Protecting Software Code by Guards
暂无分享,去创建一个
[1] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[2] Bennet S. Yee,et al. Secure Coprocessors in Electronic Commerce Applications , 1995, USENIX Workshop on Electronic Commerce.
[3] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[4] Steve R. White,et al. ABYSS: An Architecture for Software Protection , 1990, IEEE Trans. Software Eng..
[5] Christian S. Collberg,et al. Breaking abstractions and unstructuring data structures , 1998, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225).
[6] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[7] Dieter Gollmann,et al. Software License Management with Smart Cards , 1999, Smartcard.
[8] Josh MacDonald. On Program Security and Obfuscation , 1998 .
[9] Jack W. Davidson,et al. Software Tamper Resistance: Obstructing Static Analysis of Programs , 2000 .
[10] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[11] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[12] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[13] Eiji Okamoto,et al. A tentative approach to constructing tamper-resistant software , 1998, NSPW '97.