Filters








3,070 Hits in 4.2 sec

On Tamper-Resistance from a Theoretical Viewpoint [chapter]

Paulo Mateus, Serge Vaudenay
2009 Lecture Notes in Computer Science  
We conclude by observing that the ability to put boundaries in computing devices prevents from providing full control on how private information spreads: the concept of sealing a device is in some sense  ...  We propose the theoretical model of trusted agent to formalize the notion of programmable secure hardware.  ...  So far, secure hardware devices have been used to implement some strong security protocols with the hypothesis that they are tamper-resistant.  ... 
doi:10.1007/978-3-642-04138-9_29 fatcat:v6kakeadjfe4bh26pvlj2azrde

Cross-Referencing Method for Scalable Public Blockchain [article]

Takaaki Yanagihara, Akihiro Fujihara
2021 arXiv   pre-print
In this study, we evaluated the effectiveness of our method from three theoretical viewpoints: decentralization, scalability, and tamper resistance.  ...  We introduce two types of tamper-resistance-improvement ratios as evaluation measures of tamper resistance for a blockchain and theoretically explain how tamper resistance is improved using our cross-referencing  ...  We theoretically evaluated the effectiveness of our method from three viewpoints: decentralization, scalability, and tamper-resistance.  ... 
arXiv:2107.12981v1 fatcat:x3oiboq53ve5jjh6wq5uunahx4

Revisiting Software Protection [chapter]

Paul C. van Oorschot
2003 Lecture Notes in Computer Science  
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.  ...  AES [24] , is uninteresting from a complexity-theoretic viewpoint -namely, O(1). Security through Obscurity Vs.  ...  Focus Under the heading of software protection, our main focus is on techniques useful for protecting software from reverse engineering (by obfuscation), modification (by software tamper resistance), program-based  ... 
doi:10.1007/10958513_1 fatcat:5hjupbqp5bgvxdrt2tlkeprr6i

A Thorough Investigation on Software Protection Techniques against Various Attacks

Sasirekha N
2012 Bonfring International Journal of Software Engineering and Soft Computing  
Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from threats.  ...  Thus, thorough threat analysis and new software protection schemes, needed to protect software from analysis and tampering attacks becomes very necessary.  ...  The technique shows the theoretical software protection approach in the security viewpoint.  ... 
doi:10.9756/bijsesc.10030 fatcat:u273xyqjxjeyvisfsajcanpfoe

Secure and Private Distribution of Online Video and Some Related Cryptographic Issues [chapter]

Feng Bao, Robert Deng, Peirong Feng, Yan Guo, Hongjun Wu
2001 Lecture Notes in Computer Science  
The paper can be viewed as one that proposes practical solutions to real life problems, as well as one that presents applied cryptography research.  ...  We mainly focus on the study of security and privacy problems related to the system.  ...  From another viewpoint, if two VCPs are providing same video at same price, the one who guarantees privacy is more competitive.To retrieve a message from a database without revealing which message is actually  ... 
doi:10.1007/3-540-47719-5_17 fatcat:vq33vqwyofgsphw7n2rbkjzyky

FMNV continuous non-malleable encoding scheme is more efficient than believed

Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar
2016 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)  
output size of the collision resistant hash function and q is the maximum number of tampering queries).  ...  In this paper, we propose a new method for proving continuous non-malleability of FMNV scheme. This new proof leads to an improved and more efficient scheme than previous one.  ...  Tamper-resilient cryptography includes a theoretical study of such attacks.  ... 
doi:10.1109/iscisc.2016.7736454 dblp:conf/iscisc/MortazaviSD16 fatcat:eow5rbilbbc2ha42bvjpe6sjli

Java Obfuscation Approaches to Construct Tamper-Resistant Object-Oriented Programs

Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji
2005 IPSJ Digital Courier  
Unfortunately previous software obfuscation techniques share a major drawback that they do not have a theoretical basis and thus it is unclear how effective they are.  ...  We show that determining precise points-to analysis in obfuscated programs is NP-hard and the fact provides a theoretical basis for our obfuscation techniques.  ...  Acknowledgments This research is conducted as a program for the "Fostering Talent in Emergent Research Fields" in Special Coordination Funds for Promoting Science and Technology by Ministry of Education  ... 
doi:10.2197/ipsjdc.1.349 fatcat:chbpnbuwdzfgxalyefghzdyb2e

