@incollection{, 23090E68C7BC3B629F556E3A5147D62A , author={{N.Sasirekha} and {Dr.M.Hemalatha} and {Vidyasagar College of Arts and Science}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1215358 } @incollection{b0, , title={{Watermarking, tamper-proofing, and obfuscation -tools for software protection}} , author={{ CSCollberg } and { CThomborson }} , journal={{IEEE Transactions on Software Engineering}} 8 , year={2002} } @book{b1, , title={{Software Tamper Resistance Based on the Difficulty of Interprocedural Analysis}} , author={{ TOgiso } and { USakabe } and { MSoshi } and { AMiyaji }} , year={August 2002} , address={Korea} , note={3rd Workshop on Information Security Applications (WISA 2002} } @incollection{b2, , title={{A Multi-factor Approach to Securing Software on Client Computing Platforms}} , author={{ RSrinivasan } and { PDasgupta } and { VIyer } and { AKanitkar } and { SSanjeev } and { JLodhia }} , booktitle={{2010 IEEE Second International Conference on Social Computing (SocialCom)}} Page(s , year={2010} } @book{b3, , author={{ JHongxia Jin; Lotspiech }} , title={{Forensic analysis for}} , year={January 2012} } @incollection{b4, , title={{Presented a code block encryption approach to protect software using a key chain tamper resistant software}} , booktitle={{14th International Symposium on Software Reliability Engineering}} , year={2003. 2003} } @book{b5, , title={{Software protection through dynamic code mutation}} , author={{ MMadou } and { BAnckaert } and { PMoseley } and { SDebray } and { BDeSutter } and { KDe Bosschere }} } @incollection{b6, , title={{Tamper resistant software: an implementation. Information Hiding}} , author={{ DAucsmith }} , booktitle={{Lecture Notes in Computer Science}} 1174 , year={1996} } @incollection{b7, , title={{Protecting software codes by guards}} , author={{ HChang } and { MJAtallah }} , journal={{ACM Workshop on Digital Rights Managment}} 2320 , year={DRM 2001. 2001} , note={LNCS} } @incollection{b8, , title={{Dynamic Self-Checking Techniques for Improved Tamper Resistance}} , author={{ BHorne } and { LRMatheson } and { CSheehan } and { RETarjan }} , booktitle={{Proceedings of Workshop on Security and Privacy in Digital Rights}} Workshop on Security and Privacy in Digital Rights } @incollection{b9, , title={{Oblivious hashing: a stealthy software integrity veri_cation primitive}} , author={{ YChen } and { RVenkatesan } and { MCary } and { RPang } and { SSinha } and { MJakubowski }} , booktitle={{Information Hiding}} , year={2002} } @incollection{b10, , title={{Control flow based obfuscation}} , author={{ JGe } and { SChaudhuri } and { ATyagi }} , booktitle={{DRM '05: Proceedings of the 5th ACM workshop on Digital rights management}} , year={2005} } @incollection{b11, , title={{Enhancing Security Check in Visual Studio C/C++ Compiler}} , author={{ YongdongWu }} , booktitle={{WRI World Congress on WCSE '09}} Page(s , year={2009. 2009} } @incollection{b12, , title={{Toward Tamper Resistant Code Encryption: Practice and Experience}} , author={{ JCappaert }} , journal={{LNCS}} 4991 , year={2008} } @incollection{b13, , title={{Self-Encrypting Code to Protect Against Analysis and Tampering}} , author={{ JCappaert }} , journal={{1st Benelux Workshop Inf. Syst. Security}} , year={2006} } @incollection{b14, , title={{A Code Block Cipher Method to Protect Application Programs From Reverse Engineering}} , author={{ DJung } and { HKim } and { JGPark }} , journal={{J. Korea Inst. Inf. Security Cryptology}} 18 2 , year={2008} , note={in Korean} } @incollection{b15, , title={{Program Fragmentation as a Metamorphic Software Protection}} , author={{ BDBirrer } and { RARaines } and { ROBaldwin } and { BEMullins } and { RWBennington }} , booktitle={{Third International Symposium on Information Assurance and Security}} Page(s , year={2007. 2007. 2007} , note={IAS} } @incollection{b16, , title={{Design of enhanced software protection architecture by using theory of inventive problem solving}} , author={{ Song-KyooKim }} , journal={{IEEE International Conference on Industrial Engineering and Engineering Management}} , year={2009. 2009} } @book{b17, , title={{}} , author={{ Zeng Min }} } @book{b18, , title={{}} , author={{ LiuQiong-Mei }} } @incollection{b19, , title={{Practices of agile manufacturing enterprise data security and software protection}} , author={{ WangCheng }} , booktitle={{2nd International Conference on Industrial Mechatronics and Automation (ICIMA)}} , year={2010} } @book{b20, , title={{Protecting Externally Supplied Software in Small Computers}} , author={{ SKent }} , year={September 1980} , note={Ph.D. thesis, M.I.T.} } @incollection{b21, , title={{Software Protection: Myth or Reality?}} , author={{ JGosler }} , booktitle={{Advances in Cryptology -CRYPTO'85}} , publisher={Springer-Verlag LNCS} , year={1985} 218 } @incollection{b22, , title={{Discouraging Software Piracy Using Software Aging}} , author={{ MJakobsson } and { MKReiter }} LNCS 2320 , booktitle={{Proc. 1st ACM Workshop on Digital Rights Management}} 1st ACM Workshop on Digital Rights Management , publisher={Springer} , year={DRM 2001. 2002} } @incollection{b23, , title={{Public Protection of Software}} , author={{ AHerzberg } and { SSPinter }} , journal={{ACM Trans. Computer Systems}} 5 4 85 , year={Nov. 1987} , note={Earlier version in Crypto} } @incollection{b24, , title={{Operating System Protection Through Program Evolution}} , author={{ FCohen }} , journal={{Computers and Security}} 12 6 } @incollection{b25, , title={{}} , author={{ DAucsmith } and { GGraunke }} , journal={{Tamper Resistant Methods and Apparatus, U.S. Patent}} 5 899 , year={June 13 1996; issued Apr.6 1999} } @incollection{b26, , title={{Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs}} , author={{ CCollberg } and { CThomborson } and { DLow }} , booktitle={{Proc. Symp. Principles of Programming Languages (POPL'98)}} Symp. Principles of Programming Languages (POPL'98) , year={Jan. 1998} } @incollection{b27, , title={{Breaking Abstractions and Unstructuring Data Structures}} , author={{ CCollberg } and { CThomborson } and { DLow }} , booktitle={{IEEE International Conf. Computer Languages (ICCL'98)}} , year={May 1998} } @book{b28, , title={{A Taxonomy of Obfuscating Transformations}} , author={{ CCollberg } and { CThomborson } and { DLow }} 148 , year={July 1997} Dept. Computer Science, University of Auckland , note={Technical Report} } @incollection{b29, , title={{Dynamic Self-Checking Techniques for Improved Tamper Resistance}} , author={{ BHorne } and { LMatheson } and { CSheehan } and { RTarjan }} LNCS 2320 , booktitle={{Proc. 1st ACM Workshop on Digital Rights Management}} 1st ACM Workshop on Digital Rights Management , publisher={Springer} , year={DRM 2001. 2002} } @incollection{b30, , title={{Protecting Software Code by Guards}} , author={{ HChang } and { MAtallah }} , booktitle={{Proc. 1st ACM Workshop on Digital Rights Management}} 1st ACM Workshop on Digital Rights Management , publisher={Springer LNCS 2320} , year={DRM 2001. 2002} } @incollection{b31, , title={{Oblivious Hashing: A Stealthy Software Integrity Verification Primitive}} , author={{ YChen } and { RVenkatesan } and { MCary } and { RPang } and { SSinha } and { MJakubowski }} LNCS 2578 , booktitle={{Proc. 5th Information Hiding Workshop (IHW)}} 5th Information Hiding Workshop (IHW)Netherlands , publisher={Springer} , year={October 2002} } @incollection{b32, , title={{An Open-source Cryptographic Coprocessor}} , author={{ PGutmann }} , booktitle={{Proc. 2000 USENIX Security Symposium}} 2000 USENIX Security Symposium } @book{b33, , title={{Reversing: Secrets of Reverse Engineering}} , author={{ EEilam }} , year={2005} , publisher={Wiley Publishing, Inc} }