Software applications contain valuable assets that, if compromised, can make the security of users at stake and cause huge monetary losses for software developers. Software protections are applied whenever assets' security is at risk as they delay successful attacks. Unfortunately, protections might have recognizable fingerprints that can expose the location of the assets, thus facilitating the attackers' job. This paper presents a novel approach that uses three main methods to hide the protected assets: protection fingerprint replication, enlargement, and shadowing. The best way to hide assets is determined with a Mixed Integer Linear Program, which is automatically built starting from the code structure, the protected assets, and a model ...
Abstract: Application Service Provider (ASP) is a business that makes computer-based services (small...
Within the software industry software piracy is a great concern. In this article we address this iss...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
Software applications contain valuable assets that, if compromised, can make the security of users a...
Software applications which run in a compromised environment and perform sensitive operations, such ...
In this paper we present recent achievements and open problems in software security by obscurity. We...
Watermarking embeds a secret message into a cover mes-sage. In media watermarking the secret is usua...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Abstract: Software piracy has been major issue for software industries. They have to pay a very larg...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
In today’s digital world applications from a computer or a mobile device consistently used to get ev...
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarki...
[[abstract]]A new method for software program protection by information sharing and authentication t...
These days software is not just few lines of code and few number of files, it constitute major part ...
Abstract: Application Service Provider (ASP) is a business that makes computer-based services (small...
Within the software industry software piracy is a great concern. In this article we address this iss...
In this thesis, we report our research on systematic security hardening. We see how the software dev...
Software applications contain valuable assets that, if compromised, can make the security of users a...
Software applications which run in a compromised environment and perform sensitive operations, such ...
In this paper we present recent achievements and open problems in software security by obscurity. We...
Watermarking embeds a secret message into a cover mes-sage. In media watermarking the secret is usua...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Abstract: Software piracy has been major issue for software industries. They have to pay a very larg...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
In today’s digital world applications from a computer or a mobile device consistently used to get ev...
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarki...
[[abstract]]A new method for software program protection by information sharing and authentication t...
These days software is not just few lines of code and few number of files, it constitute major part ...
Abstract: Application Service Provider (ASP) is a business that makes computer-based services (small...
Within the software industry software piracy is a great concern. In this article we address this iss...
In this thesis, we report our research on systematic security hardening. We see how the software dev...