[PDF][PDF] Howard: A Dynamic Excavator for Reverse Engineering Data Structures.

A Slowinska, T Stancescu, H Bos - NDSS, 2011 - ndss-symposium.org
Even the most advanced reverse engineering techniques and products are weak in
recovering data structures in stripped binaries—binaries without symbol tables …

Protecting white-box AES with dual ciphers

M Karroumi - Information Security and Cryptology-ICISC 2010: 13th …, 2011 - Springer
In order to protect AES software running on untrusted platforms, Chow et al.(2002) designed
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …

A framework for analyzing RFID distance bounding protocols

G Avoine, MA Bingöl, S Kardaş… - Journal of …, 2011 - content.iospress.com
Many distance bounding protocols appropriate for the RFID technology have been proposed
recently. Unfortunately, they are commonly designed without any formal approach, which …

[PDF][PDF] White-Box Cryptography.

B Wyseur - 2011 - whiteboxcrypto.com
White-Box Cryptography Cryptography: the basic principle Keys in cryptography
Cryptography is part of our modern life Example: i Page 1 5/03/2009 1 White-Box …

[PDF][PDF] The case for dynamic digital asset protection techniques

C Collberg - Department of Computer Science, University of Arizona, 2011 - Citeseer
The Case for Dynamic Digital Asset Protection Techniques Page 1 The Case for Dynamic
Digital Asset Protection Techniques Christian Collberg Department of Computer Science …

A DRM framework towards preventing digital piracy

RS Veerubhotla, A Saxena - 2011 7th International Conference …, 2011 - ieeexplore.ieee.org
Digital piracy is a major challenge faced by content publishers and software vendors today.
This paper presents a Digital Rights Management (DRM) framework to secure digital content …

Watermarking for adaptive streaming protocols

D Jarnikov, JM Doumen - Secure Data Management: 8th VLDB Workshop …, 2011 - Springer
Online multimedia distribution is often done by means of adaptive streaming protocols. To
protect this content, its owners apply a unique watermark to each copy. However, sending a …

A white-box encryption algorithm for computing with mobile agents

引用本篇文獻時, 請提供DOI, 資訊… - Journal of Internet …, 2011 - airitilibrary.com
A white-box encryption algorithm is proposed for computing using a mobile agent protected
with time-limited black box security. Block matrix multiplication on finite fields and secure …

[PDF][PDF] A new perspective on providing cloud computing security

A Matrawy, C Liem, M Wiener… - … Conference on Cloud …, 2011 - pdfs.semanticscholar.org
Security issues in cloud computing are ranked high on the list of reasons why many
organizations delay considering the computing paradigm for their future plans. There have …

[PDF][PDF] A survey on different security techniques of mobile code

S Sharma, PS Patheja, AA Waoo… - International Journal of …, 2011 - researchgate.net
Mobile agents are software which moves autonomously through a computer network with
aim to perform some computation or gather information on behalf of its creator or an …