Oputeh et al., 2015 - Google Patents
Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying TechniqueOputeh et al., 2015
View PDF- Document ID
- 7110141580479389425
- Author
- Oputeh C
- Ogheneovo E
- Publication year
- Publication venue
- International Journal of Computer Science and Network Security (IJCSNS)
External Links
Snippet
Information exchange has become an essential component in modern society. Vendors provide content to consumers, while consumers exchange information using e-mail, peer-to- peer systems, social networks, or other network applications. We rely on embedded software …
- 238000000034 method 0 title abstract description 38
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Naumovich et al. | Preventing piracy, reverse engineering, and tampering | |
| US10002239B2 (en) | Data protection systems and methods | |
| Zhou et al. | AppInk: watermarking android apps for repackaging deterrence | |
| US7555780B2 (en) | Information security method and system | |
| US7228426B2 (en) | Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context | |
| JP4702957B2 (en) | Tamper resistant virtual machine | |
| EP3455764B1 (en) | Method and apparatus for dynamic executable verification | |
| US8225290B2 (en) | Systems and methods for regulating execution of computer software | |
| Main et al. | Software protection and application security: Understanding the battleground | |
| Lee et al. | Classification and analysis of security techniques for the user terminal area in the Internet banking service | |
| Luoma-aho | Analysis of Modern Malware: obfuscation techniques | |
| Crăciun et al. | Malware in the SGX supply chain: Be careful when signing enclaves! | |
| Wang et al. | Tamper resistant software through dynamic integrity checking | |
| Kim et al. | A birthmark-based method for intellectual software asset management | |
| Khan et al. | A Comparative Analysis of Software Protection Schemes. | |
| Oputeh et al. | Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique | |
| Chen et al. | A survey of software reverse engineering applications | |
| Chen et al. | Cloud licensing model for. NET software protection | |
| Sharov | Development of Software to Protect Executable Files | |
| Gilkarov et al. | AI-MTD: Zero-Trust Artificial Intelligence Model Security Based on Moving Target Defense | |
| Torbay | From Analog Holes to Quantum Attacks: A Critical Analysis and Proposed Expansion of Data Protection Methods Against the Insider Threat | |
| Humbatov et al. | Reverse Engineering Attacks on Android Applications: Techniques, Case Studies, and Defense Strategies | |
| Wang | Tamper resistance for software protection | |
| Čisar et al. | Reverse Engineering and Cyber Security | |
| Vokorokos et al. | Malware categorization and recognition problem |