White box cryptography: Another attempt

J Bringer, H Chabanne, E Dottax - Cryptology ePrint Archive, 2006 - eprint.iacr.org
At CMS 2006 Bringer et al. show how to conceal the algebraic structure of a``traceable block
cipher''by adding perturbations to its description. We here exploit and strengthen their ideas …

[PDF][PDF] Self-encrypting code to protect against analysis and tampering

J Cappaert, N Kisserli… - … Benelux Workshop Inf …, 2006 - cosic.esat.kuleuven.be
Confidentiality and data authenticity are two basic concepts in security. The first guarantees
secrecy of a message, while the latter protects its integrity. This paper examines the use of …

A software protection method based on instruction camouflage

Y Kanzaki, A Monden, M Nakamura… - … in Japan (Part III …, 2006 - Wiley Online Library
This paper presents a method in which program analysis by a malicious user (attacker) is
made difficult by camouflaging (hiding) a large number of instructions contained in the …

[PDF][PDF] Software obfuscation from crackers' viewpoint.

H Yamauchi, Y Kanzaki, A Monden, M Nakamura… - ACST, 2006 - profs.sci.univr.it
Various kinds of software obfuscation methods have been proposed to protect security-
sensitive information involved in software implementations. This paper proposes a cracker …

[PDF][PDF] Program intent protection using circuit encryption

JT McDonald, A Yasinsac - Proc of the 8th Intl Symposium on …, 2006 - cis.usouthal.edu
The question of whether obfuscators enjoy well defined security is an important issue to the
security and software development communities. It is widely believed that general …

An event-driven approach to computerizing clinical guidelines using XML

E Mansour, B Wu, K Dube, JX Li - 2006 IEEE Services …, 2006 - ieeexplore.ieee.org
Clinical events form the basis of patient care practice. Their computerization is an important
aid to the work of clinicians. Clinical guidelines or protocols direct clinicians and patients on …

Enhanced security for mobile agent systems

JT McDonald - 2006 - diginole.lib.fsu.edu
Researchers agree that protecting a stand-alone autonomous mobile agent with software-
only approaches remains difficult. In this thesis, we produce several results that enhance …

A flexible and open DRM framework

K Verslype, B De Decker - … and Multimedia Security: 10th IFIP TC-6 TC-11 …, 2006 - Springer
Current DRM implementations rely on obfuscating the inner working of the DRM client.
Moreover, the rights to consume content are rather device bound than person bound. We …

[PDF][PDF] Software security through targetted diversification

G Merckx - 2006 - esat.kuleuven.be
In this thesis we will discuss the concept of diversification as a means of strengthening a
software population. More specifically, we will study the impact the creation of a diverse …

A proposal of encoded computations for distributed massively multiplayer online services

K Endo, M Kawahara, Y Takahashi - Proceedings of the 2006 ACM …, 2006 - dl.acm.org
This paper deals with Massively Multiplayer Online services, which are used to interact with
other user in real time. Although it is possible to distribute the load on the server to users' …