JP2002514333A - ソフトウェアセキュリティを増強するための混乱化技術 - Google Patents
ソフトウェアセキュリティを増強するための混乱化技術Info
- Publication number
- JP2002514333A JP2002514333A JP50866099A JP50866099A JP2002514333A JP 2002514333 A JP2002514333 A JP 2002514333A JP 50866099 A JP50866099 A JP 50866099A JP 50866099 A JP50866099 A JP 50866099A JP 2002514333 A JP2002514333 A JP 2002514333A
- Authority
- JP
- Japan
- Prior art keywords
- code
- application
- transformation
- confusion
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000005516 engineering process Methods 0.000 title description 12
- 230000009466 transformation Effects 0.000 claims abstract description 187
- 238000000034 method Methods 0.000 claims abstract description 127
- 238000006243 chemical reaction Methods 0.000 claims description 101
- 230000000694 effects Effects 0.000 claims description 24
- 230000003449 preventive effect Effects 0.000 claims description 21
- 238000011156 evaluation Methods 0.000 claims description 16
- 230000036961 partial effect Effects 0.000 claims description 13
- 238000005206 flow analysis Methods 0.000 claims description 9
- 238000007619 statistical method Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims 5
- 230000003094 perturbing effect Effects 0.000 claims 1
- 238000000844 transformation Methods 0.000 abstract description 79
- 230000002441 reversible effect Effects 0.000 abstract description 45
- 230000002708 enhancing effect Effects 0.000 abstract 1
- 238000004458 analytical method Methods 0.000 description 37
- 238000004422 calculation algorithm Methods 0.000 description 33
- 230000006870 function Effects 0.000 description 33
- 230000003068 static effect Effects 0.000 description 30
- 230000004224 protection Effects 0.000 description 20
- 238000004364 calculation method Methods 0.000 description 16
- 229910052698 phosphorus Inorganic materials 0.000 description 16
- 230000006399 behavior Effects 0.000 description 14
- 238000013507 mapping Methods 0.000 description 13
- 230000008569 process Effects 0.000 description 13
- 238000012545 processing Methods 0.000 description 13
- 238000003491 array Methods 0.000 description 9
- 230000014509 gene expression Effects 0.000 description 9
- 238000013459 approach Methods 0.000 description 8
- 238000013461 design Methods 0.000 description 7
- 238000005457 optimization Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 6
- 238000007781 pre-processing Methods 0.000 description 5
- 238000003860 storage Methods 0.000 description 5
- 235000016787 Piper methysticum Nutrition 0.000 description 4
- 240000005546 Piper methysticum Species 0.000 description 4
- 235000020289 caffè mocha Nutrition 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 241000282412 Homo Species 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 3
- 230000001419 dependent effect Effects 0.000 description 3
- 238000003780 insertion Methods 0.000 description 3
- 230000037431 insertion Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 239000010749 BS 2869 Class C1 Substances 0.000 description 2
- 241000801064 Zinnia Species 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 238000010367 cloning Methods 0.000 description 2
- 238000013501 data transformation Methods 0.000 description 2
- 230000007423 decrease Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000007935 neutral effect Effects 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 230000000135 prohibitive effect Effects 0.000 description 2
- 239000004576 sand Substances 0.000 description 2
- 235000017274 Diospyros sandwicensis Nutrition 0.000 description 1
- 241001102334 Janua Species 0.000 description 1
- 241000282838 Lama Species 0.000 description 1
- 235000016496 Panda oleosa Nutrition 0.000 description 1
- 240000000220 Panda oleosa Species 0.000 description 1
- OAICVXFJPJFONN-UHFFFAOYSA-N Phosphorus Chemical compound [P] OAICVXFJPJFONN-UHFFFAOYSA-N 0.000 description 1
- 102000011195 Profilin Human genes 0.000 description 1
- 108050001408 Profilin Proteins 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 235000015241 bacon Nutrition 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 235000008429 bread Nutrition 0.000 description 1
- 235000014121 butter Nutrition 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 230000003930 cognitive ability Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000013455 disruptive technology Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 230000036039 immunity Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- CTUVIUYTHWPELF-IYEMJOQQSA-L magnesium gluconate Chemical compound [Mg+2].OC[C@@H](O)[C@@H](O)[C@H](O)[C@@H](O)C([O-])=O.OC[C@@H](O)[C@@H](O)[C@H](O)[C@@H](O)C([O-])=O CTUVIUYTHWPELF-IYEMJOQQSA-L 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000003278 mimic effect Effects 0.000 description 1
- 238000002156 mixing Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 239000011574 phosphorus Substances 0.000 description 1
- 230000003389 potentiating effect Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 208000024891 symptom Diseases 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
Abstract
Description
Claims (1)
- 【特許請求の範囲】 1.コンピュータが実施するコードを混乱化するための方法であって、 混乱化すべきコードのサブセットを選択する段階; 適用すべき混乱化変換を選択する段階;及び 変換を適用する段階; を含んで成り、変換されたコードは未変換コードに対する弱い等価性を提供す る方法。 2.処理すべきアプリケーションのコードのため、ソースコードに対応する単 数又は複数のソースコード入力ファイルを識別する段階; 必要とされる混乱化レベル(効力)を選択する段階; 最大実行時間又は空間ペナルティ(コスト)を選択する段階; 入力ファイルを読取りかつ構文解析する段階; 処理すべきアプリケーションによって使用されるデータタイプ、データ構造、 及び制御構造を識別する情報を提供する段階; 必要とされる効力が選択されるか又は最大コストを上回ってしまうまで、ソー スコードオブジェクトに対して混乱化変換を選択し適用する段階;及び アプリケーションの変換済みコードを出力する段階; をさらに含む、請求項1に記載のコンピュータにより実施される方法。 3.変換には、不明瞭なコンストラクトが含まれ、この不明瞭コンストラクト は、エイリアシング及び同時実行技術を用いて構築されている、請求項1に記載 の方法。 4.混乱化されたコードに対し適用された混乱化変換についての 情報及びそのアプリケーションのソースコードに対する変換済みアプリケーショ ンの混乱化されたコードに関する情報を出力する段階をさらに含んで成る、請求 項1に記載の方法。 5.変換は、1つのアプリケーションのコードの可観測性挙動を保存するよう に選択される、請求項1に記載の方法。 6.コードを混乱化解除する段階をさらに含んで成り、コードの混乱化解除に は、スライシング、部分評価、データフロー分析又は統計分析を使用することに より1つのアプリケーションの混乱化されたコードからあらゆる混乱化を除去す る段階が含まれる、請求項1に記載の方法。 7.コードを混乱化するためのコンピュータ読取り可能な媒体上に具体化され たコンピュータプログラムであって、 混乱化すべきコードのサブセットを選択する論理; 適用すべき混乱化変換を選択する論理;及び 変換を適用する論理; を含み、変換されたコードが、未変換コードに対する弱い等価性を提供する、 コンピュータプログラム。 8.処理すべきアプリケーションのコードのため、ソースコードに対応する単 数又は複数のソースコード入力ファイルを識別する論理; 必要とされる混乱化レベル(効力)を選択する論理; 最大実行時間又は空間ペナルティ(コスト)を選択する論理; 入力ファイルを読取りかつ構文解析する論理; 処理すべきアプリケーションによって使用されるデータタイプ、データ構造、 及び制御構造を識別する情報を提供する論理; 必要とされる効力が達成されるか又は最大コストを上回ってしまうまで、ソー スコードオブジェクトに対して混乱化変換を選択し適 用する論理;及び アプリケーションの変換済みコードを出力する論理; をさらに含む、請求項7に記載のコンピュータプログラム。 9.変換には、不明瞭なコンストラクトが含まれ、この不明瞭コンストラクト は、エイリアシング及び同時実行技術を用いて構築されている、請求項7に記載 のコンピュータプログラム。 10.混乱化されたコードに対し適用された混乱化変換についての情報及びその アプリケーションのソースコードに対する変換済みアブリケーションの混乱化さ れたコードに関する情報を出力する論理をさらに含む、請求項7に記載のコンピ ュータプログラム。 11.変換は、1つのアプリケーションのコードの可観測性挙動を保存するよう に選択される、請求項7に記載のコンピュータプログラム。 12.コードを混乱化解除する論理をさらに含んで成り、コードの混乱化解除に は、スライシング、部分評価、データフロー分析又は統計分析を使用することに より1つのアプリケーションの混乱化されたコードからあらゆる混乱化を除去す る段階が含まれる、請求項7に記載のコンピュータプログラム。 13.コードを混乱化するための装置であって、 混乱化すべきコードのサブセットを選択するための手段; 適用すべき混乱化変換を選択するための手段;及び 変換を適用するための手段; を含み、変換されたコードが、未変換コードに対する弱い等価性を提供する、 装置。 14.処理すべきアプリケーションのコードのため、ソースコードに対応する単 数又は複数のソースコード入力ファイルを識別するための手段; 必要とされる混乱化レベル(効力)を選択するための手段; 最大実行時間又は空間ペナルティ(コスト)を選択するための手段; 入力ファイルを読取りかつ構文解析するための手段; 処理すべきアプリケーションによって使用されるデータタイプ、データ構造、 及び制御構造を識別する情報を提供するための手段; 必要とされる効力が達成されるか又は最大コストを上回ってしまうまで、ソー スコードオブジェクトに対して混乱化変換を選択し適用するための手段; アプリケーションの変換済みコードを出力するための手段; をさらに含んで成る、請求項13に記載の装置。 15.変換には、不明瞭なコンストラクトが含まれ、この不明瞭コンストラクト は、エイリアシング及び同時実行技術を用いて構築されている、請求項13に記 載の装置。 16.混乱化されたコードに対し適用された混乱化変換についての情報及びその アプリケーションのソースコードに対する変換済みアプリケーションの混乱化さ れたコードに関する情報を出力するための手段をさらに含んで成る、請求項13 に記載の装置。 17.変換は、1つのアプリケーションのコードの可観測性挙動を保存するよう に選択される、請求項13に記載の装置。 18.コードを混乱化解除するための手段をさらに含んで成り、コードの混乱化 解除には、スライシング、部分評価、データフロー分析又は統計分析を使用する ことにより1つのアプリケーションの混乱化されたコードからあらゆる混乱化を 除去する段階が含まれる、請求項13に記載の装置。 19.コードがJavaTMバイトコードを含む、請求項13に記載の装置。 20.変換が、データ混乱化,制御混乱化又は予防混乱化を提供する、請求項1 3に記載の装置。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NZ328057 | 1997-06-09 | ||
NZ32805797 | 1997-06-09 | ||
PCT/US1998/012017 WO1999001815A1 (en) | 1997-06-09 | 1998-06-09 | Obfuscation techniques for enhancing software security |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2002514333A true JP2002514333A (ja) | 2002-05-14 |
JP2002514333A5 JP2002514333A5 (ja) | 2006-01-05 |
JP4739465B2 JP4739465B2 (ja) | 2011-08-03 |
Family
ID=19926287
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP50866099A Expired - Lifetime JP4739465B2 (ja) | 1997-06-09 | 1998-06-09 | ソフトウェアセキュリティを増強するための混乱化技術 |
Country Status (7)
Country | Link |
---|---|
US (1) | US6668325B1 (ja) |
EP (1) | EP0988591A1 (ja) |
JP (1) | JP4739465B2 (ja) |
CN (1) | CN1260055A (ja) |
AU (1) | AU7957998A (ja) |
CA (1) | CA2293650C (ja) |
WO (1) | WO1999001815A1 (ja) |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005011326A (ja) * | 2003-06-20 | 2005-01-13 | Microsoft Corp | スパムフィルタの不明瞭化 |
JP2005085188A (ja) * | 2003-09-11 | 2005-03-31 | Fujitsu Ltd | プログラム保護方法、プログラム保護プログラムおよびプログラム保護装置 |
JP2005235076A (ja) * | 2004-02-23 | 2005-09-02 | Fujitsu Ltd | コンピュータシステム、中央装置及びプログラム実行方法 |
WO2006009081A1 (ja) * | 2004-07-16 | 2006-01-26 | Matsushita Electric Industrial Co., Ltd. | アプリケーション実行装置及びアプリケーション実行装置のアプリケーション実行方法 |
WO2006085595A1 (ja) * | 2005-02-10 | 2006-08-17 | Matsushita Electric Industrial Co., Ltd. | プログラム変換装置及びプログラム実行装置 |
JP2006235688A (ja) * | 2005-02-22 | 2006-09-07 | Kddi Corp | プログラム難読化装置およびその方法ならびにプログラム |
WO2006115217A1 (ja) * | 2005-04-21 | 2006-11-02 | Matsushita Electric Industrial Co., Ltd. | プログラム変換装置及び秘密保持プログラム |
JP2007503038A (ja) * | 2003-08-20 | 2007-02-15 | マクロヴィジョン ヨーロッパ リミテッド | コード難読化およびエミュレーションによるプロセッサ制御 |
JP2007086845A (ja) * | 2005-09-20 | 2007-04-05 | Kddi Corp | クライアントサーバシステムおよび同システムにおけるサーバサイドプログラムの実現方法ならびにそのサーバ装置、サーバサイドプログラム |
JP2007514193A (ja) * | 2003-12-11 | 2007-05-31 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 各暗号化ラウンドのコア暗号化関数を隠蔽するために置換を用いたブロック暗号化システム |
JP2008090668A (ja) * | 2006-10-03 | 2008-04-17 | Kddi Corp | プログラム難読化方法およびプログラム |
JP2008102576A (ja) * | 2006-10-17 | 2008-05-01 | Kddi Corp | プログラム解析方法およびプログラム |
JP2008518262A (ja) * | 2004-10-28 | 2008-05-29 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 暗号化関数を難読化するための方法及びシステム |
KR100841282B1 (ko) | 2005-11-24 | 2008-06-25 | 후지제롯쿠스 가부시끼가이샤 | 보호된 실행 프로그램의 작성을 위한 기록 매체, 방법 및장치 |
JP2008523480A (ja) * | 2004-12-06 | 2008-07-03 | ギーゼッケ ウント デフリエント ゲーエムベーハー | ロードフォーマットのプログラムコードの生成および実行可能プログラムコードの提供 |
JP2008269398A (ja) * | 2007-04-23 | 2008-11-06 | Fuji Xerox Co Ltd | プログラム難読化装置及びプログラム |
JP2009514060A (ja) * | 2005-10-28 | 2009-04-02 | パナソニック株式会社 | 難読化評価方法および難読化方法 |
JP2009543498A (ja) * | 2006-07-12 | 2009-12-03 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | デジタルデータ処理装置の耐改竄性 |
JP2010515945A (ja) * | 2007-01-11 | 2010-05-13 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 実装のコピーの追跡 |
JP2010517119A (ja) * | 2007-01-18 | 2010-05-20 | パナソニック株式会社 | 難読化支援装置 |
