Secure remote execution of sequential computations
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
An improved secure code encryption approach based on indexed table
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Hi-index | 0.00 |
This paper concerns the protection of a software programand/or the content that the program protects. Softwarepiracy and digital media piracy have cost industries billionsof dollars each year. The success of the content/software securitytechnologies in a large part depends on the capabilityof protecting software code against tampering and detectingthe attackers who distribute the pirate copies. In this paper,we focus on the attacker detection and forensis analysis.We shall talk about a proactive detection scheme for defeatingan on-going attack before the compromise has occurred.We shall also briefly explain another detection scheme forpost-compromise attacker identification. In particular, weconsider real world scenarios where the application programsconnect with their vendors periodically, and wherea detection of attacking can bar a hacker user from furtherbusiness.