Tamper Resistant Software by Integrity-Based Encryption

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 1012
  • Download : 1258
DC FieldValueLanguage
dc.contributor.authorLee, Jaewon-
dc.contributor.authorKim, Heeyoul-
dc.contributor.authorYoon, Hyunsoo-
dc.date.accessioned2007-05-28T06:31:40Z-
dc.date.available2007-05-28T06:31:40Z-
dc.date.issued2004-
dc.identifier.citationLecture notes in computer science, v.3320, pp.608-612en
dc.identifier.isbn978-3-540-24013-6-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/379-
dc.descriptionInternational Conference on Parallel and Distributed Computing: Applications and Technologies (PDCAT'04)en
dc.description.abstractThere are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code means some level of assurance that the program will execute as expected even if it encounters the illegitimated modifications. We provide the method of protecting software from unauthorized modification. One important technique is an integrity-based encryption, by which a program, while running, checks itself to verify that it has not been modified and conceals some privacy sensitive parts of program.en
dc.description.sponsorshipThis work was supported by the Korea Science and Engineering Foundation (KOSEF) through the Advanced Information Technology Research Center(AITrc) and University IT Research Center (ITRC) Project.en
dc.language.isoen_USen
dc.publisherSpringer Verlag (Germany)en
dc.subjectSecurityen
dc.subjectTamper Resistant Softwareen
dc.subjectSoftware Protectionen
dc.titleTamper Resistant Software by Integrity-Based Encryptionen
dc.typeArticleen

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0