10,905 research outputs found

    Revisiting software protection

    Get PDF
    We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography. We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions

    A Survey on Software Protection Techniques against Various Attacks

    Get PDF
    Software security and protection plays an important role in software engineering. Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks. Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from threats. There are various threats such as piracy, reverse engineering, tampering etc., exploits critical and poorly protected software. Thus, thorough threat analysis and new software protection schemes, needed to protect software from analysis and tampering attacks becomes very necessary. Various techniques are available in the literature for software protection from various attacks. This paper analyses the various techniques available in the literature for software protection. The functionalities and the characteristic features are various software protection techniques have been analyzed in this paper. The main goal of this paper is to analyze the existing software protection techniques and develop an efficient approach which would overcome the drawbacks of the existing techniques

    Report of the inquiry into overcoming the barriers to literacy

    Get PDF

    EDUCATIONAL BUSINESS IN INDONESIA: ITS SCIENTIFIC QUALITY AND PROFESSIONAL BUSINESS CHALLENGE

    Get PDF
    This study discovers concept and principles to become new theories regarding educational business, study business theories with regard to educational business format, business planning, strategic management, marketing management, financial management and educational business ethics. Some educational business success in Indonesia has executed well by formal and informal organization in university level, study group and courses. This is implicative scientific development and educational business new theories. Practically the theories would directive for educational business entrepreneur to have such new business, increasing professional capability in order managing such organization to improve business survival lucratively. Academically, the existence of educational business has creating new scientific chapter. Professional community of educational business is merely a new entity, educational business quality should be responsible academic and professionally. The educational faculty and university developing science should not only create educators but educational business entrepreneur, economy, management master who would have more lucrative future business prospects.Education, scientific business, professional business, quality, business ethics.

    Privacy, security, and trust issues in smart environments

    Get PDF
    Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning

    Solving the software protection problem with intrinsic personal physical unclonable functions.

    Full text link

    Innovative Technologies for Human Exploration: Opportunities for Partnerships and Leveraging Novel Technologies External to NASA

    Get PDF
    Human spaceflight organizations have ambitious goals for expanding human presence throughout the solar system. To meet these goals, spaceflight organizations have to overcome complex technical challenges for human missions to Mars, Near Earth Asteroids, and other distant celestial bodies. Resolving these challenges requires considerable resources and technological innovations, such as advancements in human health and countermeasures for space environments; self-sustaining habitats; advanced power and propulsion systems; and information technologies. Today, government space agencies seek cooperative endeavors to reduce cost burdens, improve human exploration capabilities, and foster knowledge sharing among human spaceflight organizations. This paper looks at potential opportunities for partnerships and spin-ins from economic sectors outside the space industry. It highlights innovative technologies and breakthrough concepts that could have significant impacts on space exploration and identifies organizations throughout the broader economy that specialize in these technologies
    • …
    corecore