Author:
Blietz Brian,Tyagi Akhilesh
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Aucsmith, D.: Tamper Resistant Software: An Implementation. In: Proceedings of the First International Workshop on Information Hiding (1996)
2. Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection (2000)
3. Jun, G.: Software Obfuscation with Program Permutation. M.S. Thesis, Dept. of Computer Science, Iowa State University, Ames, IA (2004)
4. Goloubeva, O., Rebaudengo, M., Sonza Reorda, M., Violante, M.: Soft-error Detection Using Control Flow Assertions. Politecnico di Torino, Dipartimento di Automatica e Informatica, Torino, Italy (2003)
5. Horne, B., Matheson, L., Sheehan, C., Tarjan, R.: Dynamic Self-Checking Techniques for Improved Tamper Resistance. In: ACM Workshop on Security and Privacy in Digital Rights Management (2002)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Taxonomy of Software Integrity Protection Techniques;Advances in Computers;2019
2. Detecting Patching of Executables without System Calls;Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy;2017-03-22
3. Automatic Defensive Security System for WEB Information;Advances in Intelligent and Soft Computing;2012