Abstract
Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers' actions.
Original language | English |
---|---|
Title of host publication | Proceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology |
Pages | 286-291 |
Number of pages | 6 |
Publication status | Published - 2006 |
Externally published | Yes |
Event | 7th IASTED International Conference on Advances in Computer Science and Technology - Puerto Vallarta, Mexico Duration: Jan 23 2006 → Jan 25 2006 |
Other
Other | 7th IASTED International Conference on Advances in Computer Science and Technology |
---|---|
Country | Mexico |
City | Puerto Vallarta |
Period | 1/23/06 → 1/25/06 |
Keywords
- Attacks
- Information leakage
- Software protection
- Symmetric-key cryptography
- Tamper-resistance
ASJC Scopus subject areas
- Engineering(all)
Cite this
Software obfuscation from crackers' viewpoint. / Yamauchi, Hiroki; Kanzaki, Yuichiro; Monden, Akito; Nakamura, Masahide; Matsumoto, Ken Ichi.
Proceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology. 2006. p. 286-291.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
}
TY - GEN
T1 - Software obfuscation from crackers' viewpoint
AU - Yamauchi, Hiroki
AU - Kanzaki, Yuichiro
AU - Monden, Akito
AU - Nakamura, Masahide
AU - Matsumoto, Ken Ichi
PY - 2006
Y1 - 2006
N2 - Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers' actions.
AB - Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers' actions.
KW - Attacks
KW - Information leakage
KW - Software protection
KW - Symmetric-key cryptography
KW - Tamper-resistance
UR - http://www.scopus.com/inward/record.url?scp=33847210738&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33847210738&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:33847210738
SN - 0889865477
SN - 9780889865471
SP - 286
EP - 291
BT - Proceedings of the Seventh IASTED International Conference on Advances in Computer Science and Technology
ER -