[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - arXiv preprint arXiv …, 2023 - arxiv.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

[PDF][PDF] Evaluation Methodologies in Software Protection Research—Supplemental Material

B DE SUTTER, S SCHRITTWIESER, B COPPENS… - users.elis.ugent.be
1 Overview This supplemental material categorizes all papers according to their perspective
(Section 2), lists our definitions of software protection methods (Section 3), analysis methods …

Software Protection Framework based on Code Obfuscation Techniques رسالة ماجستير‎

I Nassra, MZ Abed - 2018 - repository.aaup.edu
Protecting intellectual property against tampering and reverse analysis is an urgent issue to
many software designers, where illegal access to sensitive data is a form of copyright …