[[abstract]]A new method for software program protection by information sharing and authentication techniques using invisible ASCII control codes is proposed. A scheme for sharing a secret source program written in Visual C++ among a group of participants, each holding a camouflage program to hide a share, is first proposed for safe keeping of the secret program. Only when all the shares hidden in the camouflage programs are collected can the secret program be recovered. The secret program, after being exclusive-ORed with all the camouflage programs, is divided into shares. Each share is encoded next into a sequence of special ASCII control codes which are invisible when the codes are inserted in the comment of the Visual C++ program and vi...
Abstract — Steganography is the art and science of hiding information (secret message) within other ...
In the current market, extensive software development is taking place and the software industry is t...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
A new method for software program protection by infor-mation sharing and authentication techniques u...
Software applications which run in a compromised environment and perform sensitive operations, such ...
COMPAC 2003 : 27th Annual International Computer Software and Applications Conference, 3-6 Nov. 2003...
This paper proposes a novel method for watermarking C source code by exploiting the programming lang...
In this paper we present recent achievements and open problems in software security by obscurity. We...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
Many recent nonproliferation and arms control software projects include a software authentication re...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...
Previously software is distributed to the users by using devices like CD.S and floppies and in the ...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...
Abstract — Steganography is the art and science of hiding information (secret message) within other ...
In the current market, extensive software development is taking place and the software industry is t...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
A new method for software program protection by infor-mation sharing and authentication techniques u...
Software applications which run in a compromised environment and perform sensitive operations, such ...
COMPAC 2003 : 27th Annual International Computer Software and Applications Conference, 3-6 Nov. 2003...
This paper proposes a novel method for watermarking C source code by exploiting the programming lang...
In this paper we present recent achievements and open problems in software security by obscurity. We...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
Many recent nonproliferation and arms control software projects include a software authentication re...
With the advancement of reverse engineering technology, the rise in software piracy and program hack...
Previously software is distributed to the users by using devices like CD.S and floppies and in the ...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...
Abstract — Steganography is the art and science of hiding information (secret message) within other ...
In the current market, extensive software development is taking place and the software industry is t...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...