Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Secure and Efficient Code Encryption Scheme Based on Indexed Table

Full metadata record
DC Field Value Language
dc.contributor.authorSungkyu Cho-
dc.contributor.authorDonghwi Shin-
dc.contributor.authorHeasuk Jo-
dc.contributor.authorDonghyun Choi-
dc.contributor.authorDongho Won-
dc.contributor.author김승주-
dc.date.accessioned2021-09-07T17:01:25Z-
dc.date.available2021-09-07T17:01:25Z-
dc.date.created2021-06-18-
dc.date.issued2011-
dc.identifier.issn1225-6463-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/113500-
dc.description.abstractSoftware is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important part of the code encryption scheme. However, previous schemes had problems with key management. In an effort to solve these problems in this paper, we survey the previous code encryption schemes and then propose a new code encryption scheme based on an indexed table. Our scheme provides secure and efficient key management for code encryption.-
dc.languageEnglish-
dc.language.isoen-
dc.titleSecure and Efficient Code Encryption Scheme Based on Indexed Table-
dc.title.alternativeSecure and Efficient Code Encryption Scheme Based on Indexed Table-
dc.typeArticle-
dc.contributor.affiliatedAuthor김승주-
dc.identifier.bibliographicCitationETRI Journal, v.33, no.1, pp.60 - 70-
dc.relation.isPartOfETRI Journal-
dc.citation.titleETRI Journal-
dc.citation.volume33-
dc.citation.number1-
dc.citation.startPage60-
dc.citation.endPage70-
dc.type.rimsART-
dc.identifier.kciidART001523478-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorCode encryption-
dc.subject.keywordAuthorreverse engineering-
dc.subject.keywordAuthorsoftware protection-
dc.subject.keywordAuthortamper resistance.-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Seung joo photo

Kim, Seung joo
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE