Show
Sort by
-
- Conference Paper
- P1
- open access
Runtime protection via dataflow flattening
-
Instruction set limitation in support of software diversity
-
Towards Tamper Resistant Code Encryption: Practice and Experience
-
- PhD Thesis
- open access
Diversiteit voor softwarebescherming Diversity for Software Protection
(2008) -
A model for self-modifying code
-
Run-time randomization to mitigate tampering
-
- Conference Paper
- C1
- open access
Program Obfuscation: A Quantitative Approach
-
- Conference Paper
- C1
- open access
On the Effectiveness of Source Code Transformations for Binary Obfuscation
-
Proteus: Virtualization for Diversified Tamper-Resistance
-
- Miscellaneous
- open access
Virtualization for Diversified Tamper-Resistance
-
Software protection through dynamic code mutation
-
The State-Enhanced Control Flow Graph
-
Code (De)Obfuscation
-
Code Obfuscation Transformations
-
A Model for Self-Modifying Code
-
Steganography for executables and code transformation signatures
-
Hybrid Static-Dynamic Attacks against Software Protection Mechanisms
-
Hiding Information in Programs
-
Software Piracy Prevention through Diversity
-
Link-time optimization of IA64 binaries
-
GOLIAT: an Optimizing Linker for the IA-64 ArchiTecture