JP2010191847A (ja) * | 2009-02-20 | 2010-09-02 | Fuji Xerox Co Ltd | プログラム難読化プログラム及びプログラム難読化装置 |
JP2011150560A (ja) * | 2010-01-22 | 2011-08-04 | Kddi Corp | ソフトウェア保護システム、ソフトウェア保護方法、ソフトウェア変換方法およびプログラム |
JP4783289B2 (ja) * | 2004-06-28 | 2011-09-28 | パナソニック株式会社 | プログラム生成装置、プログラムテスト装置、プログラム実行装置、及び情報処理システム |
JP2011209801A (ja) * | 2010-03-29 | 2011-10-20 | Kddi Corp | ソフトウェアの難読化装置、ソフトウェアの難読化方法およびプログラム |
JP4970279B2 (ja) * | 2005-10-31 | 2012-07-04 | パナソニック株式会社 | セキュア処理装置、セキュア処理方法、難読化秘密情報埋め込み方法、プログラム、記憶媒体および集積回路 |
JP2012133736A (ja) * | 2010-12-24 | 2012-07-12 | Kddi Corp | ソフトウェアの難読化装置、ソフトウェアの難読化方法およびプログラム |
JP2012526310A (ja) * | 2009-05-06 | 2012-10-25 | イルデト カナダ コーポレーション | ホワイトボックス暗号化技術を用いるインターロックされたバイナリ保護 |
JP2012221510A (ja) * | 2011-04-13 | 2012-11-12 | Safenet Inc | 保護するためのルーチンの自動選択 |
JP2013186647A (ja) * | 2012-03-07 | 2013-09-19 | Yokohama National Univ | 難読化装置、難読化方法、及び難読化プログラム、並びに難読化されたソースコード |
Families Citing this family (446)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7362775B1 (en) | 1996-07-02 | 2008-04-22 | Wistaria Trading, Inc. | Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management |
CN100452071C (zh) | 1995-02-13 | 2009-01-14 | 英特特拉斯特技术公司 | 用于安全交易管理和电子权利保护的系统和方法 |
US6658568B1 (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US5943422A (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6948070B1 (en) | 1995-02-13 | 2005-09-20 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7133846B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US5613004A (en) | 1995-06-07 | 1997-03-18 | The Dice Company | Steganographic method and device |
US6205249B1 (en) | 1998-04-02 | 2001-03-20 | Scott A. Moskowitz | Multiple transform utilization and applications for secure digital watermarking |
US7664263B2 (en) | 1998-03-24 | 2010-02-16 | Moskowitz Scott A | Method for combining transfer functions with predetermined key creation |
US7159116B2 (en) | 1999-12-07 | 2007-01-02 | Blue Spike, Inc. | Systems, methods and devices for trusted transactions |
US5889868A (en) | 1996-07-02 | 1999-03-30 | The Dice Company | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US7346472B1 (en) | 2000-09-07 | 2008-03-18 | Blue Spike, Inc. | Method and device for monitoring and analyzing signals |
US7457962B2 (en) * | 1996-07-02 | 2008-11-25 | Wistaria Trading, Inc | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US7177429B2 (en) | 2000-12-07 | 2007-02-13 | Blue Spike, Inc. | System and methods for permitting open access to data objects and for securing data within the data objects |
US7095874B2 (en) | 1996-07-02 | 2006-08-22 | Wistaria Trading, Inc. | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US6052780A (en) * | 1996-09-12 | 2000-04-18 | Open Security Solutions, Llc | Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information |
US8079086B1 (en) | 1997-11-06 | 2011-12-13 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US9219755B2 (en) | 1996-11-08 | 2015-12-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US7058822B2 (en) | 2000-03-30 | 2006-06-06 | Finjan Software, Ltd. | Malicious mobile code runtime monitoring system and methods |
US7730317B2 (en) | 1996-12-20 | 2010-06-01 | Wistaria Trading, Inc. | Linear predictive coding implementation of digital watermarks |
US6092147A (en) * | 1997-04-15 | 2000-07-18 | Sun Microsystems, Inc. | Virtual machine with securely distributed bytecode verification |
US6480959B1 (en) | 1997-12-05 | 2002-11-12 | Jamama, Llc | Software system and associated methods for controlling the use of computer programs |
US6643775B1 (en) | 1997-12-05 | 2003-11-04 | Jamama, Llc | Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications |
US7809138B2 (en) * | 1999-03-16 | 2010-10-05 | Intertrust Technologies Corporation | Methods and apparatus for persistent control and protection of content |
US6957341B2 (en) * | 1998-05-14 | 2005-10-18 | Purdue Research Foundation | Method and system for secure computational outsourcing and disguise |
AU4535699A (en) * | 1998-06-10 | 1999-12-30 | Auckland Uniservices Limited | Software watermarking techniques |
US7017188B1 (en) * | 1998-11-16 | 2006-03-21 | Softricity, Inc. | Method and apparatus for secure content delivery over broadband access networks |
US6763370B1 (en) | 1998-11-16 | 2004-07-13 | Softricity, Inc. | Method and apparatus for content protection in a secure content delivery system |
AU1936900A (en) * | 1998-12-08 | 2000-06-26 | Mediadna, Inc. | A system and method of obfuscating data |
US7526468B2 (en) * | 1999-01-08 | 2009-04-28 | Computer Associates Think, Inc. | System and method for recursive path analysis of DBMS procedures |
FR2790844B1 (fr) * | 1999-03-09 | 2001-05-25 | Gemplus Card Int | Procede et dispositif de surveillance du deroulement d'un programme, dispositif programme permettant la surveillance de son programme |
US7664264B2 (en) | 1999-03-24 | 2010-02-16 | Blue Spike, Inc. | Utilizing data reduction in steganographic and cryptographic systems |
US7370071B2 (en) | 2000-03-17 | 2008-05-06 | Microsoft Corporation | Method for serving third party software applications from servers to client computers |
US7730169B1 (en) | 1999-04-12 | 2010-06-01 | Softricity, Inc. | Business method and system for serving third party software applications |
US8099758B2 (en) | 1999-05-12 | 2012-01-17 | Microsoft Corporation | Policy based composite file system and method |
US7421586B2 (en) * | 1999-05-12 | 2008-09-02 | Fraunhofer Gesselschaft | Protecting mobile code against malicious hosts |
WO2000072112A2 (en) * | 1999-05-12 | 2000-11-30 | Fraunhofer Crcg, Inc. | Obfuscation of executable code |
US7263722B1 (en) * | 1999-05-12 | 2007-08-28 | Fraunhofer Crcg, Inc. | Obfuscation of executable code |
US6959384B1 (en) | 1999-12-14 | 2005-10-25 | Intertrust Technologies Corporation | Systems and methods for authenticating and protecting the integrity of data streams and other data |
US6594761B1 (en) | 1999-06-09 | 2003-07-15 | Cloakware Corporation | Tamper resistant software encoding |
EP1192516A1 (en) * | 1999-06-09 | 2002-04-03 | Cloakware Corporation | Tamper resistant software encoding |
US7152165B1 (en) | 1999-07-16 | 2006-12-19 | Intertrust Technologies Corp. | Trusted storage systems and methods |
WO2001006374A2 (en) | 1999-07-16 | 2001-01-25 | Intertrust Technologies Corp. | System and method for securing an untrusted storage |
US7770016B2 (en) | 1999-07-29 | 2010-08-03 | Intertrust Technologies Corporation | Systems and methods for watermarking software and other media |
US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US7243236B1 (en) | 1999-07-29 | 2007-07-10 | Intertrust Technologies Corp. | Systems and methods for using cryptography to protect secure and insecure computing environments |
DE60023013T2 (de) | 1999-07-30 | 2006-06-29 | Intertrust Technologies Corp., Santa Clara | Verfahren und systeme zur transaktionsaufzeichnungsübertragung unter anwendung von schwellen und einem mehrstufigen protokoll |
US7475246B1 (en) | 1999-08-04 | 2009-01-06 | Blue Spike, Inc. | Secure personal content server |
US6779114B1 (en) * | 1999-08-19 | 2004-08-17 | Cloakware Corporation | Tamper resistant software-control flow encoding |
US7406603B1 (en) | 1999-08-31 | 2008-07-29 | Intertrust Technologies Corp. | Data protection systems and methods |
US7287166B1 (en) * | 1999-09-03 | 2007-10-23 | Purdue Research Foundation | Guards for application in software tamperproofing |
US7757097B2 (en) | 1999-09-03 | 2010-07-13 | Purdue Research Foundation | Method and system for tamperproofing software |
US6985885B1 (en) | 1999-09-21 | 2006-01-10 | Intertrust Technologies Corp. | Systems and methods for pricing and selling digital goods |
US6449719B1 (en) | 1999-11-09 | 2002-09-10 | Widevine Technologies, Inc. | Process and streaming server for encrypting a data stream |
US8055894B2 (en) | 1999-11-09 | 2011-11-08 | Google Inc. | Process and streaming server for encrypting a data stream with bandwidth based variation |
US6996720B1 (en) | 1999-12-17 | 2006-02-07 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
US6970849B1 (en) | 1999-12-17 | 2005-11-29 | Microsoft Corporation | Inter-server communication using request with encrypted parameter |
US7047411B1 (en) | 1999-12-17 | 2006-05-16 | Microsoft Corporation | Server for an electronic distribution system and method of operating same |
US6832316B1 (en) | 1999-12-22 | 2004-12-14 | Intertrust Technologies, Corp. | Systems and methods for protecting data secrecy and integrity |
AUPQ486599A0 (en) * | 1999-12-23 | 2000-02-03 | Zentronix Pty Ltd | A method of storing and retrieving miniaturised data |
WO2001053908A2 (en) * | 2000-01-18 | 2001-07-26 | Telcordia Technologies, Inc. | Method and systems for identifying the existence of one or more unknown programs in a system |
JP3888823B2 (ja) * | 2000-02-14 | 2007-03-07 | 松下電器産業株式会社 | 半導体集積回路 |
US6829710B1 (en) * | 2000-03-14 | 2004-12-07 | Microsoft Corporation | Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed |
US7080257B1 (en) * | 2000-03-27 | 2006-07-18 | Microsoft Corporation | Protecting digital goods using oblivious checking |
US7054443B1 (en) * | 2000-03-27 | 2006-05-30 | Microsoft Corporation | System and method for protecting digital goods using random and automatic code obfuscation |
US7085839B1 (en) | 2000-04-07 | 2006-08-01 | Intertrust Technologies Corporation | Network content management |
US7266681B1 (en) | 2000-04-07 | 2007-09-04 | Intertrust Technologies Corp. | Network communications security agent |
CA2305078A1 (en) * | 2000-04-12 | 2001-10-12 | Cloakware Corporation | Tamper resistant software - mass data encoding |
US7000119B1 (en) | 2000-04-20 | 2006-02-14 | Realnetworks, Inc. | Instruction/data protection employing derived obscuring instruction/data |
CA2447451C (en) * | 2000-05-12 | 2013-02-12 | Xtreamlok Pty. Ltd. | Information security method and system |
US7313692B2 (en) * | 2000-05-19 | 2007-12-25 | Intertrust Technologies Corp. | Trust management systems and methods |
US7107448B1 (en) | 2000-06-04 | 2006-09-12 | Intertrust Technologies Corporation | Systems and methods for governing content rendering, protection, and management applications |
US7213266B1 (en) | 2000-06-09 | 2007-05-01 | Intertrust Technologies Corp. | Systems and methods for managing and protecting electronic content and applications |
US7050586B1 (en) | 2000-06-19 | 2006-05-23 | Intertrust Technologies Corporation | Systems and methods for retrofitting electronic appliances to accept different content formats |
US7065652B1 (en) | 2000-06-21 | 2006-06-20 | Aladdin Knowledge Systems, Ltd. | System for obfuscating computer code upon disassembly |
US7171692B1 (en) | 2000-06-27 | 2007-01-30 | Microsoft Corporation | Asynchronous communication within a server arrangement |
US7051200B1 (en) | 2000-06-27 | 2006-05-23 | Microsoft Corporation | System and method for interfacing a software process to secure repositories |
US6981262B1 (en) | 2000-06-27 | 2005-12-27 | Microsoft Corporation | System and method for client interaction in a multi-level rights-management architecture |
US7539875B1 (en) | 2000-06-27 | 2009-05-26 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
US7017189B1 (en) | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
AU2001267055A1 (en) * | 2000-06-27 | 2002-01-08 | Microsoft Corporation | System and method for providing an individualized secure repository |
US6891953B1 (en) | 2000-06-27 | 2005-05-10 | Microsoft Corporation | Method and system for binding enhanced software features to a persona |
US7158953B1 (en) | 2000-06-27 | 2007-01-02 | Microsoft Corporation | Method and system for limiting the use of user-specific software features |
WO2002003604A2 (en) * | 2000-06-29 | 2002-01-10 | Cachestream Corporation | Digital rights management |
US7225159B2 (en) | 2000-06-30 | 2007-05-29 | Microsoft Corporation | Method for authenticating and securing integrated bookstore entries |
US6938170B1 (en) * | 2000-07-17 | 2005-08-30 | International Business Machines Corporation | System and method for preventing automated crawler access to web-based data sources using a dynamic data transcoding scheme |
US7752214B2 (en) * | 2000-09-01 | 2010-07-06 | Op40, Inc. | Extended environment data structure for distributed digital assets over a multi-tier computer network |
US7165175B1 (en) * | 2000-09-06 | 2007-01-16 | Widevine Technologies, Inc. | Apparatus, system and method for selectively encrypting different portions of data sent over a network |
US7127615B2 (en) | 2000-09-20 | 2006-10-24 | Blue Spike, Inc. | Security based on subliminal and supraliminal channels for data objects |
US7043473B1 (en) | 2000-11-22 | 2006-05-09 | Widevine Technologies, Inc. | Media tracking system and method |
CA2327911A1 (en) * | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
US7150045B2 (en) | 2000-12-14 | 2006-12-12 | Widevine Technologies, Inc. | Method and apparatus for protection of electronic media |
FR2818772A1 (fr) * | 2000-12-21 | 2002-06-28 | Bull Cp8 | Procede de securisation d'un operateur logique ou mathematique implante dans un module electronique a microprocesseur, ainsi que le module electronique et le systeme embarque associes |
JP4252229B2 (ja) | 2001-03-28 | 2009-04-08 | ユミルリンク株式会社 | 情報交換システム、情報通信端末、情報交換方法、プログラム、および、記録媒体 |
US7580988B2 (en) * | 2001-04-05 | 2009-08-25 | Intertrust Technologies Corporation | System and methods for managing the distribution of electronic content |
US7188342B2 (en) | 2001-04-20 | 2007-03-06 | Microsoft Corporation | Server controlled branding of client software deployed over computer networks |
US7136840B2 (en) | 2001-04-20 | 2006-11-14 | Intertrust Technologies Corp. | Systems and methods for conducting transactions and communications using a trusted third party |
FR2824401A1 (fr) * | 2001-05-04 | 2002-11-08 | Thomson Csf | Dispositif et procede pour la signature, le marquage et l'authentification de programmes d'ordinateur |
FR2824402A1 (fr) | 2001-05-04 | 2002-11-08 | Thales Sa | Dispositif et procede pour la signature, le marquage et l'authenticification de programmes d'ordinateur |
CA2348355A1 (en) * | 2001-05-24 | 2002-11-24 | Cloakware Corporation | General scheme of using encodings in computations |
US7581103B2 (en) | 2001-06-13 | 2009-08-25 | Intertrust Technologies Corporation | Software self-checking systems and methods |
WO2003003169A2 (en) * | 2001-06-28 | 2003-01-09 | Cloakware Corporation | Secure method and system for biometric verification |
US7313824B1 (en) * | 2001-07-13 | 2007-12-25 | Liquid Machines, Inc. | Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent |
US7111285B2 (en) * | 2001-07-17 | 2006-09-19 | Liquid Machines, Inc. | Method and system for protecting software applications against static and dynamic software piracy techniques |
US6694435B2 (en) * | 2001-07-25 | 2004-02-17 | Apple Computer, Inc. | Method of obfuscating computer instruction streams |
EP1280148A3 (en) * | 2001-07-26 | 2003-09-17 | Irdeto Access B.V. | Compilation technique and data distribution system using the same |
FR2828302B1 (fr) * | 2001-07-31 | 2010-09-03 | Validy | Procede pour proteger un logiciel a l'aide d'un principe dit de "branchement conditionnel" contre son utilisation non autorisee |
FR2828304B1 (fr) * | 2001-07-31 | 2010-09-03 | Validy | Procede pour proteger un logiciel a l'aide d'un principe dit de "dissociation temporelle" contre son utilisation non autorisee |
FR2828303B1 (fr) * | 2001-07-31 | 2010-09-03 | Validy | Procede pour proteger un logiciel a l'aide d'un principe dit de "renommage" contre son utilisation non autorisee |
FR2828300B1 (fr) * | 2001-07-31 | 2010-09-03 | Validy | Procede pour proteger un logiciel a l'aide d'un principe dit de "fonctions elementaires" contre son utilisation non autorisee |
FR2828305B1 (fr) * | 2001-07-31 | 2010-09-03 | Validy | Procede pour proteger un logiciel a l'aide d'un principe dit de "variable" contre son utilisation non autorisee |
US7502940B2 (en) | 2001-08-01 | 2009-03-10 | Sas Validy | Method to protect software against unwanted use with a “conditional branch” principle |
US7343494B2 (en) | 2001-08-01 | 2008-03-11 | Sas Validy | Method to protect software against unwanted use with a “renaming” principle |
US7269740B2 (en) * | 2001-08-01 | 2007-09-11 | Sas Validy | Method to protect software against unwanted use with a “variable principle” |
US7434064B2 (en) | 2001-08-01 | 2008-10-07 | Sas Validy | Method to protect software against unwanted use with a “elementary functions” principle |
GB0121064D0 (en) * | 2001-08-31 | 2001-10-24 | Transitive Technologies Ltd | Obtaining translation of generic code representation |
US20070277037A1 (en) * | 2001-09-06 | 2007-11-29 | Randy Langer | Software component authentication via encrypted embedded self-signatures |
US7210134B1 (en) * | 2001-09-06 | 2007-04-24 | Sonic Solutions | Deterring reverse-engineering of software systems by randomizing the siting of stack-based data |
DE60223990T2 (de) * | 2001-10-31 | 2008-12-04 | Aplix Corp. | System zum Ausführen von Zwischenkode, Methode zum Ausführen von Zwischenkode, und Computerprogrammprodukt zum Ausführen von Zwischenkode |
EP1308838A3 (en) * | 2001-10-31 | 2007-12-19 | Aplix Corporation | Intermediate code preprocessing apparatus, intermediate code execution apparatus, intermediate code execution system, and computer program product for preprocessing or executing intermediate code |
CA2363795A1 (en) * | 2001-11-26 | 2003-05-26 | Cloakware Corporation | Computer system protection by communication diversity |
US7328345B2 (en) | 2002-01-29 | 2008-02-05 | Widevine Technologies, Inc. | Method and system for end to end securing of content for video on demand |
CA2369304A1 (en) * | 2002-01-30 | 2003-07-30 | Cloakware Corporation | A protocol to hide cryptographic private keys |
AU2003212647A1 (en) * | 2002-03-13 | 2003-09-22 | Matsushita Electric Industrial Co., Ltd. | Secure device for preventing unauthorised use of distributed content |
JP2003280754A (ja) * | 2002-03-25 | 2003-10-02 | Nec Corp | 隠蔽化ソースプログラム、ソースプログラム変換方法及び装置並びにソース変換プログラム |
JP2003280755A (ja) * | 2002-03-25 | 2003-10-02 | Nec Corp | 自己復元型プログラム、プログラム生成方法及び装置、情報処理装置並びにプログラム |
US7299292B2 (en) * | 2002-03-29 | 2007-11-20 | Widevine Technologies, Inc. | Process and streaming server for encrypting a data stream to a virtual smart card client system |
US7287275B2 (en) | 2002-04-17 | 2007-10-23 | Moskowitz Scott A | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
US20030200449A1 (en) * | 2002-04-17 | 2003-10-23 | International Business Machines Corporation | Method of accessing a shared subroutine of computer system |
US7383570B2 (en) | 2002-04-25 | 2008-06-03 | Intertrust Technologies, Corp. | Secure authentication systems and methods |
US7149899B2 (en) | 2002-04-25 | 2006-12-12 | Intertrust Technologies Corp. | Establishing a secure channel with a human user |
US20030217280A1 (en) * | 2002-05-17 | 2003-11-20 | Keaton Thomas S. | Software watermarking for anti-tamper protection |
US7272725B2 (en) | 2002-06-25 | 2007-09-18 | Sas Validy | Method to protect software against unwanted use with a “temporal dissociation” principle |
US7383443B2 (en) * | 2002-06-27 | 2008-06-03 | Microsoft Corporation | System and method for obfuscating code using instruction replacement scheme |
US7254586B2 (en) * | 2002-06-28 | 2007-08-07 | Microsoft Corporation | Secure and opaque type library providing secure data protection of variables |
WO2004023313A1 (en) * | 2002-09-04 | 2004-03-18 | Fraunhofer Crcg, Inc. | Protecting mobile code against malicious hosts cross references to related applications |
US7594271B2 (en) * | 2002-09-20 | 2009-09-22 | Widevine Technologies, Inc. | Method and system for real-time tamper evidence gathering for software |
US7603662B2 (en) * | 2002-10-09 | 2009-10-13 | Microsoft Corporation | System and method for sensing types of local variables |
JP2004362532A (ja) * | 2002-10-25 | 2004-12-24 | Matsushita Electric Ind Co Ltd | 透かし挿入装置および透かし取出装置 |
US20040083177A1 (en) * | 2002-10-29 | 2004-04-29 | General Instrument Corporation | Method and apparatus for pre-encrypting VOD material with a changing cryptographic key |
US7150003B2 (en) * | 2002-11-25 | 2006-12-12 | Matsushita Electric Industrial Co., Ltd. | Class coalescence for obfuscation of object-oriented software |
US7051322B2 (en) * | 2002-12-06 | 2006-05-23 | @Stake, Inc. | Software analysis framework |
US7149900B2 (en) * | 2002-12-12 | 2006-12-12 | Intel Corporation | Method of defending software from debugger attacks |
US7912920B2 (en) | 2002-12-13 | 2011-03-22 | Stephen Loomis | Stream sourcing content delivery system |
US7412532B2 (en) | 2002-12-13 | 2008-08-12 | Aol Llc, A Deleware Limited Liability Company | Multimedia scheduler |
US7797064B2 (en) | 2002-12-13 | 2010-09-14 | Stephen Loomis | Apparatus and method for skipping songs without delay |
FR2849232B1 (fr) * | 2002-12-24 | 2005-02-25 | Trusted Logic | Procede pour la securisation des systemes informatiques incorporant un module d'interpretation de code |
US7584354B2 (en) * | 2003-01-31 | 2009-09-01 | Intel Corporation | Implementing portable content protection to secure secrets |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US20060130016A1 (en) * | 2003-03-17 | 2006-06-15 | Wagner John R | Method of kernal-mode instruction interception and apparatus therefor |
US7356143B2 (en) | 2003-03-18 | 2008-04-08 | Widevine Technologies, Inc | System, method, and apparatus for securely providing content viewable on a secure device |
US7007170B2 (en) | 2003-03-18 | 2006-02-28 | Widevine Technologies, Inc. | System, method, and apparatus for securely providing content viewable on a secure device |
US8510571B1 (en) | 2003-03-24 | 2013-08-13 | Hoi Chang | System and method for inserting security mechanisms into a software program |
US20040199771A1 (en) * | 2003-04-04 | 2004-10-07 | Widevine Technologies, Inc. | Method for tracing a security breach in highly distributed content |
DE10319435B4 (de) * | 2003-04-25 | 2018-07-26 | Whitecryption Corporation | Verfahren zur Verarbeitung von Daten zum Schutz eines Softwareprogramms vor Rekonstruktion |
KR100568228B1 (ko) * | 2003-05-20 | 2006-04-07 | 삼성전자주식회사 | 고유번호를 이용한 프로그램 탬퍼 방지 방법과 난독처리된 프로그램 업그레이드 방법, 상기 방법을 위한 장치 |
WO2004109443A2 (en) | 2003-06-02 | 2004-12-16 | Liquid Machines, Inc. | Managing data objects in dynamic, distributed and collaborative contexts |
AU2004264582B2 (en) * | 2003-06-05 | 2010-05-13 | Intertrust Technologies Corporation | Interoperable systems and methods for peer-to-peer service orchestration |
US20050108562A1 (en) * | 2003-06-18 | 2005-05-19 | Khazan Roger I. | Technique for detecting executable malicious code using a combination of static and dynamic analyses |
US20050021756A1 (en) * | 2003-07-26 | 2005-01-27 | Grant Bruce K. | Method of developing, delivering and rendering network applications |
US20050028010A1 (en) * | 2003-07-29 | 2005-02-03 | International Business Machines Corporation | System and method for addressing denial of service virus attacks |
US7454323B1 (en) * | 2003-08-22 | 2008-11-18 | Altera Corporation | Method for creation of secure simulation models |
US7340734B1 (en) * | 2003-08-27 | 2008-03-04 | Nvidia Corporation | Method and apparatus to make code more difficult to reverse engineer |
US7591021B2 (en) * | 2003-09-05 | 2009-09-15 | Microsoft Corporation | Object model document for obfuscating object model therein |
US8220058B2 (en) * | 2003-09-25 | 2012-07-10 | Oracle America, Inc. | Rendering and encryption engine for application program obfuscation |
US7353499B2 (en) * | 2003-09-25 | 2008-04-01 | Sun Microsystems, Inc. | Multiple instruction dispatch tables for application program obfuscation |
US7424620B2 (en) * | 2003-09-25 | 2008-09-09 | Sun Microsystems, Inc. | Interleaved data and instruction streams for application program obfuscation |
US7415618B2 (en) * | 2003-09-25 | 2008-08-19 | Sun Microsystems, Inc. | Permutation of opcode values for application program obfuscation |
US20050069138A1 (en) * | 2003-09-25 | 2005-03-31 | Sun Microsystems, Inc., A Delaware Corporation | Application program obfuscation |
US20050071656A1 (en) * | 2003-09-25 | 2005-03-31 | Klein Dean A. | Secure processor-based system and method |
US7363620B2 (en) * | 2003-09-25 | 2008-04-22 | Sun Microsystems, Inc. | Non-linear execution of application program instructions for application program obfuscation |
JP3873047B2 (ja) * | 2003-09-30 | 2007-01-24 | 株式会社東芝 | 識別情報埋込装置、識別情報解析装置、識別情報埋込方法、識別情報解析方法及びプログラム |
US7788496B2 (en) | 2003-10-08 | 2010-08-31 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf thereof |
US7979911B2 (en) * | 2003-10-08 | 2011-07-12 | Microsoft Corporation | First computer process and second computer process proxy-executing code from third computer process on behalf of first process |
US8103592B2 (en) * | 2003-10-08 | 2012-01-24 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf of first process |
US7631292B2 (en) * | 2003-11-05 | 2009-12-08 | Microsoft Corporation | Code individualism and execution protection |
US7966499B2 (en) * | 2004-01-28 | 2011-06-21 | Irdeto Canada Corporation | System and method for obscuring bit-wise and two's complement integer computations in software |
FR2866451B1 (fr) * | 2004-02-18 | 2008-02-29 | Cit Alcatel | Procede et dispositif de transformation d'un systeme d'exploitation en vue de la protection d'un programme informatique contre des intrusions exterieures |
US7383583B2 (en) * | 2004-03-05 | 2008-06-03 | Microsoft Corporation | Static and run-time anti-disassembly and anti-debugging |
JPWO2005098795A1 (ja) * | 2004-03-31 | 2008-02-28 | 松下電器産業株式会社 | コンピュータシステム、コンピュータプログラム及び加算方法 |
US8694802B2 (en) | 2004-04-30 | 2014-04-08 | Apple Inc. | System and method for creating tamper-resistant code |
NZ533028A (en) * | 2004-05-19 | 2005-09-30 | Auckland Uniservices Ltd | Method of introducing digital signature into software |
FR2871255B1 (fr) * | 2004-06-04 | 2006-08-04 | Gemplus Sa | Procede d'obfuscation de code compile, terminal et logiciel associes |
US7552337B2 (en) | 2004-06-12 | 2009-06-23 | Microsoft Corporation | Service protection |
US7721340B2 (en) | 2004-06-12 | 2010-05-18 | Microsoft Corporation | Registry protection |
US20050289037A1 (en) * | 2004-06-15 | 2005-12-29 | Smith Joseph B | Financial asset product and method for implementing same |
US7694121B2 (en) * | 2004-06-30 | 2010-04-06 | Microsoft Corporation | System and method for protected operating system boot using state validation |
US7841009B1 (en) * | 2004-07-09 | 2010-11-23 | Angel Secure Networks | System and method for defending against reverse engineering of software, firmware and hardware |
US8631077B2 (en) | 2004-07-22 | 2014-01-14 | International Business Machines Corporation | Duplicate e-mail content detection and automatic doclink conversion |
US20060037005A1 (en) * | 2004-08-15 | 2006-02-16 | Russell Paul F | Method and apparatus for increasing computer security |
US20060041625A1 (en) * | 2004-08-19 | 2006-02-23 | International Business Machines Corporation | System and method for sectional e-mail transmission |
US7890593B2 (en) * | 2008-07-17 | 2011-02-15 | International Business Machines Corporation | Sectional E-mail Transmission |
US20060041940A1 (en) * | 2004-08-21 | 2006-02-23 | Ko-Cheng Fang | Computer data protecting method |
US7590589B2 (en) | 2004-09-10 | 2009-09-15 | Hoffberg Steven M | Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference |
US9609279B2 (en) | 2004-09-24 | 2017-03-28 | Google Inc. | Method and system for providing secure CODECS |
KR20070083987A (ko) * | 2004-11-09 | 2007-08-24 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Dsp 알고리즘 보호 |
DE602005018736D1 (de) * | 2004-12-22 | 2010-02-25 | Ericsson Telefon Ab L M | Wasserzeichenmarkierung eines Computerprogrammcodes mittels äquivalenter mathematischer Ausdrücke |
DE602005013178D1 (de) * | 2004-12-22 | 2009-04-23 | Ericsson Telefon Ab L M | Wasserzeichenmarkierung eines Computerprogrammcodes |
US20060168044A1 (en) * | 2005-01-11 | 2006-07-27 | Yen-Fu Chen | System and method for display of chained messages in a single email in different orders |
US7689969B1 (en) * | 2005-01-18 | 2010-03-30 | The Mathworks, Inc. | Obfuscation of automatically generated code |
US20080015999A1 (en) * | 2005-02-04 | 2008-01-17 | Widevine Technologies, Inc. | Securely ingesting encrypted content into content servers |
US8020152B2 (en) * | 2005-02-24 | 2011-09-13 | Microsoft Corporation | Code morphing |
US7587616B2 (en) * | 2005-02-25 | 2009-09-08 | Microsoft Corporation | System and method of iterative code obfuscation |
US7370190B2 (en) * | 2005-03-03 | 2008-05-06 | Digimarc Corporation | Data processing systems and methods with enhanced bios functionality |
US7810142B2 (en) * | 2005-03-21 | 2010-10-05 | International Business Machines Corporation | Auditing compliance with a hippocratic database |
EP1873676B1 (en) * | 2005-03-25 | 2013-11-20 | Panasonic Corporation | Program converting device, secure processing device, computer program, and recording medium |
US7805714B2 (en) * | 2005-03-30 | 2010-09-28 | Alcatel-Lucent Usa Inc. | Technique for constructing syntax-directed search and modifications in program transformation systems |
US8719786B2 (en) * | 2005-03-30 | 2014-05-06 | Alcatel Lucent | Method for performing conditionalized N-way merging of source code |
US7624385B2 (en) * | 2005-03-30 | 2009-11-24 | Alcatel-Lucent Usa Inc. | Method for handling preprocessing in source code transformation |
CN101203859B (zh) * | 2005-04-21 | 2013-08-14 | 松下电器产业株式会社 | 程序难破解化装置和难破解化方法 |
US20060259903A1 (en) * | 2005-05-12 | 2006-11-16 | Xerox Corporation | Method for creating unique identification for copies of executable code and management thereof |
US20060259900A1 (en) * | 2005-05-12 | 2006-11-16 | Xerox Corporation | Method for creating unique identification for copies of executable code and management thereof |
WO2007055729A2 (en) * | 2005-05-19 | 2007-05-18 | Reifer Consultants, Inc. | Protecting applications software against unauthorized access, reverse engineering or tampering |
US20070266434A1 (en) * | 2006-05-11 | 2007-11-15 | Reifer Consultants, Inc. | Protecting Applications Software Against Unauthorized Access, Reverse Engineering or Tampering |
JP4669934B2 (ja) * | 2005-06-10 | 2011-04-13 | 国立大学法人 奈良先端科学技術大学院大学 | プログラム変換装置、実行支援装置、それらの方法およびそれらのコンピュータ・プログラム |
US8838974B2 (en) * | 2005-07-15 | 2014-09-16 | The Mathworks, Inc. | System and method for verifying the integrity of read-only components in deployed mixed-mode applications |
US7620987B2 (en) * | 2005-08-12 | 2009-11-17 | Microsoft Corporation | Obfuscating computer code to prevent an attack |
WO2007030931A1 (en) * | 2005-09-14 | 2007-03-22 | Tetraglyph Technologies Inc. | System and method for preventing unauthorized use of digital works |
US8719716B2 (en) * | 2005-09-15 | 2014-05-06 | The Mathworks, Inc. | Locked element for use in a graphical modeling environment |
WO2007038245A2 (en) | 2005-09-23 | 2007-04-05 | Widevine Technologies, Inc. | Method for evolving detectors to detect malign behavior in an artificial immune system |
US7817608B2 (en) * | 2005-09-23 | 2010-10-19 | Widevine Technologies, Inc. | Transitioning to secure IP communications for encoding, encapsulating, and encrypting data |
US8065733B2 (en) | 2005-09-23 | 2011-11-22 | Google, Inc. | Method for evolving detectors to detect malign behavior in an artificial immune system |
DE102005045852A1 (de) * | 2005-09-26 | 2007-04-05 | Siemens Ag | Verfahren und System zum Schutz von Quellcode |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US9626667B2 (en) | 2005-10-18 | 2017-04-18 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
AU2006304655B2 (en) | 2005-10-18 | 2012-08-16 | Intertrust Technologies Corporation | Methods for digital rights management |
US8122122B1 (en) | 2005-11-08 | 2012-02-21 | Raytheon Oakley Systems, Inc. | Event monitoring and collection |
US8463612B1 (en) | 2005-11-08 | 2013-06-11 | Raytheon Company | Monitoring and collection of audio events |
US8141149B1 (en) * | 2005-11-08 | 2012-03-20 | Raytheon Oakley Systems, Inc. | Keyword obfuscation |
