Software applications contain valuable assets that, if compromised, can make the security of users at stake and cause huge monetary losses for software developers. Software protections are applied whenever assets’ security is at risk as they delay successful attacks. Unfortunately, protections might have recognizable fingerprints that can expose the location of the assets, thus facilitating the attackers’ job. This paper presents a novel approach that uses three main methods to hide the protected assets: protection fingerprint replication, enlargement, and shadowing. The best way to hide assets is determined with a Mixed Integer Linear Program, which is automatically built starting from the code structure, the protected assets, and a model ...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
Many modern defenses against code reuse rely on hiding sensitive data such as shadow stacks in a hug...
Abstract: Application Service Provider (ASP) is a business that makes computer-based services (small...
Software applications contain valuable assets that, if compromised, can make the security of users a...
In this paper we present recent achievements and open problems in software security by obscurity. We...
Software applications which run in a compromised environment and perform sensitive operations, such ...
Watermarking embeds a secret message into a cover mes-sage. In media watermarking the secret is usua...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...
In today’s digital world applications from a computer or a mobile device consistently used to get ev...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Abstract: Software piracy has been major issue for software industries. They have to pay a very larg...
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarki...
These days software is not just few lines of code and few number of files, it constitute major part ...
[[abstract]]A new method for software program protection by information sharing and authentication t...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
Many modern defenses against code reuse rely on hiding sensitive data such as shadow stacks in a hug...
Abstract: Application Service Provider (ASP) is a business that makes computer-based services (small...
Software applications contain valuable assets that, if compromised, can make the security of users a...
In this paper we present recent achievements and open problems in software security by obscurity. We...
Software applications which run in a compromised environment and perform sensitive operations, such ...
Watermarking embeds a secret message into a cover mes-sage. In media watermarking the secret is usua...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...
In today’s digital world applications from a computer or a mobile device consistently used to get ev...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Abstract: Software piracy has been major issue for software industries. They have to pay a very larg...
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarki...
These days software is not just few lines of code and few number of files, it constitute major part ...
[[abstract]]A new method for software program protection by information sharing and authentication t...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
Many modern defenses against code reuse rely on hiding sensitive data such as shadow stacks in a hug...
Abstract: Application Service Provider (ASP) is a business that makes computer-based services (small...