Sciweavers

Share
416 search results - page 1 / 84
» Some new approaches for preventing software tampering
Sort
View
ACMSE
2006
ACM
11 years 11 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen
ASWEC
2008
IEEE
11 years 11 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
COMPSAC
2006
IEEE
11 years 11 months ago
Preventing Feature Interactions by Constraints
As software systems evolve by adding new extensions some unexpected conflicts may occur, which is known as the Feature Interaction Problem (FIP). FIP is a threat to the dependabil...
Jihong Zuo, Qianxiang Wang, Hong Mei
IH
2007
Springer
11 years 11 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
ISI
2005
Springer
11 years 10 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
books