Program protection using software based hardware abstraction

RK Manikyam - 2019 - search.proquest.com
Software is ubiquitous and essential to modern-day life. Software companies typically
embed one or more secrets in their programs to facilitate the management of licensing and …

Using blockchains to protect critical infrastructures: a comparison between ethereum and hyperledger fabric

WSM Jr, LSD Santos, LMS Bento… - … Journal of Security …, 2022 - inderscienceonline.com
The monitoring and protection of critical infrastructures, especially the ones involving
physical assets (eg, dams, nuclear energy facilities, governmental buildings), constitute a …

Breaking ad-hoc runtime integrity protection mechanisms in android financial apps

T Kim, H Ha, S Choi, J Jung, BG Chun - Proceedings of the 2017 ACM on …, 2017 - dl.acm.org
To protect customers' sensitive information, many mobile financial applications include steps
to probe the runtime environment and abort their execution if the environment is deemed to …

Behavioral analysis of obfuscated code

F Scrinzi - 2015 - essay.utwente.nl
Classically, the procedure for reverse engineering binary code is to use a disassembler and
to manually reconstruct the logic of the original program. Unfortunately, this is not always …

Two IP protection schemes for multi-FPGA systems

L Gaspar, V Fischer, T Güneysu… - … Computing and FPGAs, 2012 - ieeexplore.ieee.org
This paper proposes two novel protection schemes for multi-FPGA systems providing high
security of IP designs licensed by IP vendors to system integrators and installed remotely in …

HACIT: a privacy preserving and low cost solution for dynamic navigation and Forensics in VANET

K Decoster, D Billard - … of the 4th International Conference on …, 2018 - arodes.hes-so.ch
Résumé The current architecture for VANET related services relies on a Client-Server
approach and leads to numerous drawbacks, such as network congestion due to the …

Remotely Observing Reverse Engineers to Evaluate Software Protection

C Taylor - 2022 - search.proquest.com
Software often contains proprietary information---algorithms, intellectual property, and
encryption keys, for example---which malicious actors seek to access through reverse …

[PDF][PDF] Implementation of white-box cryptography in credit card processing combined with code obfuscation

N Yadav, S Tanwar - International Journal of Computer …, 2013 - researchgate.net
White box cryptographic algorithms aim to denying the key readout even if the source code
embedding the key is disclosed. Full-privileged attack software shares a host with …

Development of security mechanisms for a remote sensing system based on opportunistic and mesh networks

LS dos Santos, PRM Nascimento… - … on Metrology for …, 2020 - ieeexplore.ieee.org
The present work describes a remote environment monitoring system based on the
paradigms of mesh networks and opportunistic networks, whereby a sensor node can …

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment

DH Choi, CK Hong - Journal of Convergence for Information …, 2019 - koreascience.kr
Recently, in the field of next-generation e-commerce and finance, interest in blockchain-
based technologies such as Bitcoin and Ethereum is great. Although the security of …