COMPAC 2003 : 27th Annual International Computer Software and Applications Conference, 3-6 Nov. 2003, Dallas, TX, USAIn this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously restores the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code ha...
To counter man-at-the-end attacks such as reverse engineering and tampering, software is often prote...
[[abstract]]A new method for software program protection by information sharing and authentication t...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
This paper proposes an easy-to-use instruction hiding method to protect software from malicious reve...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Abstract. There are many situations in which it is desirable to protect a piece of software from ill...
Reverse engineering of executable programs, by disassembling them and then using program analyses to...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
Software applications which run in a compromised environment and perform sensitive operations, such ...
Abstract. Reverse engineering of executable programs, by disassembling them and then using program a...
With the extreme amount of data and software available on networks, the protection of online informa...
Reverse engineering of executable programs, by disassembling them and then using program analyses t...
Abstract. Common software-protection systems attempt to detect ma-licious observation and modificati...
Abstract-In order to increase their stealth, malware commonly use the self-modification property of ...
To counter man-at-the-end attacks such as reverse engineering and tampering, software is often prote...
[[abstract]]A new method for software program protection by information sharing and authentication t...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
This paper proposes an easy-to-use instruction hiding method to protect software from malicious reve...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Recent research has proposed self-checksumming as a method by which a program can detect any possibl...
Abstract. There are many situations in which it is desirable to protect a piece of software from ill...
Reverse engineering of executable programs, by disassembling them and then using program analyses to...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
Software applications which run in a compromised environment and perform sensitive operations, such ...
Abstract. Reverse engineering of executable programs, by disassembling them and then using program a...
With the extreme amount of data and software available on networks, the protection of online informa...
Reverse engineering of executable programs, by disassembling them and then using program analyses t...
Abstract. Common software-protection systems attempt to detect ma-licious observation and modificati...
Abstract-In order to increase their stealth, malware commonly use the self-modification property of ...
To counter man-at-the-end attacks such as reverse engineering and tampering, software is often prote...
[[abstract]]A new method for software program protection by information sharing and authentication t...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...