Sciweavers

410 search results - page 11 / 82
» Software Protection with Code Mobility
Sort
View
85
Voted
IJNSEC
2008
83views more  IJNSEC 2008»
14 years 10 months ago
Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality
In this paper we present a novel dynamic verification approach to protect the local host confidentiality from malicious Java mobile code. In our approach we use Bytecode Modificat...
Dan Lu, Yoshitake Kobayashi, Ken Nakayama, Mamoru ...
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
15 years 2 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
CODES
2006
IEEE
15 years 2 months ago
Application-specific workload shaping in multimedia-enabled personal mobile devices
Today, most personal mobile devices (e.g. cell phones and PDAs) are multimedia-enabled and support a variety of concurrently running applications such as audio/video players, word...
Balaji Raman, Samarjit Chakraborty
ISW
2005
Springer
15 years 3 months ago
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
Hongxia Jin, Ginger Myles, Jeffery Lotspiech
SCAM
2007
IEEE
15 years 4 months ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...