2011
DOI: 10.4218/etrij.11.0110.0056
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Code Encryption Scheme Based on Indexed Table

Abstract: Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important part of the code encryption scheme. However, previous schemes had problems with key management. In an effort to solve these problems in this paper, we survey the previous code… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0
1

Year Published

2012
2012
2015
2015

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 11 publications
0
7
0
1
Order By: Relevance
“…TV-Anytime (TVA)은 XML을 PVR (Personal Video Recoder)이나 디지털방송 서비스에 적용하기 위해 서비스, 콘텐츠 정보 표현용 스키마와 전송 프 로토콜을 정의하였고, 많은 방송 규격에서 참조 문 서로 활용하고 있다 [2,3] . [4,5] . 은 XML 기반의 프로토콜에 의해 이루어질 것으로 예상된다.…”
Section: 기반으로 정보를 기술하는 언어로 높은 가독성과 확장성으로 인해 다양한 영역에서 서비스나 콘텐츠unclassified
“…TV-Anytime (TVA)은 XML을 PVR (Personal Video Recoder)이나 디지털방송 서비스에 적용하기 위해 서비스, 콘텐츠 정보 표현용 스키마와 전송 프 로토콜을 정의하였고, 많은 방송 규격에서 참조 문 서로 활용하고 있다 [2,3] . [4,5] . 은 XML 기반의 프로토콜에 의해 이루어질 것으로 예상된다.…”
Section: 기반으로 정보를 기술하는 언어로 높은 가독성과 확장성으로 인해 다양한 영역에서 서비스나 콘텐츠unclassified
“…Moreover, time cost and space cost should also be taken into consideration. Thus, a novel cryptographic technique is proposed in this approach which is the extension of the (Sungkyu Cho et al 2011) approach [19,33,34].…”
Section: Literature Surveymentioning
confidence: 99%
“…Key management is the essential segment of the code encryption approach. Thus, (Sungkyu Cho et al 2011) [19,33,34].proposed an approach which analyzed the previous code encryption approaches and then presented a code encryption scheme based on an indexed table.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations