Author:
Ahmadvand Mohsen,Pretschner Alexander,Kelbert Florian
Reference91 articles.
1. Watermarking, tamper-proofing, and obfuscation-tools for software protection;Collberg;IEEE Trans. Softw. Eng.,2002
2. Man-at-the-end attacks: analysis, taxonomy, human aspects, motivation and future directions;Akhunzada;J. Netw. Comput. Appl.,2015
3. A generic attack on checksumming-based software tamper resistance;Wurster,2005
4. Hardware-assisted circumvention of self-hashing software tamper resistance;Van Oorschot;IEEE Trans. Dependable Secure Comput.,2005
5. Terra: a virtual machine-based platform for trusted computing;Garfinkel,2003
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献