Abstract | ||
---|---|---|
In order to defense software reverse attacks, lots of researches have been done in software security area, whereas few works were focused on the effectiveness evaluation of those protection methods. This paper includes two contents: (1) Introduction and analysis of existing methods evaluating the effectiveness of software protection; (2) discuss the condition needed to evaluate effectiveness in theory. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1109/CIS.2016.151 | PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS) |
Keywords | Field | DocType |
reverse attack, software protection, effectiveness evaluation | Software peer review,Computer science,Software security assurance,Computer security,Risk analysis (engineering),Artificial intelligence,Software development,Software Engineering Process Group,Personal software process,Software construction,Software verification and validation,Machine learning,Social software engineering | Conference |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Huaijun Wang | 1 | 20 | 13.02 |
Dingyi Fang | 2 | 252 | 52.62 |
Junhuai Li | 3 | 39 | 16.44 |
Yong Chang | 4 | 0 | 0.34 |
Lei Yu | 5 | 0 | 0.34 |