Presentation 2015-07-23
A prototype method to identify the applied protection method
Hayato Sagisaka, Haruaki Tamada,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recently, there are serious problems for illegal analyzing programs, and pirating software. The many software protection techniques were proposed to prevent such cracking incidents. However, evaluation methods and tolerance against some attacks of the techniques were not discussed. There is the important research area to attack the protection techniques. Because, a novel attack method improves the previously proposed protection techniques by tolerating the attack method. The paper tackles to identify the protection techniques from the protected pro- gram. Identifying the protection technique becomes the first step of the program analysis. Therefore, we extract characteristics of the protection technique focused on n-gram of opcodes.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Identifying protection method / artificiality / stealthiness
Paper # SS2015-21,KBSE2015-14
Date of Issue 2015-07-15 (SS, KBSE)

Conference Information
Committee KBSE / SS / IPSJ-SE
Conference Date 2015/7/22(3days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair Tadashi Iijima(Keio Univ.) / Shoji Yuen(Nagoya Univ.)
Vice Chair Shigeo Kaneda(Doshisha Univ.) / Kazuhiro Ogata(JAIST)
Secretary Shigeo Kaneda(Nihon Univ.) / Kazuhiro Ogata(Osaka Univ.) / (Tokyo Inst. of Tech.)
Assistant Shinpei Ogata(Shinshu Univ.) / Hiroaki Hashiura(Nippon Inst. of Tech.) / Yoshiki Higo(Osaka Univ.)

Paper Information
Registration To Technical Committee on Knowledge-Based Software Engineering / Technical Committee on Software Science / Special Interest Group on Software Engineering
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A prototype method to identify the applied protection method
Sub Title (in English) with the artificiality of the products
Keyword(1) Identifying protection method
Keyword(2) artificiality
Keyword(3) stealthiness
1st Author's Name Hayato Sagisaka
1st Author's Affiliation Kyoto Sangyo University(KSU)
2nd Author's Name Haruaki Tamada
2nd Author's Affiliation Kyoto Sangyo University(KSU)
Date 2015-07-23
Paper # SS2015-21,KBSE2015-14
Volume (vol) vol.115
Number (no) SS-153,KBSE-154
Page pp.pp.63-68(SS), pp.63-68(KBSE),
#Pages 6
Date of Issue 2015-07-15 (SS, KBSE)