Architectural support for copy and tamper resistant software
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
Discouraging Software Piracy Using Software Aging
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Protecting Software Code by Guards
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Protecting digital archives at the Greek Orthodox Archdiocese of America
Proceedings of the 3rd ACM workshop on Digital rights management
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Hybrid static-dynamic attacks against software protection mechanisms
Proceedings of the 5th ACM workshop on Digital rights management
An ethics and security course for students in computer science and information technology
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Performance analysis of binary code protection
WSC '05 Proceedings of the 37th conference on Winter simulation
Proteus: virtualization for diversified tamper-resistance
Proceedings of the ACM workshop on Digital rights management
Tamper-proofing basis path by using oblivious hashing on Java
ACM SIGPLAN Notices
Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
ACM Transactions on Information and System Security (TISSEC)
A model for self-modifying code
IH'06 Proceedings of the 8th international conference on Information hiding
Remote entrusting by run-time software authentication
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
A novel DRM framework for peer-to-peer music content delivery
Journal of Systems and Software
Preventing illegal usage of mobile phone software
COMPSAC-W'05 Proceedings of the 29th annual international conference on Computer software and applications conference
Towards multilateral-secure DRM platforms
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Hi-index | 4.10 |
As computing becomes pervasive, concerns about data protection have taken on new urgency. What makes securing digital data so difficult is that it is rarely static rather, data is manipulated by software, often in a net-worked environment.Software is increasingly being distributed as mobile code in architecture-independent formats. Using reverse engineering, malicious parties can steal the intellectual property associated with such code with relative ease. Three promising techniques under development--tamper proofing, obfuscation, and watermarking--offer hope for providing more efficient and effective mechanisms for protecting software.