Tamper Resistance for Software Defined Radio Software
暂无分享,去创建一个
[1] Hongxia Jin,et al. Towards Better Software Tamper Resistance , 2005, ISC.
[2] Dan Boneh,et al. Attacking an Obfuscated Cipher by Injecting Faults , 2002, Digital Rights Management Workshop.
[3] Paul C. van Oorschot,et al. A generic attack on checksumming-based software tamper resistance , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[4] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[5] Akhilesh Tyagi,et al. Software Tamper Resistance Through Dynamic Program Monitoring , 2005, DRMTICS.
[6] Akito Monden,et al. Tamper-Resistant Software System Based on a Finite State Machine , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[7] Koen De Bosschere,et al. Towards Tamper Resistant Code Encryption: Practice and Experience , 2008, ISPEC.
[8] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[9] Ping Wang,et al. Tamper Resistant Software Through Dynamic Integrity Checking , 2005 .
[10] Robert G. Cole,et al. Voice over IP performance monitoring , 2001, CCRV.
[11] Jonathon T. Giffin,et al. Strengthening software self-checksumming via self-modifying code , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[12] Koen De Bosschere,et al. DIOTA: Dynamic Instrumentation, Optimization and Transformation of Applications , 2002, PACT 2002.
[13] Robert E. Tarjan,et al. Dynamic Self-Checking Techniques for Improved Tamper Resistance , 2001, Digital Rights Management Workshop.