US8689016B2 (en) | 2005-12-02 | 2014-04-01 | Google Inc. | Tamper prevention and detection for video provided over a network to a client |
WO2007066740A1 (ja) * | 2005-12-07 | 2007-06-14 | Matsushita Electric Industrial Co., Ltd. | セキュアデバイス、情報処理端末、サーバ、および認証方法 |
NL1030639C2 (nl) * | 2005-12-09 | 2007-06-12 | Antonius Theodorus Ceci Hauzer | Ventilatiesysteem voor tunneltraject of overdekte weg. |
US8701091B1 (en) | 2005-12-15 | 2014-04-15 | Nvidia Corporation | Method and system for providing a generic console interface for a graphics application |
US20070157311A1 (en) * | 2005-12-29 | 2007-07-05 | Microsoft Corporation | Security modeling and the application life cycle |
US20070192344A1 (en) * | 2005-12-29 | 2007-08-16 | Microsoft Corporation | Threats and countermeasures schema |
US20070156420A1 (en) * | 2005-12-29 | 2007-07-05 | Microsoft Corporation | Performance modeling and the application life cycle |
US20070162890A1 (en) * | 2005-12-29 | 2007-07-12 | Microsoft Corporation | Security engineering and the application life cycle |
US7890315B2 (en) | 2005-12-29 | 2011-02-15 | Microsoft Corporation | Performance engineering and the application life cycle |
US8526612B2 (en) * | 2006-01-06 | 2013-09-03 | Google Inc. | Selective and persistent application level encryption for video provided to a client |
US20070180231A1 (en) * | 2006-01-31 | 2007-08-02 | Widevine Technologies, Inc. | Preventing entitlement management message (EMM) filter attacks |
WO2007091558A1 (ja) * | 2006-02-06 | 2007-08-16 | Matsushita Electric Industrial Co., Ltd. | プログラム難読化装置 |
US7818788B2 (en) * | 2006-02-14 | 2010-10-19 | Microsoft Corporation | Web application security frame |
US7712137B2 (en) | 2006-02-27 | 2010-05-04 | Microsoft Corporation | Configuring and organizing server security information |
US8452981B1 (en) | 2006-03-01 | 2013-05-28 | Nvidia Corporation | Method for author verification and software authorization |
US7891012B1 (en) | 2006-03-01 | 2011-02-15 | Nvidia Corporation | Method and computer-usable medium for determining the authorization status of software |
US7987514B2 (en) | 2006-04-04 | 2011-07-26 | Intertrust Technologies Corp. | Systems and methods for retrofitting electronic appliances to accept different content formats |
EP1850260A1 (en) | 2006-04-26 | 2007-10-31 | Macrovision Corporation | A computer-implemented method and system for binding digital rights management executable code to a software application |
US8458673B2 (en) | 2006-04-26 | 2013-06-04 | Flexera Software Llc | Computer-implemented method and system for binding digital rights management executable code to a software application |
US20070261124A1 (en) * | 2006-05-03 | 2007-11-08 | International Business Machines Corporation | Method and system for run-time dynamic and interactive identification of software authorization requirements and privileged code locations, and for validation of other software program analysis results |
FR2903508B1 (fr) * | 2006-07-10 | 2008-10-17 | Sagem Defense Securite | Protection d'un programme interprete par une machine virtuelle |
US8436864B2 (en) * | 2006-08-01 | 2013-05-07 | Nvidia Corporation | Method and user interface for enhanced graphical operation organization |
US7778800B2 (en) * | 2006-08-01 | 2010-08-17 | Nvidia Corporation | Method and system for calculating performance parameters for a processor |
US8963932B1 (en) | 2006-08-01 | 2015-02-24 | Nvidia Corporation | Method and apparatus for visualizing component workloads in a unified shader GPU architecture |
US8607151B2 (en) * | 2006-08-01 | 2013-12-10 | Nvidia Corporation | Method and system for debugging a graphics pipeline subunit |
US8436870B1 (en) | 2006-08-01 | 2013-05-07 | Nvidia Corporation | User interface and method for graphical processing analysis |
US8301890B2 (en) | 2006-08-10 | 2012-10-30 | Inside Secure | Software execution randomization |
US7613907B2 (en) | 2006-08-11 | 2009-11-03 | Atmel Corporation | Embedded software camouflage against code reverse engineering |
US8191131B2 (en) * | 2006-08-23 | 2012-05-29 | International Business Machines Corporation | Obscuring authentication data of remote user |
US20080271001A1 (en) * | 2006-09-11 | 2008-10-30 | Yo Nonomura | Method of generating program, information processing device and microcomputer |
WO2008034900A1 (en) * | 2006-09-21 | 2008-03-27 | Boesgaard Soerensen Hans Marti | Fabrication of computer executable program files from source code |
US20090249492A1 (en) * | 2006-09-21 | 2009-10-01 | Hans Martin Boesgaard Sorensen | Fabrication of computer executable program files from source code |
US7554865B2 (en) | 2006-09-21 | 2009-06-30 | Atmel Corporation | Randomizing current consumption in memory devices |
US8001607B2 (en) * | 2006-09-27 | 2011-08-16 | Direct Computer Resources, Inc. | System and method for obfuscation of data across an enterprise |
US8689193B2 (en) * | 2006-11-01 | 2014-04-01 | At&T Intellectual Property Ii, L.P. | Method and apparatus for protecting a software application against a virus |
FR2909467A1 (fr) * | 2006-12-05 | 2008-06-06 | Logiways France Sa | Procede et dispositif de protection d'un systeme de traitement de l'information |
US8468351B2 (en) | 2006-12-15 | 2013-06-18 | Codesealer Aps | Digital data authentication |
EP1947584B1 (en) * | 2006-12-21 | 2009-05-27 | Telefonaktiebolaget LM Ericsson (publ) | Obfuscating computer program code |
DE602006008166D1 (de) | 2006-12-21 | 2009-09-10 | Ericsson Telefon Ab L M | Verschleierung von Computerprogrammcodes |
US8146102B2 (en) * | 2006-12-22 | 2012-03-27 | Sap Ag | Development environment for groupware integration with enterprise applications |
US8613080B2 (en) | 2007-02-16 | 2013-12-17 | Veracode, Inc. | Assessment and analysis of software security flaws in virtual machines |
US20080209401A1 (en) * | 2007-02-22 | 2008-08-28 | Microsoft Corporation | Techniques for integrating debugging with decompilation |
US8752032B2 (en) * | 2007-02-23 | 2014-06-10 | Irdeto Canada Corporation | System and method of interlocking to protect software-mediated program and device behaviours |
WO2008101340A1 (en) * | 2007-02-23 | 2008-08-28 | Cloakware Corporation | System and method for interlocking to protect software-mediated program and device behaviours |
US8370606B2 (en) | 2007-03-16 | 2013-02-05 | Atmel Corporation | Switching data pointers based on context |
US7797516B2 (en) | 2007-03-16 | 2010-09-14 | Atmel Corporation | Microcontroller with low-cost digital signal processing extensions |
US20080229115A1 (en) * | 2007-03-16 | 2008-09-18 | Microsoft Corporation | Provision of functionality via obfuscated software |
US8788848B2 (en) * | 2007-03-22 | 2014-07-22 | Microsoft Corporation | Optical DNA |
US8837721B2 (en) * | 2007-03-22 | 2014-09-16 | Microsoft Corporation | Optical DNA based on non-deterministic errors |
US7987380B2 (en) | 2007-03-27 | 2011-07-26 | Atmel Rousset S.A.S. | Methods and apparatus to detect voltage class of a circuit |
US8181039B2 (en) * | 2007-04-13 | 2012-05-15 | Microsoft Corporation | Disc drive counterfeiting countermeasure |
US7912894B2 (en) * | 2007-05-15 | 2011-03-22 | Adams Phillip M | Computerized, copy-detection and discrimination apparatus and method |
US8621093B2 (en) | 2007-05-21 | 2013-12-31 | Google Inc. | Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network |
US7984288B2 (en) | 2007-05-21 | 2011-07-19 | Sercomm Corporation | Software protection apparatus and protection method thereof |
EP1998267A1 (en) * | 2007-05-29 | 2008-12-03 | Sercomm Corporation | Software protection apparatus and protection method thereof |
US8243924B2 (en) | 2007-06-29 | 2012-08-14 | Google Inc. | Progressive download or streaming of digital media securely through a localized container and communication protocol proxy |
ATE456837T1 (de) * | 2007-06-29 | 2010-02-15 | Ericsson Telefon Ab L M | Verschleierung von ausführungsspuren eines computerprogrammcodes |
US8130956B2 (en) * | 2007-08-02 | 2012-03-06 | International Business Machines Corporation | Efficient and low power encrypting and decrypting of data |
US8026930B2 (en) * | 2007-08-06 | 2011-09-27 | International Business Machines Corporation | Preventing viewing by bystanders of information on a display screen |
WO2009021070A1 (en) * | 2007-08-06 | 2009-02-12 | Bernard De Monseignat | System and method for authentication, data transfer, and protection against phishing |
US8296738B1 (en) | 2007-08-13 | 2012-10-23 | Nvidia Corporation | Methods and systems for in-place shader debugging and performance tuning |
US20090049425A1 (en) * | 2007-08-14 | 2009-02-19 | Aladdin Knowledge Systems Ltd. | Code Obfuscation By Reference Linking |
US9035957B1 (en) | 2007-08-15 | 2015-05-19 | Nvidia Corporation | Pipeline debug statistics system and method |
US8112636B1 (en) * | 2007-11-06 | 2012-02-07 | Lockheed Martin Corporation | Protection of code or data from exposure by use of code injection service |
US7765500B2 (en) * | 2007-11-08 | 2010-07-27 | Nvidia Corporation | Automated generation of theoretical performance analysis based upon workload and design configuration |
CN100474253C (zh) * | 2007-11-22 | 2009-04-01 | 北京飞天诚信科技有限公司 | .Net程序保护方法及装置 |
EP2071483A1 (fr) * | 2007-12-07 | 2009-06-17 | Gemplus | Procédé de sécurisation de l'éxécution d'un code par masquage itératifs |
US20110035601A1 (en) * | 2007-12-21 | 2011-02-10 | University Of Virginia Patent Foundation | System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms |
US8868464B2 (en) | 2008-02-07 | 2014-10-21 | Google Inc. | Preventing unauthorized modification or skipping of viewing of advertisements within content |
US8055668B2 (en) | 2008-02-13 | 2011-11-08 | Camouflage Software, Inc. | Method and system for masking data in a consistent manner across multiple data sources |
US8176337B2 (en) * | 2008-03-12 | 2012-05-08 | Apple Inc. | Computer object code obfuscation using boot installation |
GB0806284D0 (en) * | 2008-04-07 | 2008-05-14 | Metaforic Ltd | Profile-guided tamper-proofing |
US8448002B2 (en) * | 2008-04-10 | 2013-05-21 | Nvidia Corporation | Clock-gated series-coupled data processing modules |
WO2009139650A1 (en) * | 2008-05-12 | 2009-11-19 | Business Intelligence Solutions Safe B.V. | A data obfuscation system, method, and computer implementation of data obfuscation for secret databases |
US8800048B2 (en) * | 2008-05-20 | 2014-08-05 | Microsoft Corporation | Software protection through interdependent parameter cloud constrained software execution |
US8429637B2 (en) * | 2008-09-02 | 2013-04-23 | Apple Inc. | System and method for conditional expansion obfuscation |
US8434061B2 (en) * | 2008-06-06 | 2013-04-30 | Apple Inc. | System and method for array obfuscation |
US8522015B2 (en) * | 2008-06-27 | 2013-08-27 | Microsoft Corporation | Authentication of binaries in memory with proxy code execution |
