Innovations and Advanced Techniques in Computer and Information Sciences and Engineering
DOI: 10.1007/978-1-4020-6268-1_45
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Software Protection Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Existing software based approaches often exploit using a number of software protection techniques including obfuscation [1], [2], code encryption [3], [4] and selfchecksumming [5], [6]. Some other protection techniques can be found in [7], [8]. Code encryption could involve a large execution overhead; thus, we do not consider using this technique.…”
Section: Related Workmentioning
confidence: 99%
“…Existing software based approaches often exploit using a number of software protection techniques including obfuscation [1], [2], code encryption [3], [4] and selfchecksumming [5], [6]. Some other protection techniques can be found in [7], [8]. Code encryption could involve a large execution overhead; thus, we do not consider using this technique.…”
Section: Related Workmentioning
confidence: 99%
“…A code encryption scheme encrypts the binary executable code. This is accomplished by encrypting the program at some point after it is compiled [6], [7]. However, skillful reverse engineers can easily find the secret key.…”
Section: Introductionmentioning
confidence: 99%
“…However, from this huge available published literature, it becomes very difficult for the scientific community to know which topics have been evolved from which other topics, what are relationship types and strengths between topics and some similar questions [1][2][3][4][5][6][7]. The current search engines such as Google, Bing, Yahoo, citation indexes: Google Scholar, Cite Seer, ISI Web of Knowledge, and digital libraries: IEEE, ACM, and Springer, do not keep any track of that kind of relationship between the topic 1 *Corresponding Author One important part of Topic Evolution is a representation of results to the user.…”
Section: Introductionmentioning
confidence: 99%