[PDF][PDF] Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
Even the most advanced reverse engineering techniques and products are weak in
recovering data structures in stripped binaries—binaries without symbol tables …
recovering data structures in stripped binaries—binaries without symbol tables …
Protecting white-box AES with dual ciphers
M Karroumi - Information Security and Cryptology-ICISC 2010: 13th …, 2011 - Springer
In order to protect AES software running on untrusted platforms, Chow et al.(2002) designed
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed
recently. Unfortunately, they are commonly designed without any formal approach, which …
recently. Unfortunately, they are commonly designed without any formal approach, which …
[PDF][PDF] White-Box Cryptography.
B Wyseur - 2011 - whiteboxcrypto.com
White-Box Cryptography Cryptography: the basic principle Keys in cryptography
Cryptography is part of our modern life Example: i Page 1 5/03/2009 1 White-Box …
Cryptography is part of our modern life Example: i Page 1 5/03/2009 1 White-Box …
[PDF][PDF] The case for dynamic digital asset protection techniques
C Collberg - Department of Computer Science, University of Arizona, 2011 - Citeseer
The Case for Dynamic Digital Asset Protection Techniques Page 1 The Case for Dynamic
Digital Asset Protection Techniques Christian Collberg Department of Computer Science …
Digital Asset Protection Techniques Christian Collberg Department of Computer Science …
A DRM framework towards preventing digital piracy
RS Veerubhotla, A Saxena - 2011 7th International Conference …, 2011 - ieeexplore.ieee.org
Digital piracy is a major challenge faced by content publishers and software vendors today.
This paper presents a Digital Rights Management (DRM) framework to secure digital content …
This paper presents a Digital Rights Management (DRM) framework to secure digital content …
Watermarking for adaptive streaming protocols
D Jarnikov, JM Doumen - Secure Data Management: 8th VLDB Workshop …, 2011 - Springer
Online multimedia distribution is often done by means of adaptive streaming protocols. To
protect this content, its owners apply a unique watermark to each copy. However, sending a …
protect this content, its owners apply a unique watermark to each copy. However, sending a …
A white-box encryption algorithm for computing with mobile agents
引用本篇文獻時, 請提供DOI, 資訊… - Journal of Internet …, 2011 - airitilibrary.com
A white-box encryption algorithm is proposed for computing using a mobile agent protected
with time-limited black box security. Block matrix multiplication on finite fields and secure …
with time-limited black box security. Block matrix multiplication on finite fields and secure …
[PDF][PDF] A new perspective on providing cloud computing security
A Matrawy, C Liem, M Wiener… - … Conference on Cloud …, 2011 - pdfs.semanticscholar.org
Security issues in cloud computing are ranked high on the list of reasons why many
organizations delay considering the computing paradigm for their future plans. There have …
organizations delay considering the computing paradigm for their future plans. There have …
[PDF][PDF] A survey on different security techniques of mobile code
S Sharma, PS Patheja, AA Waoo… - International Journal of …, 2011 - researchgate.net
Mobile agents are software which moves autonomously through a computer network with
aim to perform some computation or gather information on behalf of its creator or an …
aim to perform some computation or gather information on behalf of its creator or an …