Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Reactive attestation: Automatic detection and reaction to software tampering attacks
Anti-tampering is a form of software protection conceived to detect and avoid the execution
of tampered programs. Tamper detection assesses programs' integrity with load or execution …
of tampered programs. Tamper detection assesses programs' integrity with load or execution …
Empirical assessment of the effort needed to attack programs protected with client/server code splitting
Context Code hardening is meant to fight malicious tampering with sensitive code executed
on client hosts. Code splitting is a hardening technique that moves selected chunks of code …
on client hosts. Code splitting is a hardening technique that moves selected chunks of code …
Codebender: Remote software protection using orthogonal replacement
CodeBender implements a novel client replacement strategy to counter the malicious host
problem and address the problem of guaranteeing client-code security. CodeBender is a …
problem and address the problem of guaranteeing client-code security. CodeBender is a …
Конфигурирование защищенных систем со встроенными и мобильными устройствами
ВА Десницкий, ИВ Котенко, АА Чечулин - Вопросы защиты …, 2012 - elibrary.ru
Предлагается модель процесса конфигурирования защищенных систем со
встроенными и мобильными устройствами, а также архитектура программного …
встроенными и мобильными устройствами, а также архитектура программного …
Mitigating debugger-based attacks to Java applications with self-debugging
Java bytecode is a quite high-level language and, as such, it is fairly easy to analyze and
decompile with malicious intents, eg, to tamper with code and skip license checks. Code …
decompile with malicious intents, eg, to tamper with code and skip license checks. Code …
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client,
which runs remotely on an untrusted platform. Of the many security vulnerabilities that may …
which runs remotely on an untrusted platform. Of the many security vulnerabilities that may …
[PDF][PDF] On the impossibility of effectively using likely-invariants for software attestation purposes.
Invariants monitoring is a software attestation technique that aims at proving the integrity of a
running application by checking likely-invariants, which are statistically significant predicates …
running application by checking likely-invariants, which are statistically significant predicates …
Towards a unified software attack model to assess software protections
Attackers can tamper with programs to break usage conditions. Different software protection
techniques have been proposed to limit the possibility of tampering. Some of them just limit …
techniques have been proposed to limit the possibility of tampering. Some of them just limit …
[PDF][PDF] DYBS: A Lightweight Dynamic Slicing Framework for Diagnosing Attacks on x86 Binary Programs.
E Zhu, F Liu, X Fang, X Li, Y Yang, A Liang - J. Softw., 2014 - jsoftware.us
Nowadays, applications are usually large-scale, this making tasks of comprehending and
debugging software rather complicated. As a dynamic reduction technique for simplifying …
debugging software rather complicated. As a dynamic reduction technique for simplifying …
Конфигурирование встроенных и мобильных устройств на основе решения оптимизационной задачи
ВА Десницкий - Информатика и автоматизация, 2011 - mathnet.ru
Исследование посвящено изучению вопросов проектирования и анализа
комбинированных механизмов защиты сложных коммуникационных систем со …
комбинированных механизмов защиты сложных коммуникационных систем со …