Sciweavers

264 search results - page 1 / 53
» Software Protection by Hardware and Obfuscation
Sort
View
CSREASAM
2007
13 years 6 months ago
Software Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote serv...
Bin Fu, Sai Aravalli, John Abraham
CASES
2004
ACM
13 years 10 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
ISW
2007
Springer
13 years 11 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
ACST
2006
13 years 6 months ago
Software obfuscation from crackers' viewpoint
Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-cent...
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden
HIPEAC
2005
Springer
13 years 10 months ago
Arc3D: A 3D Obfuscation Architecture
In DRM domain, the adversary has complete control of the computing node - supervisory privileges along with full physical as well as architectural object observational capabilities...
Mahadevan Gomathisankaran, Akhilesh Tyagi