2011
DOI: 10.1109/mis.2011.106
|View full text |Cite
|
Sign up to set email alerts
|

Toward Digital Asset Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 35 publications
(18 citation statements)
references
References 1 publication
0
18
0
Order By: Relevance
“…Note that standard encryption is only partially applicable for protecting S in this scenario: The transformed code has to be executable while being protected. Protection is therefore implemented as obfuscation [8]. Essentially, an obfuscation is a compiler that transforms an input program p into a semantically equivalent one O(p) but harder to analyse and reverse engineer.…”
Section: The Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…Note that standard encryption is only partially applicable for protecting S in this scenario: The transformed code has to be executable while being protected. Protection is therefore implemented as obfuscation [8]. Essentially, an obfuscation is a compiler that transforms an input program p into a semantically equivalent one O(p) but harder to analyse and reverse engineer.…”
Section: The Scenariomentioning
confidence: 99%
“…In case (3), failurepath(s # , K, p, φ) (line 7) returns an abstract path that is a counterexample for φ, in the other cases the function failurepath(s # , K, p, φ) returns null and the algorithm enters a cycle (to be executed at most twice, see lines [8][9][10][11][12] that transforms the Kripke structure and the program to move from cases (1-2) back to case (3), in a way that we will explain later. Once a failure path π # is found whose failure state is s # , we consider the partition of concrete states in s # in the three classes bad, dead and irrelevant.…”
Section: Best Code Obfuscation Strategymentioning
confidence: 99%
“…Time diversity was firstly presented by Christian Collberg, and he believed that the time or space diversity is the necessary condition to ensure software suffer lasting protection [1], [20]. The so-called time diversity refers that the program after ... Fig.…”
Section: Dynamic Guarding Net: An Approach Against Cumulative Attackmentioning
confidence: 99%
“…From a concealed point of view, the variables is randomly generated, so it is difficult for an attacker to restore the original state based on the scope of the program. The prospect of important application of Obfuscation algorithm has become a hotly issues of code protection, till now the production of Collberg and his colleague, who come from the University of Auckland in New Zealand [8], has gain the greatest impact, but we still need to spend much of time on the measure and implement of the obfuscation algorithm. The core of such code obfuscation tech is to design different kind of algorithms in order to achieve the best performance.…”
Section: B Experimentationmentioning
confidence: 99%