Protecting Software Codes By Guards
暂无分享,去创建一个
[1] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[2] Bennet S. Yee,et al. Secure Coprocessors in Electronic Commerce Applications , 1995, USENIX Workshop on Electronic Commerce.
[3] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[4] Eiji Okamoto,et al. A tentative approach to constructing tamper-resistant software , 1998, NSPW '97.
[5] Dieter Gollmann,et al. Software License Management with Smart Cards , 1999, Smartcard.
[6] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[7] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[8] Steve R. White,et al. ABYSS: An Architecture for Software Protection , 1990, IEEE Trans. Software Eng..
[9] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[10] Jack W. Davidson,et al. Software Tamper Resistance: Obstructing Static Analysis of Programs , 2000 .
[11] Christian S. Collberg,et al. Breaking abstractions and unstructuring data structures , 1998, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225).