprise & Organizational Modeling and Simulation
Live forensics framework for wireless sensor nodes using sandboxing
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
A secure and robust approach to software tamper resistance
IH'10 Proceedings of the 12th international conference on Information hiding
Self destructive tamper response for software protection
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Traitor tracing schemes for protected software implementations
Proceedings of the 11th annual ACM workshop on Digital rights management
Replacement attacks on behavior based software birthmark
ISC'11 Proceedings of the 14th international conference on Information security
Embedded software security through key-based control flow obfuscation
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
An attack on SMC-based software protection
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Visual document authentication using human-recognizable watermarks
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Remote software-based attestation for wireless sensors
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
IH'04 Proceedings of the 6th international conference on Information Hiding
Tamper resistant software by integrity-based encryption
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
A framework for protecting private information through user-trusted-program and its realizability
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
An efficient algorithm for resource sharing in peer-to-peer networks
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
On building a lightweight security architecture for sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Arc3D: a 3D obfuscation architecture
HiPEAC'05 Proceedings of the First international conference on High Performance Embedded Architectures and Compilers
Software tamper resistance through dynamic program monitoring
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Software protection through dynamic code mutation
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Software-Based copy protection for temporal media during dissemination and playback
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
An approach of trusted program generation for user-responsible privacy
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
On the concept of software obfuscation in computer security
ISC'07 Proceedings of the 10th international conference on Information Security
A robust steganography-based software watermarking
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Distributed application tamper detection via continuous software updates
Proceedings of the 28th Annual Computer Security Applications Conference
Software protection for dynamically-generated code
PPREW '13 Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop
Binary-code obfuscations in prevalent packer tools
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |