Software protection system : binary control flow obfuscation for portable executables
With the advancement of reverse engineering technology, the rise in software piracy and program hacking is becoming a worrying factor for software developers. Software developers are always on the lookout for cost-effective measures to protect their software. Even though there are no definite gua...
Main Author: | Chew, Ron Jun Hong. |
---|---|
Other Authors: | Sabu Emmanuel |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/48503 |
Similar Items
-
Software code protection through software obfuscation
by: Liang, Shan
Published: (2010) -
Software protection system - II
by: Hong, Dexter Xian Jun.
Published: (2012) -
Obfuscation techniques for Java source code
by: Nguyen, Dinh Phuc
Published: (2015) -
Steganography for font-dependant binary documents
by: Zeng, Jiancheng
Published: (2008) -
Software protection through obfuscation
by: Balachandran, Vivek
Published: (2015)