Back to Results
First PageMeta Content
Law / Software licenses / Computer security / Warez / Digital rights management / Tamper resistance / Encryption / Copy protection / Trusted Computing / Cryptography / Security / Cyberwarfare


Revisiting Software Protection P.C. van Oorschot Digital Security Group, School of Computer Science
Add to Reading List

Document Date: 2004-01-04 16:25:09


Open Document

File Size: 148,68 KB

Share Result on Facebook

City

Bristol / /

Company

IBM / Overview Software / AES / Software Tamper Resistance Software / Gosler / 1 Introduction / HP / Compaq / U.S. Air Force Research Laboratory / Intel / Microsoft / Trusted Computing Group / /

Country

Canada / United Kingdom / /

Currency

GBP / USD / /

/

Facility

U.S. Air Force Research Laboratory / Computer Science Carleton University / /

IndustryTerm

software obfuscation techniques / digital rights management applications / digital product / language-based tools / software protection techniques / software vendors / widespread malicious software / forced software updates / software tampering / software tools / polynomial-time algorithm / software protection survey / software folklore / computer virus detection technologies / resistant software / software protection methods / software diversity / malicious software / secure software boot-strapping / software analysis / software obfuscation can / Software protection falls / research contract involving software obfuscation / software protection / software obfuscation / software protection approaches / digital rights management / secure cryptographic co-processors / communications end-points / attacker making software modifications / copy protection solution / software / software processes / cryptographic algorithms / unpublished encryption algorithms / unauthorized software duplication / forced software renewal / software transformation tool / secure e-commerce / Internet browsers / software vulnerabilities / hardware security devices / software attempts / attack software / software modification / protection technologies / alternate solution / software attacks / software copying / target software / software obfuscation leave room / security solutions / /

Organization

Trusted Computing Platform Alliance / Carleton University / National Sciences and Engineering Research Council of Canada / /

Person

Auguste Kerckhoffs / Colin Boyd / /

Position

Canada Research Chair / guard / engineer / Author / /

Technology

secure cryptographic co-processors / secret key / computer virus detection technologies / operating systems / encryption / cryptography / unpublished encryption algorithms / flow control / polynomial-time algorithm / circa-1985 protection technologies / simulation / /

SocialTag