2003
DOI: 10.1109/mc.2003.1212692
|View full text |Cite
|
Sign up to set email alerts
|

Cover feature - Preventing piracy, reverse engineering, and tampering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 65 publications
(31 citation statements)
references
References 3 publications
0
31
0
Order By: Relevance
“…However, our black-box approach tends to be faster than those approaches and even works with obfuscated code [van Oorschot 2003;Naumovich and Memon 2003]. For many exploits, our black-box technique can produce signatures close to their signatures in quality, as we report in our experimental study.…”
Section: Contributionsmentioning
confidence: 63%
“…However, our black-box approach tends to be faster than those approaches and even works with obfuscated code [van Oorschot 2003;Naumovich and Memon 2003]. For many exploits, our black-box technique can produce signatures close to their signatures in quality, as we report in our experimental study.…”
Section: Contributionsmentioning
confidence: 63%
“…Since Android apps are java based so protection techniques based on obfuscation that are used to prevent reverse engineering of java bytecode have been researched and applied to dalvik bytecode as well. Code obfuscation is a technique in which a program is automatically transformed in such a way that its functionality remains the same while it is more difficult to reverse engineer [11], [12]. Obfuscation is a useful and cost effective technique and it doesn't require any special execution environment.…”
Section: International Journal Ofmentioning
confidence: 99%
“…McLoughlin et al [132] divided those techniques into two classes: passive and active methods. Passive methods are statically introduced and implemented at fixed time, such as obfuscation [133] and watermarking [134]. For example, watermarking is widely used to prove the ownership of a give file, database or media content [135].…”
Section: Innovation Capability and Reverse Engineering Mitigationmentioning
confidence: 99%