Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
White-Box Cryptography and an AES Implementation
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Hiding program slices for software security
Proceedings of the international symposium on Code generation and optimization: feedback-directed and runtime optimization
Software piracy prevention through diversity
Proceedings of the 4th ACM workshop on Digital rights management
Tamper-proofing basis path by using oblivious hashing on Java
ACM SIGPLAN Notices
Distributed application tamper detection via continuous software updates
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Most people consider frequent software updates a nuisance. However, we show how this common phenomenon can be turned into a feature that protects against software piracy. We define a protocol for "drop-in" upgrades of software that renders a large class of software piracy more traceable. A novel feature of our approach is a software aging technique by which we force the updates to occur, or else the software becomes decreasingly useful over time.