A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance
2005
IEEE Transactions on Professional Communication
Appealing aspects of this approach to software tamper resistance include the promise of being able to verify the integrity of software independent of the external support environment, as well as the ability ...
The generality and efficiency of our attack suggests that self-hashing is not a viable strategy for high-security tamper resistance on modern computer systems. ...
The first author acknowledges NSERC for funding an NSERC Discovery Grant and his Canada Research Chair in Network and Software Security. ...
doi:10.1109/tdsc.2005.24
fatcat:dugsmq4ugjeubfujudsklqzk5u
Towards Tamper Resistant Code Encryption: Practice and Experience
[chapter]
2008
Lecture Notes in Computer Science
In recent years, many have suggested to apply encryption in the domain of software protection against malicious hosts. ...
Our scheme offers maximal protection against both static and dynamic code analysis and tampering. We validate our techniques by applying them on several benchmark programs of the CPU2006 Test Suite. ...
), the Concerted Research Action (GOA) Ambiorics 2005/11 of the Flemish Government, and by the BCRYPT Interuniversity Attraction Pole (IAP VI/26) programme of the Belgian government. ...
doi:10.1007/978-3-540-79104-1_7
fatcat:hvcg3ip5hne25ivbcege3zfx3q
Virtual machine-provided context sensitive page mappings
2008
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '08
We demonstrate the utility of our technique in a case study by instrumenting and modifying self-checksumming tamper-resistant binaries. ...
Previous work has demonstrated several applications of context sensitive page mappings, including protection against buffer-overrun attacks and circumvention of self-checksumming codes. ...
Acknowledgments This work is supported in part by Department of Energy Grants DE-FG02-93ER25176 and DE-FG02-01ER25510, and National Science Foundataion grant 0627501 The U.S. ...
doi:10.1145/1346256.1346268
dblp:conf/vee/RosenblumCM08
fatcat:micojcwh6zddnptiolqg5vhbva
SAFE-OPS: An approach to embedded software security
2005
ACM Transactions on Embedded Computing Systems
In this paper, we introduce a unique approach to embedded software protection that utilizes a hardware/software codesign methodology. ...
The growing area of software protection attempts to address the key steps used by hackers in attacking a software system. ...
ACKNOWLEDGMENTS The authors would like to thank the anonymous referees for their valuable feedback on the earlier drafts of this paper. ...
doi:10.1145/1053271.1053279
fatcat:d5yzwdjhtzdhhoezgs4kli4pla
Security Issues and Solutions in Wireless Sensor Networks
2017
International Journal of Computer Applications
Then we give a holistic overview of security issues. ...
Along the way we analyze the advantages and disadvantages of current secure schemes in each category. ...
WSNs, some implement their schemes by softwarebased, while others use hardware to assist their mechanisms. • Software-based approach: In software-based approaches, such as , rely on optimal program code ...
doi:10.5120/ijca2017913256
fatcat:xkjnmdihh5bitpm66p5klr6gfa
Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies
[article]
2017
arXiv
pre-print
the use of a variety of worms, botnets, malware, viruses and P2P file sharing. ...
The types of crimes aided by P2P technology include copyright infringement, sharing of illicit images of children, fraud, hacking/cracking, denial of service attacks and virus/malware propagation through ...
Collision Resistance The measure of the unlikelihood of two different inputs to a hashing function returning the same hash sum is known as the collision resistance of the hash function. ...
arXiv:1712.03455v1
fatcat:brkwhni6vza2dm7ristaj5gyoa
A Study of Security Isolation Techniques
2016
ACM Computing Surveys
Security isolation is a foundation of computing systems that enables resilience to different forms of attacks. ...
We apply our classification to a set of representative papers that cover a breadth of security isolation techniques and discuss trade-offs among different design choices and limitations of existing approaches ...
