Sciweavers

ACST
2006
13 years 5 months ago
Software obfuscation from crackers' viewpoint
Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-cent...
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden
CSREASAM
2007
13 years 5 months ago
Software Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote serv...
Bin Fu, Sai Aravalli, John Abraham