Show
Sort by
-
Instruction set limitation in support of software diversity
-
Towards Tamper Resistant Code Encryption: Practice and Experience
-
A model for self-modifying code
-
Run-time randomization to mitigate tampering
-
- Conference Paper
- C1
- open access
Program Obfuscation: A Quantitative Approach
-
- Conference Paper
- C1
- open access
On the Effectiveness of Source Code Transformations for Binary Obfuscation
-
Software protection through dynamic code mutation
-
Code (De)Obfuscation
-
Steganography for executables and code transformation signatures
-
Hybrid Static-Dynamic Attacks against Software Protection Mechanisms