Software Protection Method Based on Shell Technology
نویسندگان
چکیده
منابع مشابه
A Software Protection Method Based on Instruction Camouflage
This paper presents a method in which program analysis by a malicious user (attacker) is made difficult by camouflaging (hiding) a large number of instructions contained in the program. In the proposed method, an arbitrary instruction (target) in the program is camouflaged by a different instruction. Using the self-modification mechanism in the program, the original instruction is restored only...
متن کاملAn Attack on SMC-Based Software Protection
Self-modifying codes (SMC) refer to programs that intentionally modify themselves at runtime, causing the runtime code to differ from the static binary representation of the code before execution. Hence SMC is an effective method to obstruct software disassembling. This paper presents a method which circumvents the SMC protection, thus improving the performance of disassembling. By disabling th...
متن کاملChemical Engineering Software and Legal Protection Thereof
In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the market. Generally, software is the product of intellectual creativity, but protection of the intellectual property residing in software is the subject of some controversy. This paper explores the ...
متن کاملGradual Software-Based Memory Protection
Software-based memory protection (MP) provides not only spatial isolation of different applications, but also additional means to detect programming errors within an application. However, this luxury comes at the cost of extra runtime checks that add overhead to the application. In this paper, we present the idea of gradual software-based MP, where we only add a subset of runtime checks to a pr...
متن کاملResearch on Data Leak Protection Technology Based on Trusted Platform
In order to guard against the leakage of important data in the system, a new model of data protection is proposed in the paper, which is also targeted at the shortcomings in the existing data protection technology in the field of data leakage prevention. By taking advantage of TPM data protection technique as well as the combination of symmetric encryption and asymmetric encryption, a new data ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Software Engineering and Applications
سال: 2012
ISSN: 2325-2286,2325-2278
DOI: 10.12677/sea.2012.12009