Self-Checking Tamper-Proofing Based on Software Behavior Model
暂无分享,去创建一个
[1] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[2] Hyunsoo Yoon,et al. Tamper Resistant Software by Integrity-Based Encryption , 2004, PDCAT.
[3] Robert E. Tarjan,et al. Dynamic Self-Checking Techniques for Improved Tamper Resistance , 2001, Digital Rights Management Workshop.
[4] Ramarathnam Venkatesan,et al. Oblivious Hashing: A Stealthy Software Integrity Verification Primitive , 2002, Information Hiding.
[5] Ping Wang. Tamper Resistance for Software Protection , 2005 .
[6] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.