US8069053B2 (en) * | 2008-08-13 | 2011-11-29 | Hartford Fire Insurance Company | Systems and methods for de-identification of personal data |
US8589372B2 (en) | 2008-12-16 | 2013-11-19 | Clinton A. Krislov | Method and system for automated document registration with cloud computing |
US8914351B2 (en) | 2008-12-16 | 2014-12-16 | Clinton A. Krislov | Method and system for secure automated document registration from social media networks |
US8341141B2 (en) | 2008-12-16 | 2012-12-25 | Krislov Clinton A | Method and system for automated document registration |
US9135948B2 (en) * | 2009-07-03 | 2015-09-15 | Microsoft Technology Licensing, Llc | Optical medium with added descriptor to reduce counterfeiting |
US20100214894A1 (en) * | 2009-02-20 | 2010-08-26 | Microsoft Corporation | Optical Medium with Added Descriptor to Reduce Counterfeiting |
FR2942559B1 (fr) * | 2009-02-24 | 2016-05-20 | European Aeronautic Defence And Space Company - Eads France | Procede de protection du code source d'un programme d'ordinateur. |
FR2942558B1 (fr) | 2009-02-24 | 2014-05-30 | Eads Europ Aeronautic Defence | Procede d'obscurcissement d'un programme d'ordinateur. |
EP2234031A1 (en) * | 2009-03-24 | 2010-09-29 | SafeNet, Inc. | Obfuscation |
US8929303B2 (en) * | 2009-04-06 | 2015-01-06 | Samsung Electronics Co., Ltd. | Control and data channels for advanced relay operation |
CN101859330B (zh) * | 2009-04-09 | 2012-11-21 | 辉达公司 | 验证集成电路效能模型的方法 |
US8914903B1 (en) | 2009-06-03 | 2014-12-16 | Amdocs Software System Limited | System, method, and computer program for validating receipt of digital content by a client device |
US9027143B1 (en) | 2009-08-26 | 2015-05-05 | Adobe Systems Incorporated | System and method for multipronged authentication |
US9524345B1 (en) | 2009-08-31 | 2016-12-20 | Richard VanderDrift | Enhancing content using linked context |
CN102598017B (zh) * | 2009-11-13 | 2016-03-09 | 爱迪德技术有限公司 | 提高Java字节码的防窜改能力的系统和方法 |
EP2343663A1 (fr) * | 2009-12-17 | 2011-07-13 | Gemalto SA | Procédé de protection polymorphe d'un code exécutable |
US8645930B2 (en) * | 2010-01-04 | 2014-02-04 | Apple Inc. | System and method for obfuscation by common function and common function prototype |
US9639707B1 (en) | 2010-01-14 | 2017-05-02 | Richard W. VanderDrift | Secure data storage and communication for network computing |
US8887140B2 (en) * | 2010-01-15 | 2014-11-11 | Apple Inc. | System and method for annotation-driven function inlining |
US11301592B2 (en) * | 2010-01-28 | 2022-04-12 | Pure Storage, Inc. | Distributed storage with data obfuscation and method for use therewith |
WO2011116446A1 (en) * | 2010-03-24 | 2011-09-29 | Irdeto Canada Corporation | System and method for random algorithm selection to dynamically conceal the operation of software |
KR20140053754A (ko) | 2010-03-25 | 2014-05-08 | 어데토 캐나다 코포레이션 | 부 채널 및 반복 호출 공격들의 방지를 위한 동적 시간 가변 연산 경로 시스템 및 방법 |
CA2792787C (en) * | 2010-03-31 | 2017-07-25 | Irdeto Canada Corporation | System and method for protecting cryptographic assets from a white-box attack |
US9152411B2 (en) * | 2010-05-12 | 2015-10-06 | Microsoft Technology Licensing, Llc | Edge computing platform for delivery of rich internet applications |
EP2402880A1 (en) * | 2010-07-01 | 2012-01-04 | Aladdin Europe GmbH | Method and device for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language |
US20120101929A1 (en) * | 2010-08-26 | 2012-04-26 | Massively Parallel Technologies, Inc. | Parallel processing development environment and associated methods |
KR101216995B1 (ko) * | 2010-12-03 | 2012-12-31 | 충남대학교산학협력단 | 인덱스 테이블 기반 코드 암호화 및 복호화 장치 및 그 방법 |
US9195810B2 (en) | 2010-12-28 | 2015-11-24 | Microsoft Technology Licensing, Llc | Identifying factorable code |
EP2482184A1 (en) * | 2011-02-01 | 2012-08-01 | Irdeto B.V. | Adaptive obfuscated virtual machine |
US8707053B2 (en) * | 2011-02-09 | 2014-04-22 | Apple Inc. | Performing boolean logic operations using arithmetic operations by code obfuscation |
US8930717B2 (en) | 2011-03-01 | 2015-01-06 | Angel Secure Networks, Inc. | Secure processing module and method for making the same |
US9058482B2 (en) | 2011-03-01 | 2015-06-16 | Angel Secure Networks, Inc. | Controlling user access to electronic resources without password |
JP5777189B2 (ja) | 2011-03-24 | 2015-09-09 | イルデト ビー ヴイIrdeto B.V. | 攻撃耐性のためにアプリケーション全体に依存関係ネットワークを提供するシステムおよび方法 |
CA2832752A1 (en) | 2011-04-11 | 2012-10-18 | Intertrust Technologies Corporation | Information security systems and methods |
FR2974207B1 (fr) * | 2011-04-14 | 2013-05-24 | In Webo Technologies | Procede et systeme de securisation d'un logiciel |
US8621237B1 (en) * | 2011-06-30 | 2013-12-31 | Emc Corporation | Protecting against cryptographic key exposure in source code |
US20130014267A1 (en) * | 2011-07-07 | 2013-01-10 | Farrugia Augustin J | Computer protocol generation and obfuscation |
US20130097431A1 (en) * | 2011-10-18 | 2013-04-18 | Paul Marion Hriljac | Systems and methods of source software code modification |
US9116765B2 (en) | 2011-10-20 | 2015-08-25 | Apple Inc. | System and method for obfuscating data using instructions as a source of pseudorandom values |
AU2012337403B2 (en) * | 2011-11-16 | 2015-04-30 | V-Key Inc | Cryptographic system and methodology for securing software cryptography |
US8751800B1 (en) | 2011-12-12 | 2014-06-10 | Google Inc. | DRM provider interoperability |
WO2013091709A1 (en) * | 2011-12-22 | 2013-06-27 | Fundació Privada Barcelona Digital Centre Tecnologic | Method and apparatus for real-time dynamic transformation of the code of a web document |
US8539601B2 (en) | 2012-01-17 | 2013-09-17 | Lockheed Martin Corporation | Secure data storage and retrieval |
CN104396181B (zh) * | 2012-02-09 | 2018-02-23 | 爱迪德技术有限公司 | 用于生成和保护密码密钥的系统和方法 |
US9286063B2 (en) | 2012-02-22 | 2016-03-15 | Veracode, Inc. | Methods and systems for providing feedback and suggested programming methods |
US8661549B2 (en) * | 2012-03-02 | 2014-02-25 | Apple Inc. | Method and apparatus for obfuscating program source codes |
EP2828782A1 (en) * | 2012-03-23 | 2015-01-28 | Irdeto B.V. | Software fingerprinting |
EP2831795B1 (en) * | 2012-03-30 | 2019-01-09 | Irdeto B.V. | Securing accessible systems using variable dependent coding |
WO2013184108A1 (en) * | 2012-06-06 | 2013-12-12 | Empire Technology Development Llc | Software protection mechanism |
EP2682865B1 (de) * | 2012-07-05 | 2018-05-30 | Vector Informatik GmbH | Verfahren zur Kommunikation mit einem Steuerprogramm eines Steuergeräts sowie Applikationsmodule dazu |
DE102012015899A1 (de) * | 2012-08-10 | 2014-02-13 | Giesecke & Devrient Gmbh | Verfahren zum Erzeugen von ausführbarem Programmcode |
US9323315B2 (en) | 2012-08-15 | 2016-04-26 | Nvidia Corporation | Method and system for automatic clock-gating of a clock grid at a clock source |
US8850371B2 (en) | 2012-09-14 | 2014-09-30 | Nvidia Corporation | Enhanced clock gating in retimed modules |
US9270660B2 (en) | 2012-11-25 | 2016-02-23 | Angel Secure Networks, Inc. | System and method for using a separate device to facilitate authentication |
US8918768B2 (en) * | 2012-12-06 | 2014-12-23 | Apple Inc. | Methods and apparatus for correlation protected processing of data operations |
KR101429229B1 (ko) * | 2012-12-27 | 2014-08-12 | 한라대학교산학협력단 | 명령문 병합을 이용한 자바 난독화방법 |
US9519568B2 (en) | 2012-12-31 | 2016-12-13 | Nvidia Corporation | System and method for debugging an executing general-purpose computing on graphics processing units (GPGPU) application |
US10152591B2 (en) * | 2013-02-10 | 2018-12-11 | Paypal, Inc. | Protecting against malware variants using reconstructed code of malware |
IL224743A0 (en) * | 2013-02-14 | 2013-06-27 | Harel Cain | A system for automatic obfuscation of computer programs |
US9116712B2 (en) | 2013-02-28 | 2015-08-25 | Microsoft Technology Licensing, Llc | Compile based obfuscation |
US9411708B2 (en) | 2013-04-12 | 2016-08-09 | Wipro Limited | Systems and methods for log generation and log obfuscation using SDKs |
US9430534B2 (en) | 2013-05-09 | 2016-08-30 | Wipro Limited | Systems and methods for improved security and precision in executing analytics using SDKS |
US9471456B2 (en) | 2013-05-15 | 2016-10-18 | Nvidia Corporation | Interleaved instruction debugger |
CN104166822B (zh) * | 2013-05-20 | 2017-10-13 | 阿里巴巴集团控股有限公司 | 一种数据保护的方法和装置 |
US10102384B2 (en) * | 2013-05-30 | 2018-10-16 | Jscrambler S.A. | Digital content execution control mechanism |
EP3005209B1 (en) | 2013-05-30 | 2021-02-17 | JScrambler S.A. | Web application protection |
US8738931B1 (en) * | 2013-10-21 | 2014-05-27 | Conley Jack Funk | Method for determining and protecting proprietary source code using mnemonic identifiers |
US9419993B2 (en) * | 2013-12-12 | 2016-08-16 | Empire Technology Development Llc | Randomization of processor subunit timing to enhance security |
US8954583B1 (en) | 2014-01-20 | 2015-02-10 | Shape Security, Inc. | Intercepting and supervising calls to transformed operations and objects |
TW201530344A (zh) * | 2014-01-21 | 2015-08-01 | hong-jian Zhou | 應用程式存取保護方法及應用程式存取保護裝置 |
EP2913772A1 (de) | 2014-02-28 | 2015-09-02 | Wibu-Systems AG | Verfahren und Computersystem zum Schutz eines Computerprogramms gegen Beeinflussung |
GB201405754D0 (en) * | 2014-03-31 | 2014-05-14 | Irdeto Bv | Protecting an item of software comprising conditional code |
WO2015149828A1 (en) * | 2014-03-31 | 2015-10-08 | Irdeto B.V. | Protecting an item of software |
US8997256B1 (en) | 2014-03-31 | 2015-03-31 | Terbium Labs LLC | Systems and methods for detecting copied computer code using fingerprints |
US9459861B1 (en) | 2014-03-31 | 2016-10-04 | Terbium Labs, Inc. | Systems and methods for detecting copied computer code using fingerprints |
US9497252B2 (en) | 2014-03-31 | 2016-11-15 | International Business Machines Corporation | On-demand code version switching |
US9378001B2 (en) | 2014-05-02 | 2016-06-28 | Microsoft Technology Licensing, Llc | Matching program sections through feature extraction |
US9411597B2 (en) * | 2014-05-06 | 2016-08-09 | Nxp B.V. | Return-oriented programming as an obfuscation technique |
US9858440B1 (en) * | 2014-05-23 | 2018-01-02 | Shape Security, Inc. | Encoding of sensitive data |
US9003511B1 (en) | 2014-07-22 | 2015-04-07 | Shape Security, Inc. | Polymorphic security policy action |
CN105404794B (zh) * | 2014-09-04 | 2019-09-20 | 腾讯科技(深圳)有限公司 | Java应用软件的保护方法和装置 |
US9602543B2 (en) | 2014-09-09 | 2017-03-21 | Shape Security, Inc. | Client/server polymorphism using polymorphic hooks |
US10657262B1 (en) | 2014-09-28 | 2020-05-19 | Red Balloon Security, Inc. | Method and apparatus for securing embedded device firmware |
CN104318134B (zh) * | 2014-11-05 | 2017-06-06 | 北京深思数盾科技股份有限公司 | 一种数据保护方法 |
