Sciweavers

183 search results - page 2 / 37
» Software Protection Through Dynamic Code Mutation
Sort
View
ICSM
2009
IEEE
13 years 12 months ago
Detecting virus mutations via dynamic matching
To defeat current commercial antivirus software, the virus developers are employing obfuscation techniques to create mutating viruses. The current antivirus software cannot handle...
Min Feng, Rajiv Gupta
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 5 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
CGO
2006
IEEE
13 years 9 months ago
Dynamic Class Hierarchy Mutation
Class hierarchies in object-oriented programs are used to capture various attributes of the underlying objects they represent, allowing programmers to encapsulate common attribute...
Lixin Su, Mikko H. Lipasti
CSMR
1998
IEEE
13 years 9 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
EUROSYS
2006
ACM
14 years 2 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...