Challenges Faced by Leaders in Integration

Merja Sinkkonen
2018 International Journal of Integrated Care  
The research material was collected from Master's degree students in autumn 2017 in Tampere University of Applied Sciences with the method of empathy-based stories.  ...  One third of the students worked as leaders and the rest in other responsible positions alongside their studies. We received a total of 32 stories.  ...  The research material was collected from Master's degree students in autumn 2017 in Tampere University of Applied Sciences with the method of empathy-based stories.  ... 
doi:10.5334/ijic.s2187 fatcat:h7mzzo5x2rhazb5objldsblivu

A Graph Game Model for Software Tamper Protection [chapter]

Nenad Dedić, Mariusz Jakubowski, Ramarathnam Venkatesan
2007 Lecture Notes in Computer Science  
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an attack.  ...  We make some engineering assumptions about local indistinguishability on the transformed program and model an attacker's steps as making a walk on the program flow graph.  ...  Checks detect tampering, but based on local observations, it is difficult to tell apart checking code from regular code, and check variables from normal ones.  ... 
doi:10.1007/978-3-540-77370-2_6 fatcat:ziufedqnczah7dicflmjeijlne

Strategic knowledge management and evolving local government

Harri Laihonen, Sari Mäntylä
2018 Journal of Knowledge Management  
Design/Methodology/Approach: A case study on the application of an action research process was conducted to study how the City of Tampere in Finland aimed to overcome challenges in utilizing performance  ...  Purpose: The characteristics of new public management and new public governance are well known, but their impact on managerial knowledge needs and the implementation of knowledge management in local government  ...  Thus, this paper links the theoretical discussions on knowledge and public management and provides a new understanding of public knowledge management.  ... 
doi:10.1108/jkm-06-2017-0232 fatcat:on3zljftqzfcthbgmt5fcm7vsm

Run-Time Randomization to Mitigate Tampering [chapter]

Bertrand Anckaert, Mariusz Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere
2007 Lecture Notes in Computer Science  
The problem of defending software against tampering by a malicious host is not expected to be solved soon.  ...  This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers  ...  System calls also provide a source of randomness from the viewpoint of the application.  ... 
doi:10.1007/978-3-540-75651-4_11 fatcat:a2kmaysosrewxi4bi7remiug7y

Time-Bound Hierarchical Key Assignment: An Overview

Wen Tao ZHU, Robert H. DENG, Jianying ZHOU, Feng BAO
2010 IEICE transactions on information and systems  
The time-bound hierarchical key assignment problem is to assign distinct cryptographic keys to distinct security classes according to their privileges so that users from a higher class can use their class  ...  The access privileges in distributed systems can be effectively organized as a partial-order hierarchy that consists of distinct security classes, and the access rights are often designated with certain  ...  This can be eliminated by introducing a tamper-resistant device.  ... 
doi:10.1587/transinf.e93.d.1044 fatcat:bh3bjh3wlffi7lfycyrbdiadiu

Watermarking, tamper-proofing, and obfuscation - tools for software protection

C.S. Collberg, C. Thomborson
2002 IEEE Transactions on Software Engineering  
A defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example, to remove a watermark) will result in nonfunctional code.  ...  AbstractÐWe identify three types of attack on the intellectual property contained in software and three corresponding technical defenses.  ...  security in this paper from the viewpoint of the owner of the client software.  ... 
doi:10.1109/tse.2002.1027797 fatcat:x3lechbrnrfopg5k6q6qiqnbyu

Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices [chapter]

Ioana Boureanu, Serge Vaudenay
2012 Lecture Notes in Computer Science  
Our Weak Bit-Commitments: a theoretical viewpoint.  ...  Following both theoretical and practical arguments, we construct UC-secure bit-commitment protocols that place their strength on the sender's side and are built using tamper-evident devices, e.g., a type  ...  ., in [20] , using tamper-resistant hardware tokens that can be passed in one direction only.  ... 
doi:10.1007/978-3-642-33272-2_6 fatcat:lbfgc6y645bjnff2ayjmwlnfwa

Overcoming Trial Version Software Cracking Using a Hybridized Self-Modifying Technique

C. K. Oputeh, E. E Ogheneovo
2014 IOSR Journal of Computer Engineering  
In this paper, we proposed a hybridized self-modifying technique for checking against cracking. Our technique combines obfuscation and hashing mechanisms to resist attackers from cracking software.  ...  We rely on embedded software in our cars, the domotics, built into our homes, and other electronic devices on a daily basis.  ...  The technique shows the theoretical software protection approach in the security viewpoint.  ... 
doi:10.9790/0661-16391321 fatcat:qkj5xliuinfajhocdnkhue3kw4
« Previous Showing results 1 — 15 out of 3,070 results