WO2016118216A2 (en) | 2014-11-06 | 2016-07-28 | Intertrust Technologies Corporation | Secure application distribution systems and methods |
US11269621B2 (en) * | 2015-01-27 | 2022-03-08 | Arris Enterprises Llc | Obfuscation for protection of streaming media and other data flows |
WO2016190922A2 (en) | 2015-02-09 | 2016-12-01 | Medici, Inc. | Crypto integration platform |
US9779239B2 (en) * | 2015-03-15 | 2017-10-03 | Fujitsu Limited | Detection of malicious software behavior using signature-based static analysis |
CN104766166B (zh) * | 2015-03-27 | 2018-06-19 | 杭州安恒信息技术有限公司 | 一种面向等级保护的信息系统安全合规性检查方法 |
US9805203B2 (en) * | 2015-04-21 | 2017-10-31 | Sap Se | Cooperative static and dynamic analysis of web application code for finding security vulnerabilities |
US11704733B2 (en) | 2015-05-01 | 2023-07-18 | Tzero Ip, Llc | Crypto multiple security asset creation and redemption platform |
US20160328539A1 (en) * | 2015-05-05 | 2016-11-10 | Nxp B.V. | Obscuring Software Code With Split Variables |
US10068070B2 (en) * | 2015-05-05 | 2018-09-04 | Nxp B.V. | White-box elliptic curve point multiplication |
EP3295404A4 (en) * | 2015-05-26 | 2019-02-06 | T0.Com, Inc. | MISSING OF INTENTIONS IN TRANSACTIONS USING ENCRYPTION TECHNIQUES |
WO2017007936A1 (en) | 2015-07-07 | 2017-01-12 | Shape Security, Inc. | Split serving of computer code |
US9471285B1 (en) | 2015-07-09 | 2016-10-18 | Synopsys, Inc. | Identifying software components in a software codebase |
CN106407754B (zh) * | 2015-07-30 | 2021-06-18 | 中兴通讯股份有限公司 | 一种生成随机布局程序的方法及装置 |
US9946853B1 (en) * | 2015-09-17 | 2018-04-17 | Symantec Corporation | Techniques for application code obfuscation |
US10509918B1 (en) * | 2015-09-18 | 2019-12-17 | Hrl Laboratories, Llc | One-time obfuscation for polynomial-size ordered binary decision diagrams (POBDDs) |
US10594705B2 (en) * | 2015-10-06 | 2020-03-17 | Shouhuai Xu | Systems and methods for instructions-based detection of sophisticated obfuscation and packing |
US9703537B2 (en) | 2015-11-02 | 2017-07-11 | International Business Machines Corporation | Method for defining alias sets |
CN108475303A (zh) * | 2015-12-31 | 2018-08-31 | 计算机2.0(2015)有限公司 | 应用递增多项式代码增强抵抗反向工程的计算机实现方法 |
EP3220304B1 (en) * | 2016-02-22 | 2018-11-07 | Eshard | Method of testing the resistance of a circuit to a side channel analysis |
US10171493B2 (en) | 2016-03-05 | 2019-01-01 | Sears Brands, L.L.C. | Method and system to dynamically obfuscate a web services interface |
WO2017156158A1 (en) | 2016-03-09 | 2017-09-14 | Shape Security, Inc. | Applying bytecode obfuscation techniques to programs written in an interpreted language |
US10216488B1 (en) | 2016-03-14 | 2019-02-26 | Shape Security, Inc. | Intercepting and injecting calls into operations and objects |
JP6730587B2 (ja) * | 2016-06-13 | 2020-07-29 | 富士通株式会社 | キャッシュミス推定プログラム、キャッシュミス推定方法及び情報処理装置 |
US10574632B2 (en) * | 2016-06-30 | 2020-02-25 | Hcl Technologies Limited | System and method for secure sharing of a source code |
US10243937B2 (en) * | 2016-07-08 | 2019-03-26 | Nxp B.V. | Equality check implemented with secret sharing |
US10078505B2 (en) * | 2016-07-20 | 2018-09-18 | International Business Machines Corporation | Partial connection of iterations during loop unrolling |
US10394554B1 (en) * | 2016-09-09 | 2019-08-27 | Stripe, Inc. | Source code extraction via monitoring processing of obfuscated byte code |
WO2018102767A1 (en) | 2016-12-02 | 2018-06-07 | Shape Security, Inc. | Obfuscating source code sent, from a server computer, to a browser on a client computer |
US10382450B2 (en) * | 2017-02-21 | 2019-08-13 | Sanctum Solutions Inc. | Network data obfuscation |
JP7131946B2 (ja) | 2017-04-20 | 2022-09-06 | Line株式会社 | アプリケーションの保安性を評価する方法およびシステム |
WO2018194196A1 (ko) * | 2017-04-20 | 2018-10-25 | 라인 가부시키가이샤 | Elf 파일의 난독화 적용 여부의 탐지 및 보안성 평가를 위한 방법 및 시스템 |
WO2018194198A1 (ko) * | 2017-04-20 | 2018-10-25 | 라인 가부시키가이샤 | Pe 파일의 난독화 적용 여부의 탐지 및 보안성 평가를 위한 방법 및 시스템 |
US10521612B2 (en) * | 2017-06-21 | 2019-12-31 | Ca, Inc. | Hybrid on-premises/software-as-service applications |
CN107506651B (zh) * | 2017-07-04 | 2021-10-22 | 环玺信息科技(上海)有限公司 | 一种代码加密方法及系统 |
US10331839B2 (en) * | 2017-08-18 | 2019-06-25 | Honeywell Federal Manufacturing & Technologies, Llc | System and method for obfuscation of electronic circuits |
EP3467691B1 (en) | 2017-10-05 | 2020-08-26 | Eshard | Method of selecting software files |
US10121022B1 (en) | 2017-10-09 | 2018-11-06 | Jason McNutt | Methods and systems for encrypting data using object-based screens |
CN110659200B (zh) * | 2018-06-29 | 2023-05-02 | 中国航发商用航空发动机有限责任公司 | 航空机载软件的源码和目标码对比分析方法及系统 |
US11307962B2 (en) | 2018-07-09 | 2022-04-19 | United States Of America As Represented By The Secretary Of The Navy | Method for semantic preserving transform mutation discovery and vetting |
US10521613B1 (en) * | 2018-08-08 | 2019-12-31 | Carlos Manuel Gonzalez | Adaptive standalone secure software |
US10620946B1 (en) * | 2018-10-23 | 2020-04-14 | Oracle International Corporation | Dynamic modeling for opaque code during static analysis |
KR20200047187A (ko) * | 2018-10-26 | 2020-05-07 | 삼성전자주식회사 | 서버 및 서버의 제어 방법 |
DE102019004398A1 (de) * | 2019-06-21 | 2020-12-24 | Giesecke+Devrient Mobile Security Gmbh | Obfuskierung einer Softwareapplikation |
US20210004485A1 (en) * | 2019-07-01 | 2021-01-07 | International Business Machines Corporation | Cognitive Iterative Minimization of Personally Identifiable Information in Electronic Documents |
US11741197B1 (en) | 2019-10-15 | 2023-08-29 | Shape Security, Inc. | Obfuscating programs using different instruction set architectures |
US11599671B1 (en) * | 2019-12-13 | 2023-03-07 | TripleBlind, Inc. | Systems and methods for finding a value in a combined list of private values |
US11431688B2 (en) | 2019-12-13 | 2022-08-30 | TripleBlind, Inc. | Systems and methods for providing a modified loss function in federated-split learning |
CN111190601A (zh) * | 2019-12-25 | 2020-05-22 | 航天信息股份有限公司 | 面向安卓应用程序的渐进控制流混淆方法和电子设备 |
US11204985B2 (en) * | 2020-03-31 | 2021-12-21 | Irdeto Canada Corporation | Systems, methods, and storage media for creating secured computer code having entangled transformations |
US11354218B2 (en) * | 2020-05-06 | 2022-06-07 | Sap Se | Generation of optimal program variation |
CN113158147B (zh) * | 2021-03-24 | 2022-12-09 | 中国人民解放军战略支援部队信息工程大学 | 一种基于母体融合的代码混淆方法 |
WO2023009588A1 (en) | 2021-07-27 | 2023-02-02 | TripleBlind, Inc. | Systems and methods for providing a multi-party computation system for neural networks |
US20230289449A1 (en) * | 2022-03-11 | 2023-09-14 | Bank Of America Corporation | Apparatus and methods for leveraging machine learning to programmatically identify and detect obfuscation |
Family Cites Families (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4644493A (en) | 1984-09-14 | 1987-02-17 | International Business Machines Corporation | Implementing a shared higher level of privilege on personal computers for copy protection of software |
US4827508A (en) | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US5224160A (en) | 1987-02-23 | 1993-06-29 | Siemens Nixdorf Informationssysteme Ag | Process for securing and for checking the integrity of the secured programs |
US4965724A (en) | 1987-03-05 | 1990-10-23 | Oki Electric Industry Co., Ltd. | Compiler system using reordering of microoperations to eliminate interlocked instructions for pipelined processing of assembler source program |
US4866769A (en) | 1987-08-05 | 1989-09-12 | Ibm Corporation | Hardware assist for protecting PC software |
CA2010056C (en) | 1990-02-14 | 1998-05-12 | Charles Brian Hall | Method for improving the efficiency of arithmetic code generation in an optimizing compiler using machine independent update instruction generation |
EP0459046A1 (en) | 1990-05-31 | 1991-12-04 | International Business Machines Corporation | Computer software protection |
US5481708A (en) | 1992-06-05 | 1996-01-02 | Borland International, Inc. | System and methods for optimizing object-oriented compilations |
US5287408A (en) | 1992-08-31 | 1994-02-15 | Autodesk, Inc. | Apparatus and method for serializing and validating copies of computer software |
US5367685A (en) | 1992-12-22 | 1994-11-22 | Firstperson, Inc. | Method and apparatus for resolving data references in generated code |
JP3280449B2 (ja) | 1993-03-01 | 2002-05-13 | 富士通株式会社 | コンパイル装置 |
JPH07114473A (ja) | 1993-10-19 | 1995-05-02 | Fujitsu Ltd | コンパイラの命令列最適化方法 |
US5579520A (en) | 1994-05-13 | 1996-11-26 | Borland International, Inc. | System and methods for optimizing compiled code according to code object participation in program activities |
US5950505A (en) | 1994-05-24 | 1999-09-14 | Locher; Beat | Process for stripping an insulated wire or cable having a cross-section which may be non-circular and stripping device for carrying out the process |
US5724425A (en) | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
US5559884A (en) | 1994-06-30 | 1996-09-24 | Microsoft Corporation | Method and system for generating and auditing a signature for a computer program |
US5664191A (en) | 1994-06-30 | 1997-09-02 | Microsoft Corporation | Method and system for improving the locality of memory references during execution of a computer program |
FR2721984B1 (fr) | 1994-06-30 | 1996-09-06 | Valeo | Volant amortisseur, et embrayage notamment pour vehicule automobile equipe d'un tel volant |
US5646997A (en) | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data |
US5745569A (en) | 1996-01-17 | 1998-04-28 | The Dice Company | Method for stega-cipher protection of computer code |
CN100452071C (zh) | 1995-02-13 | 2009-01-14 | 英特特拉斯特技术公司 | 用于安全交易管理和电子权利保护的系统和方法 |
US5943422A (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US5499333A (en) | 1995-04-20 | 1996-03-12 | International Business Machines Corporation | Method and apparatus for at least partially instantiating an object in a compound document using the object's parent class configuration data when the object's configuration data is unavailable |
US5592549A (en) | 1995-06-15 | 1997-01-07 | Infosafe Systems, Inc. | Method and apparatus for retrieving selected information from a secure information source |
US6006328A (en) | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
WO1997004394A1 (en) * | 1995-07-14 | 1997-02-06 | Christopher Nathan Drake | Computer software authentication, protection, and security system |
JP4518574B2 (ja) | 1995-08-11 | 2010-08-04 | ソニー株式会社 | 記録方法及び装置、記録媒体、並びに再生方法及び装置 |
US5835776A (en) | 1995-11-17 | 1998-11-10 | Sun Microsystems, Inc. | Method and apparatus for instruction scheduling in an optimizing compiler for minimizing overhead instructions |
US6088452A (en) * | 1996-03-07 | 2000-07-11 | Northern Telecom Limited | Encoding technique for software and hardware |