Any opinions, conclusions or recommendations expressed in this article are those of the authors and do not necessarily reflect the views of the funding agencies. ...
doi:10.1145/2988545
fatcat:5llqb3ghnjgghh2yye4vqslz4y
Humanode Whitepaper: You are [not] a bot
[article]
2021
arXiv
pre-print
The advent of blockchain technology has led to a massive wave of different decentralized ledger technology (DLT) solutions. ...
All of these implemented technologies have nuances that are crucial for the integrity of the network. ...
' of the biometric modality, 'Accuracy' of the biometric method, a low level of 'Circumvention', and the 'Hardware' type used. ...
arXiv:2111.13189v1
fatcat:6pc4nj46sjdkvketwydvwh2ulu
Tithonus: A Bitcoin Based Censorship Resilient System
2019
Proceedings on Privacy Enhancing Technologies
When compared to state-of-the-art Bitcoin writing solutions, Tithonus reduces the cost of transferring data to censored clients by 2 orders of magnitude and increases the goodput by 3 to 5 orders of magnitude ...
In this paper we introduce Tithonus, a framework that builds on the Bitcoin blockchain and network to provide censorship-resistant communication mechanisms. ...
-Bitcoin based censorship circumvention. ...
doi:10.2478/popets-2019-0005
dblp:journals/popets/RecabarrenC19
fatcat:2pjsytmi7faphmcykdq2wo5zau
Tithonus: A Bitcoin Based Censorship Resilient System
[article]
2018
arXiv
pre-print
When compared to state-of-the-art Bitcoin writing solutions, Tithonus reduces the cost of transferring data to censored clients by 2 orders of magnitude and increases the goodput by 3 to 5 orders of magnitude ...
In this paper we introduce Tithonus, a framework that builds on the Bitcoin blockchain and network to provide censorship-resistant communication mechanisms. ...
-Bitcoin based censorship circumvention. ...
arXiv:1810.00279v1
fatcat:47eagj5sj5cfpgmjo6fx4kpof4
Bank card fraud in Spain
2014
Digital Evidence and Electronic Signature Law Review
The mass use of cards as a means of payment inevitably gives rise to a significant amount of fraud. ...
the appearance of new payment systems in the form of bank cards. ...
information through its system), tamper resistant software, use of cryptographic technology, and that all of these meet or exceed industry standards. ...
doi:10.14296/deeslr.v6i0.1860
fatcat:kyerisvgvfdojj65xyihjz2joq
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture
2021
Zenodo
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis ...
overcome the threats, the installation of firewalls both hardware and software in nature are of high importance. ...
Although notebook computers and personal digital assistants (PDAs) of today's first-generation are self-contained, networked mobile computers are part of a larger computing infrastructure. ...
doi:10.5281/zenodo.5148421
fatcat:lzanqvxdlre2dh3hdhjxibdrim
The Nexus of Copyright and Intellectual Privacy
2012
Social Science Research Network
Without them, and without the support and encouragement of our families (and especially my mother), this project would not have been completed. ...
In general terms, DRM technologies are embedded in software, hardware, or both, and travel with digital works in order to regulate access to and use of the works. 27 D RM is a kind of "electronic security ...
Images can be played with, and can work as a form of resistance. ...
doi:10.2139/ssrn.2131308
fatcat:tjkgtpk5ancypomii3fcycpfa4
Title Threat modeling and circumvention of Internet censorship Publication Date
2017
unpublished
My research addresses the twin themes of modeling and circumvention. ...
I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer ...
The client may be limited, for technical or social reasons, in the software and hardware they can use. The destination may knowingly cooperate with the client's circumvention effort, or may not. ...
fatcat:5mwzajvkr5d7fo6a3nsazf4e4i
Threat modeling and circumvention of Internet censorship
2017
unpublished
My research addresses the twin themes of modeling and circumvention. ...
I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer ...
The client may be limited, for technical or social reasons, in the software and hardware they can use. The destination may knowingly cooperate with the client's circumvention effort, or may not. ...
fatcat:kbnnx5f34vhldmke4zkjg5jblq
« Previous
Showing results 1 — 15 out of 32 results