The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Code obfuscation is intended to thwart reverse engineering by making programmes hard to understand. Call chains collected by stack tracing can be used to understand the behaviour of programmes. To hinder reverse analysis of stack tracing, a binary code obfuscation method based on random obfuscated table and hash coding is proposed. Random obfuscated table is used to map call addresses while call and...
Software birthmarking is a new technique used to detect the theft of programs. In the technique, a software birthmark is the inherent invariable features of a program that can be used to identify the program. Some typical semantics-preserving transformations will have a significant impact on order and frequency of instructions in programs. By introducing dataflow analysis techniques, dependencies...
In order to solve the problems of Gao algorithm, an improvement of Gao algorithm is proposed in this paper. Firstly, the shuffling procedure is combined with pixel diffusion to solve the problem that permutation isn't relative to the pixel values in Gao algorithm. Secondly, to solve the problem that the keystream isn't sensitive to plaintext in Gao algorithm, the feedback mechanism is introduced in...
To settle the conflicts between stealth and resilience, the conception of software zero-watermarking is proposed by introducing image zero-watermarking into software watermarking in this paper, in which the key point is to choose a proper birthmark of the software, thus feature n-gram set is presented to be birthmark of the software. Then the software zero-watermarking scheme based on the feature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.