Program protection using software based hardware abstraction
RK Manikyam - 2019 - search.proquest.com
Software is ubiquitous and essential to modern-day life. Software companies typically
embed one or more secrets in their programs to facilitate the management of licensing and …
embed one or more secrets in their programs to facilitate the management of licensing and …
Using blockchains to protect critical infrastructures: a comparison between ethereum and hyperledger fabric
The monitoring and protection of critical infrastructures, especially the ones involving
physical assets (eg, dams, nuclear energy facilities, governmental buildings), constitute a …
physical assets (eg, dams, nuclear energy facilities, governmental buildings), constitute a …
Breaking ad-hoc runtime integrity protection mechanisms in android financial apps
To protect customers' sensitive information, many mobile financial applications include steps
to probe the runtime environment and abort their execution if the environment is deemed to …
to probe the runtime environment and abort their execution if the environment is deemed to …
Behavioral analysis of obfuscated code
F Scrinzi - 2015 - essay.utwente.nl
Classically, the procedure for reverse engineering binary code is to use a disassembler and
to manually reconstruct the logic of the original program. Unfortunately, this is not always …
to manually reconstruct the logic of the original program. Unfortunately, this is not always …
Two IP protection schemes for multi-FPGA systems
This paper proposes two novel protection schemes for multi-FPGA systems providing high
security of IP designs licensed by IP vendors to system integrators and installed remotely in …
security of IP designs licensed by IP vendors to system integrators and installed remotely in …
HACIT: a privacy preserving and low cost solution for dynamic navigation and Forensics in VANET
K Decoster, D Billard - … of the 4th International Conference on …, 2018 - arodes.hes-so.ch
Résumé The current architecture for VANET related services relies on a Client-Server
approach and leads to numerous drawbacks, such as network congestion due to the …
approach and leads to numerous drawbacks, such as network congestion due to the …
Remotely Observing Reverse Engineers to Evaluate Software Protection
C Taylor - 2022 - search.proquest.com
Software often contains proprietary information---algorithms, intellectual property, and
encryption keys, for example---which malicious actors seek to access through reverse …
encryption keys, for example---which malicious actors seek to access through reverse …
[PDF][PDF] Implementation of white-box cryptography in credit card processing combined with code obfuscation
N Yadav, S Tanwar - International Journal of Computer …, 2013 - researchgate.net
White box cryptographic algorithms aim to denying the key readout even if the source code
embedding the key is disclosed. Full-privileged attack software shares a host with …
embedding the key is disclosed. Full-privileged attack software shares a host with …
Development of security mechanisms for a remote sensing system based on opportunistic and mesh networks
LS dos Santos, PRM Nascimento… - … on Metrology for …, 2020 - ieeexplore.ieee.org
The present work describes a remote environment monitoring system based on the
paradigms of mesh networks and opportunistic networks, whereby a sensor node can …
paradigms of mesh networks and opportunistic networks, whereby a sensor node can …
A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment
DH Choi, CK Hong - Journal of Convergence for Information …, 2019 - koreascience.kr
Recently, in the field of next-generation e-commerce and finance, interest in blockchain-
based technologies such as Bitcoin and Ethereum is great. Although the security of …
based technologies such as Bitcoin and Ethereum is great. Although the security of …