Keyword : software security


Improvement and Weakness of Zero-Sum Defender against Return-Oriented Programming Attacks
Donghoon LEE Jaewook JUNG Younsung CHOI Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/12/01
Vol. E99-A  No. 12 ; pp. 2585-2590
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
return-oriented programmingexploit codemalware defensesoftware security
 Summary | Full Text:PDF(828.6KB)

Zero-Sum Defender: Fast and Space-Efficient Defense against Return-Oriented Programming Attacks
Jeehong KIM Inhyeok KIM Changwoo MIN Young Ik EOM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 303-305
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
return-oriented programmingmalware defensesoftware security
 Summary | Full Text:PDF(282.9KB)

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
Hyung Chan KIM Tatsunori ORII Katsunari YOSHIOKA Daisuke INOUE Jungsuk SONG Masashi ETO Junji SHIKATA Tsutomu MATSUMOTO Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/09/01
Vol. E94-D  No. 9 ; pp. 1778-1791
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software securitydynamic binary instrumentationunpackingmalwarebinary analysis
 Summary | Full Text:PDF(951.3KB)

On the Deployment of Dynamic Taint Analysis for Application Communities
Hyung Chan KIM Angelos KEROMYTIS 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/03/01
Vol. E92-D  No. 3 ; pp. 548-551
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
dynamic taint analysis0-day attack detectionapplication communitysoftware security
 Summary | Full Text:PDF(208.9KB)

On Backward-Style Anonymity Verification
Yoshinobu KAWABE Ken MANO Hideki SAKURADA Yasuyuki TSUKADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9 ; pp. 2597-2606
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
formal methodsanonymitysoftware securityverificationtheorem-proving
 Summary | Full Text:PDF(667.2KB)

An Adversary Model for Simulation-Based Anonymity Proof
Yoshinobu KAWABE Hideki SAKURADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/04/01
Vol. E91-A  No. 4 ; pp. 1112-1120
Type of Manuscript:  Special Section PAPER (Special Section on Selected Papers from the 20th Workshop on Circuits and Systems in Karuizawa)
Category: 
Keyword: 
formal methodsanonymitysoftware securityverificationtheorem-proving
 Summary | Full Text:PDF(209.4KB)

Tamper-Resistant Software System Based on a Finite State Machine
Akito MONDEN Antoine MONSIFROT Clark THOMBORSON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 112-122
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
software securitysoftware protectionobfuscationencryption
 Summary | Full Text:PDF(426.8KB)