Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual property violations, against which the software needs to be protected. The intellectual property that needs to be protected can take on di#erent forms. The software might, e.g., consist itself of proprietary algorithms and datastructures or it could provide controlled access to copyrighted material. Therefore, in recent years, a number of techniques have been explored to protect software. Many of these techniques provide a reasonable level of security against static-only attacks. Many of them however fail to address the problem of dynamic or hybrid static-dynamic attack...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
Software security and protection plays an important role in software engineering. Considerable attem...
Abstract. Reverse engineering of executable programs, by disassembling them and then using program a...
Protecting application software from reverse engineering and piracy is key to ensuring the integrity...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Software watermarks, which can be used to identify the intellectual property owner of a piece softwa...
Within the software industry software piracy is a great concern. In this article we address this iss...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
A computer system's security can be compromised in many ways—a denial-of-service attack can make a s...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Reverse engineering of executable programs, by disassembling them and then using program analyses t...
Reverse engineering of executable programs, by disassembling them and then using program analyses to...
Programs often run under strict usage conditions (e.g., license restrictions) that could be broken i...
A computer system's security can be compromised in many ways a denial-of-service attack can make a s...
Watermarking embeds a secret message into a cover mes-sage. In media watermarking the secret is usua...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
Software security and protection plays an important role in software engineering. Considerable attem...
Abstract. Reverse engineering of executable programs, by disassembling them and then using program a...
Protecting application software from reverse engineering and piracy is key to ensuring the integrity...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Software watermarks, which can be used to identify the intellectual property owner of a piece softwa...
Within the software industry software piracy is a great concern. In this article we address this iss...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
A computer system's security can be compromised in many ways—a denial-of-service attack can make a s...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Reverse engineering of executable programs, by disassembling them and then using program analyses t...
Reverse engineering of executable programs, by disassembling them and then using program analyses to...
Programs often run under strict usage conditions (e.g., license restrictions) that could be broken i...
A computer system's security can be compromised in many ways a denial-of-service attack can make a s...
Watermarking embeds a secret message into a cover mes-sage. In media watermarking the secret is usua...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
Software security and protection plays an important role in software engineering. Considerable attem...
Abstract. Reverse engineering of executable programs, by disassembling them and then using program a...