IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2023-11-16
14:55
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3)
Kazuomi Oishi (SIST) ICSS2023-55
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] ICSS2023-55
pp.30-34
ISEC, COMP 2017-12-21
16:40
Kochi Eikokuji Campus, Kochi University of Technology Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response
Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] ISEC2017-82 COMP2017-36
pp.67-74
ISEC, WBS, IT 2017-03-10
11:20
Tokyo TOKAI University Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification
Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU) IT2016-120 ISEC2016-110 WBS2016-96
In order to detect unauthorized modification, tamper-resistant software often adopts self integrity verification mechani... [more] IT2016-120 ISEC2016-110 WBS2016-96
pp.137-144
ICSS 2015-03-04
15:55
Okinawa Meio Univiersity An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation
Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more]
ICSS2014-99
pp.217-222
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
16:35
Akita Akita University A Tamper Resistant Software Construction Method Based on Self Integrity Verification and Self-Modifying
Kazuomi Oishi, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2009-39 SITE2009-31 ICSS2009-53
A method of constructing tamper resistant software resistant to
malicious modification is proposed.
It uses a primit... [more]
ISEC2009-39 SITE2009-31 ICSS2009-53
pp.221-228
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan