Re: Encrypt a Dll
Source: www.derkeiler/Newsgroups/microsoft.public.platformsdk.security/2005−05/0064.html From: Valery Pryamikov (valery_)
Date: 05/05/05
Date: Thu, 5 May 2005 19:19:19 +0200
"Victor Pereira" <taintmode@yahoo.br> wrote in message
news:uN7P7FZUFHA.4056@TK2MSFTNGP15.
> Valery, i'm reading your blog posts.. i want this list of papers, i'm very
> glad with your help.. thanks!
>
> VP
Ok, here we are :−)
[1] Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit
Sahai, Sali Vadhan, Ke Yang. On the (im)possibility of obfuscating programs.
In Proceedings of CRYPTO 2001.
[2] Benjamin Lynn, Manoj Prabhakaran, Amit Sahai. Positive Results and
Techniques for Obfuscation. In Proceedings of Eurocrypt 2004.
[3] Hoeteck Wee. On Obfuscating Point Functions. Computer Science Division
University of California, Berkeley. Jan 2005
[4] Christian Collberg, Clark Thomborson. Watermarking, tamper−proofing and
obfuscation − tools for software protection. IEEE Transactions on software
engineering, vol.28, No.8, August 2002.
[5] Christian Collberg, Clark Thomborson. Watermarking, tamper−proofing and
obfuscation − tools for software protection. Technical Report TR00−03, The
Department of Computer Science, University of Arizona, February 2000.
[6] Christian Collberg, Clark Thomborson, Douglas Low. Breaking Abstractions
sdkand Unstructuring Data Structures. IEEE International Conference on Computer
Languages, May 1998.
[7] Christian Collberg, Clark Thoborson, Douglas Low. Manufacturing Cheap,
Resilient, and Stealthy Opaque Constructs. Principles of Programming
Languages 1998, POPL'98, January 1988.
[8] Christian Collberg, Clark Thomborson, Douglas Low. A Taxonomy of
Obfuscating Transformations. Technical Report 148, Department of Computer
Science, The University of Auckland. July 1997.
[9] Chenxi Wang, Jonathan Hill, John Knight, Jack Davidson. Protection of Software−based Survivability Mechanisms. International Conference of Dependable Systems and Networks. July 2001.
[10] Chenxi Wang. A Security Architecture for Survivability Mechanisms. PhD Dissertation, Department of Computer Science, University of Virginia,
October 2000.
[11] Chenxi Wang, Jonathan Hill, John Knight, Jack Davidson. Software Tamper Resistance: Obstructing Static Analysis of Programs. Technical Report
CS−2000−12, Department of Computer Science, University of Virginia. May 2000.
[12] Cullen Linn, Saumya Debray. Obfuscation of Executable Code to Improve Resistance to Static Disassembly. ACM Conference on Computer and Communications Security (CCS 2003), October 2003, pp. 290−299
[13] Fritz Hohl. A Framework to Protect Mobile Agents by Using Reference States. Proceedings of the 20th International Conference on Distributed Computing Systems (ICDCS 2000), pp. 410−417, 2000.
[14] Gregory Wroblewski. General Method of Program Code Obfuscation. PhD Dissertation, Wroclaw. 2002.
[15] S. Chow, H. Johnson, P.C. van Oorschot, P Eisen. A White−Box DES implementation for DRM applications. In Proceedings of ACM CCS−9 Workshop DRM. 2002
[16] Matthias Jacom, Dan Boneh, Edard Feltin. Attacking an obfuscated cipher
by injecting faults. In Proceedings of ACM CCS−9 Workshop DRM. 2002. [17] Yuval Ishai, Amit Sahai, David Wagner. Private Circuits: Securing Hardware against Probing Attacks. In Proceedings of CRYPTO 2003.
[18] Markus Kuhn, Oliver Kommerling. Design Principles for Tamper−Resistant Smartcard Processors. USENIX Workshop on Smartcard Technology proceedings, Chicago, Illinois, USA, May 10−11, 1999.
[19] Ross Anderson, Markus Kuhn. Tamper resistance − a Cautionary Note. The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland , California, November 18−21 1996, pp 1−11.
[20] Gael Hachez. A Comparative Study of Software Protection Tools Suited
for E−Commerce with Contributions to Software Watermarking and Smart Cards. PhD thesis, Faculte des Sciences Appliquees Laboratoire de Microelectronique. Universite Catholique de Louvain. March 2003.
[21] T.−C. Lin, M. Hsiang Hsu, F.−Y. Kuo, and P.−C. Sun. An Intention
Model−based Study of Software Piracy. In 32nd Annual Hawaii International Conference on System Sciences (HICSS−32). IEEE Computer Society, January
1999.
[22] Amit Sethi. Digital Rights Management and Code Obfuscation. Thesis in fulfillment of degree of Master of Mathematics. University of Waterloo, Ontario, Canada. 2003.
[23] M. Kunin. Why do Software Manufactures Tolerate Piracy in Transition
and Less Developed Countries? A theoretical model. Discussion Paper Series 2001−75, JEL classification: O34;L20. Center for Economic Research, Charles University and the Academy of Sciences, Czech Republic, October 2001.
[24] Christian Collberg. SandMark Algorithms. January 28, 2003
[25] Christian Collberg, Ginger Myles, Michael Stepp. Cheating Cheating Detectors. Department Computer Science University of Arizona. Technical Report TR04−05. March 3, 2004
[26] James R. Gosler. Software Protection: Myth or Reality? Sandia National Laboratory. Advances in Cryptology − CRYPTO'85. 1985.
[27] Kelly Heffner, Christian Collberg. The Obfuscation Executive. Department of Computer Science, University of Arizona. Technical Report
TR04−03. 2004.
[28] Tapas Ranjan Sahoo, Christian Collberg. Software Watermarking in the Frequency Domain: Implementation, Analysis, and Attacks. Department of Computer Science,
University of Arizona. Technical Report TR04−07. March 3, 2004
[29] Christian Collberg, Clark Thomborson, Gregg M. Townsend. Dynamic Graph−Based Software Watermarking. Technical Report TR04−08. April 28, 2004
[30] Satoshi Hada. Zero−Knowledge and Code Obfuscation. Tokyo Research Laboratory, IBM Research. In Proceedings of ASIACRYPT 2000.
[31] Larry D'Anna, Brian Matt, Andrew Reisse, Tom Van Vleck, Steve Schwab, Patrick LeBlanc. Self−Protecting Mobile Agents Obfuscation Report. Final report. Network Associates Laboratories. Report #03−015. June 30, 2003
[32] Cullen Linn, Saumya Debray. Obfuscation of Executable Code to Improve Resistance to Static Disassembly. Department of Computer Science University
of Arizona.
[33] Julien P. Stern, Gael Hachez, Francois Koeune1, Jean−Jacques Quisquater. Robust Object Watermarking: Application to Code. UCL Crypto Group, Laboratoire de Recherche en Informatique, Universite de Paris−Sud, France.
[34] Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji. Software Tamper Resistanc
e Based on the Difficulty of Interprocedural
Analysis.
[35] Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak. Computational Forensic Techniques for Intellectual Property Protection.
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。
发表评论