WO1997043761A2 (en) | 1996-05-15 | 1997-11-20 | Intertrust Technologies Corp. | Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances |
US5805895A (en) | 1996-06-09 | 1998-09-08 | Motorola, Inc. | Method and apparatus for code translation optimization |
US5892899A (en) * | 1996-06-13 | 1999-04-06 | Intel Corporation | Tamper resistant methods and apparatus |
AU739693B2 (en) | 1996-08-12 | 2001-10-18 | Intertrust Technologies Corp. | Trusted and secure techniques for item delivery and execution |
US5966537A (en) * | 1997-05-28 | 1999-10-12 | Sun Microsystems, Inc. | Method and apparatus for dynamically optimizing an executable computer program using input data |
US6102966A (en) | 1998-03-20 | 2000-08-15 | Preemptive Solutions, Inc. | Method for renaming identifiers of a computer program |
-
1998
- 1998-06-09 EP EP98930114A patent/EP0988591A1/en not_active Withdrawn
- 1998-06-09 CA CA2293650A patent/CA2293650C/en not_active Expired - Lifetime
- 1998-06-09 CN CN98806038.8A patent/CN1260055A/zh active Pending
- 1998-06-09 JP JP50866099A patent/JP4739465B2/ja not_active Expired - Lifetime
- 1998-06-09 AU AU79579/98A patent/AU7957998A/en not_active Abandoned
- 1998-06-09 US US09/095,346 patent/US6668325B1/en not_active Expired - Lifetime
- 1998-06-09 WO PCT/US1998/012017 patent/WO1999001815A1/en not_active Application Discontinuation
Non-Patent Citations (6)
Title |
---|
CSND199800170004, Robert S. Swanke, "他人の作ったプログラムの上手な解析方法 The Art of Reverse Engineering", C MAGAZINE 第3巻 第10号, 19911001, 第3巻, 42−44頁, JP, ソフトバンク株式会社 * |
CSNG200000560005, 門田 暁人 Akito MONDEN, "プログラムの難読化法の実験的評価 An Experiment to Evaluate Methods for Program Scrambling", 情報処理学会研究報告 Vol.96 No.32 IPSJ SIG Notes, 19960322, 第96巻, 33−40頁, JP, 社団法人情報処理学会 Information Processing Socie * |
CSNG200000608002, 村山 隆徳 Takanori MURAYAMA, "ソフトウェアの難読化について How to make a software program hard to understand", 電子情報通信学会技術研究報告 Vol.95 No.353 IEICE Technical Report, 19951116, 第95巻, 9−14頁, JP, 社団法人電子情報通信学会 The Institute of Electro * |
JPN6009001059, Robert S. Swanke, "他人の作ったプログラムの上手な解析方法 The Art of Reverse Engineering", C MAGAZINE 第3巻 第10号, 19911001, 第3巻, 42−44頁, JP, ソフトバンク株式会社 * |
JPN6009001061, 村山 隆徳 Takanori MURAYAMA, "ソフトウェアの難読化について How to make a software program hard to understand", 電子情報通信学会技術研究報告 Vol.95 No.353 IEICE Technical Report, 19951116, 第95巻, 9−14頁, JP, 社団法人電子情報通信学会 The Institute of Electro * |
JPN6009001063, 門田 暁人 Akito MONDEN, "プログラムの難読化法の実験的評価 An Experiment to Evaluate Methods for Program Scrambling", 情報処理学会研究報告 Vol.96 No.32 IPSJ SIG Notes, 19960322, 第96巻, 33−40頁, JP, 社団法人情報処理学会 Information Processing Socie * |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4572087B2 (ja) * | 2003-06-20 | 2010-10-27 | マイクロソフト コーポレーション | スパムフィルタの不明瞭化 |
JP2005011326A (ja) * | 2003-06-20 | 2005-01-13 | Microsoft Corp | スパムフィルタの不明瞭化 |
JP4688805B2 (ja) * | 2003-08-20 | 2011-05-25 | マクロヴィジョン ヨーロッパ リミテッド | コード難読化およびエミュレーションによるプロセッサ制御 |
JP2007503038A (ja) * | 2003-08-20 | 2007-02-15 | マクロヴィジョン ヨーロッパ リミテッド | コード難読化およびエミュレーションによるプロセッサ制御 |
JP2005085188A (ja) * | 2003-09-11 | 2005-03-31 | Fujitsu Ltd | プログラム保護方法、プログラム保護プログラムおよびプログラム保護装置 |
JP4568489B2 (ja) * | 2003-09-11 | 2010-10-27 | 富士通株式会社 | プログラム保護方法、プログラム保護プログラムおよびプログラム保護装置 |
JP2007514193A (ja) * | 2003-12-11 | 2007-05-31 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 各暗号化ラウンドのコア暗号化関数を隠蔽するために置換を用いたブロック暗号化システム |
JP2012037904A (ja) * | 2003-12-11 | 2012-02-23 | Irdeto Corporate Bv | 各暗号化ラウンドのコア暗号化関数を隠蔽するために置換を用いたブロック暗号化システム |
US8023651B2 (en) | 2003-12-11 | 2011-09-20 | Irdeto B.V. | Block ciphering system, using permutations to hide the core ciphering function of each encryption round |
JP4884976B2 (ja) * | 2003-12-11 | 2012-02-29 | イルデト・コーポレート・ビー・ヴイ | 各暗号化ラウンドのコア暗号化関数を隠蔽するために置換を用いたブロック暗号化システム |
US7865961B2 (en) | 2004-02-23 | 2011-01-04 | Fujitsu Limited | Computer system, central unit, and program execution method |
JP2005235076A (ja) * | 2004-02-23 | 2005-09-02 | Fujitsu Ltd | コンピュータシステム、中央装置及びプログラム実行方法 |
JP4514473B2 (ja) * | 2004-02-23 | 2010-07-28 | 富士通株式会社 | コンピュータシステム、中央装置及びプログラム実行方法 |
US8307354B2 (en) | 2004-06-28 | 2012-11-06 | Panasonic Corporation | Program creation device, program test device, program execution device, information processing system |
JP4783289B2 (ja) * | 2004-06-28 | 2011-09-28 | パナソニック株式会社 | プログラム生成装置、プログラムテスト装置、プログラム実行装置、及び情報処理システム |
CN100465982C (zh) * | 2004-07-16 | 2009-03-04 | 松下电器产业株式会社 | 应用执行装置及应用执行装置的应用执行方法 |
WO2006009081A1 (ja) * | 2004-07-16 | 2006-01-26 | Matsushita Electric Industrial Co., Ltd. | アプリケーション実行装置及びアプリケーション実行装置のアプリケーション実行方法 |
JP2008518262A (ja) * | 2004-10-28 | 2008-05-29 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 暗号化関数を難読化するための方法及びシステム |
JP2008523480A (ja) * | 2004-12-06 | 2008-07-03 | ギーゼッケ ウント デフリエント ゲーエムベーハー | ロードフォーマットのプログラムコードの生成および実行可能プログラムコードの提供 |
WO2006085595A1 (ja) * | 2005-02-10 | 2006-08-17 | Matsushita Electric Industrial Co., Ltd. | プログラム変換装置及びプログラム実行装置 |
JP4828517B2 (ja) * | 2005-02-10 | 2011-11-30 | パナソニック株式会社 | プログラム変換装置及びプログラム実行装置 |
US8135963B2 (en) | 2005-02-10 | 2012-03-13 | Panasonic Corporation | Program conversion device and program execution device |
JP2006235688A (ja) * | 2005-02-22 | 2006-09-07 | Kddi Corp | プログラム難読化装置およびその方法ならびにプログラム |
JP4675642B2 (ja) * | 2005-02-22 | 2011-04-27 | Kddi株式会社 | プログラム難読化装置およびその方法ならびにプログラム |
WO2006115217A1 (ja) * | 2005-04-21 | 2006-11-02 | Matsushita Electric Industrial Co., Ltd. | プログラム変換装置及び秘密保持プログラム |
JP2007086845A (ja) * | 2005-09-20 | 2007-04-05 | Kddi Corp | クライアントサーバシステムおよび同システムにおけるサーバサイドプログラムの実現方法ならびにそのサーバ装置、サーバサイドプログラム |
JP2009514060A (ja) * | 2005-10-28 | 2009-04-02 | パナソニック株式会社 | 難読化評価方法および難読化方法 |
US8108689B2 (en) | 2005-10-28 | 2012-01-31 | Panasonic Corporation | Obfuscation evaluation method and obfuscation method |
JP4970279B2 (ja) * | 2005-10-31 | 2012-07-04 | パナソニック株式会社 | セキュア処理装置、セキュア処理方法、難読化秘密情報埋め込み方法、プログラム、記憶媒体および集積回路 |
KR100841282B1 (ko) | 2005-11-24 | 2008-06-25 | 후지제롯쿠스 가부시끼가이샤 | 보호된 실행 프로그램의 작성을 위한 기록 매체, 방법 및장치 |
JP2009543498A (ja) * | 2006-07-12 | 2009-12-03 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | デジタルデータ処理装置の耐改竄性 |
JP2008090668A (ja) * | 2006-10-03 | 2008-04-17 | Kddi Corp | プログラム難読化方法およびプログラム |
JP2008102576A (ja) * | 2006-10-17 | 2008-05-01 | Kddi Corp | プログラム解析方法およびプログラム |
JP2010515945A (ja) * | 2007-01-11 | 2010-05-13 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 実装のコピーの追跡 |
JP2010517119A (ja) * | 2007-01-18 | 2010-05-20 | パナソニック株式会社 | 難読化支援装置 |
US9589115B2 (en) | 2007-01-18 | 2017-03-07 | Panasonic Intellectual Property Management Co., Ltd. | Obfuscation assisting apparatus |
JP2008269398A (ja) * | 2007-04-23 | 2008-11-06 | Fuji Xerox Co Ltd | プログラム難読化装置及びプログラム |
JP2010191847A (ja) * | 2009-02-20 | 2010-09-02 | Fuji Xerox Co Ltd | プログラム難読化プログラム及びプログラム難読化装置 |
JP2012526310A (ja) * | 2009-05-06 | 2012-10-25 | イルデト カナダ コーポレーション | ホワイトボックス暗号化技術を用いるインターロックされたバイナリ保護 |
US9141787B2 (en) | 2009-05-06 | 2015-09-22 | Irdeto B.V. | Interlocked binary protection using whitebox cryptography |
JP2011150560A (ja) * | 2010-01-22 | 2011-08-04 | Kddi Corp | ソフトウェア保護システム、ソフトウェア保護方法、ソフトウェア変換方法およびプログラム |
JP2011209801A (ja) * | 2010-03-29 | 2011-10-20 | Kddi Corp | ソフトウェアの難読化装置、ソフトウェアの難読化方法およびプログラム |
JP2012133736A (ja) * | 2010-12-24 | 2012-07-12 | Kddi Corp | ソフトウェアの難読化装置、ソフトウェアの難読化方法およびプログラム |
JP2012221510A (ja) * | 2011-04-13 | 2012-11-12 | Safenet Inc | 保護するためのルーチンの自動選択 |
JP2013186647A (ja) * | 2012-03-07 | 2013-09-19 | Yokohama National Univ | 難読化装置、難読化方法、及び難読化プログラム、並びに難読化されたソースコード |
Also Published As
Publication number | Publication date |
---|---|
JP4739465B2 (ja) | 2011-08-03 |
CA2293650C (en) | 2012-09-25 |
AU7957998A (en) | 1999-01-25 |
EP0988591A1 (en) | 2000-03-29 |
US6668325B1 (en) | 2003-12-23 |
CN1260055A (zh) | 2000-07-12 |
WO1999001815A1 (en) | 1999-01-14 |
CA2293650A1 (en) | 1999-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4739465B2 (ja) | ソフトウェアセキュリティを増強するための混乱化技術 | |
Collberg et al. | A taxonomy of obfuscating transformations | |
Collberg et al. | Sandmark-a tool for software protection research | |
EP1410150B1 (en) | Protecting software applications against software piracy | |
Low | Java control flow obfuscation | |
Collberg et al. | Manufacturing cheap, resilient, and stealthy opaque constructs | |
Udupa et al. | Deobfuscation: Reverse engineering obfuscated code | |
US9064099B2 (en) | Software self-defense systems and methods | |
US20160364707A1 (en) | Potentate: A Cryptography-Obfuscating, Self-Policing, Pervasive Distribution System For Digital Content | |
US8589897B2 (en) | System and method for branch extraction obfuscation | |
Drape | Intellectual property protection using obfuscation | |
Drape | Obfuscation of Abstract Data− Types | |
Batchelder et al. | Obfuscating Java: The most pain for the least gain | |
Cimato et al. | Overcoming the obfuscation of Java programs by identifier renaming | |
Dalla Preda | Code obfuscation and malware detection by abstract interpretation | |
Gampe et al. | Safe, multiphase bounds check elimination in Java | |
Capiluppi et al. | Code defactoring: Evaluating the effectiveness of java obfuscations | |
Novac et al. | LLWM & IR-mark: Integrating software watermarks into an LLVM-based framework | |
Low | A Taxonomy of Cbfuscating Transformations | |
Petráček | LLVM obfuskátor | |
Gautam et al. | Intensification of Software Security using Secure Obfuscation with Injecting and Detecting Code Clones | |
Patki | Dasho java obfuscator | |
Udupa et al. | Reverse Engineering Obfuscated Code | |
Das | Code Obfuscation Using Code Splitting with Self-Modifying Code | |
Hamilton | An Empirical Evaluation of Java Decompilation and Intellectual Property Protection via Software Watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20050609 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20050609 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20090120 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20090417 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20090601 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20090721 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20100112 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20100408 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20101005 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20110105 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20110214 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110221 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20110329 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20110428 |
|
R150 | Certificate of patent or registration of utility model |
Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20140513 Year of fee payment: 3 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
EXPY | Cancellation because of completion of term |