[go: up one dir, main page]

Oputeh et al., 2015 - Google Patents

Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique

Oputeh et al., 2015

View PDF
Document ID
7110141580479389425
Author
Oputeh C
Ogheneovo E
Publication year
Publication venue
International Journal of Computer Science and Network Security (IJCSNS)

External Links

Snippet

Information exchange has become an essential component in modern society. Vendors provide content to consumers, while consumers exchange information using e-mail, peer-to- peer systems, social networks, or other network applications. We rely on embedded software …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content
    • G06F2221/0737Traceability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Naumovich et al. Preventing piracy, reverse engineering, and tampering
US10002239B2 (en) Data protection systems and methods
Zhou et al. AppInk: watermarking android apps for repackaging deterrence
US7555780B2 (en) Information security method and system
US7228426B2 (en) Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context
JP4702957B2 (en) Tamper resistant virtual machine
EP3455764B1 (en) Method and apparatus for dynamic executable verification
US8225290B2 (en) Systems and methods for regulating execution of computer software
Main et al. Software protection and application security: Understanding the battleground
Lee et al. Classification and analysis of security techniques for the user terminal area in the Internet banking service
Luoma-aho Analysis of Modern Malware: obfuscation techniques
Crăciun et al. Malware in the SGX supply chain: Be careful when signing enclaves!
Wang et al. Tamper resistant software through dynamic integrity checking
Kim et al. A birthmark-based method for intellectual software asset management
Khan et al. A Comparative Analysis of Software Protection Schemes.
Oputeh et al. Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique
Chen et al. A survey of software reverse engineering applications
Chen et al. Cloud licensing model for. NET software protection
Sharov Development of Software to Protect Executable Files
Gilkarov et al. AI-MTD: Zero-Trust Artificial Intelligence Model Security Based on Moving Target Defense
Torbay From Analog Holes to Quantum Attacks: A Critical Analysis and Proposed Expansion of Data Protection Methods Against the Insider Threat
Humbatov et al. Reverse Engineering Attacks on Android Applications: Techniques, Case Studies, and Defense Strategies
Wang Tamper resistance for software protection
Čisar et al. Reverse Engineering and Cyber Security
Vokorokos et al. Malware categorization and recognition problem