Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Dynamic Self-Checking Techniques for Improved Tamper Resistance
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Protecting Software Code by Guards
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
Self-healing mechanisms for kernel system compromises
WOSS '04 Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems
Security Strength Measurement for Dongle-Protected Software
IEEE Security and Privacy
Host-Based security sensor integrity in multiprocessing environments
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
SILENTKNOCK: practical, provably undetectable authentication
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits
International Journal of Wireless Networks and Broadband Technologies
Hi-index | 0.00 |
Attackers' obfuscation techniques make it difficult to detect kernel rootkits merely by looking at symbol-table information. The authors show how software developers can use obfuscation techniques to fight commercial-software reverse engineering and illegal distribution of their products by attackers.