Computer law and software protection: a bibliography of crime, liability, abuse and security, 1984 through 1992

1994 ◽  
Vol 31 (05) ◽  
pp. 31-2402-31-2402
2020 ◽  
Vol 7 (1) ◽  
pp. 63-71
Author(s):  
Yaroslav E. Prokushev ◽  
◽  
Julia V. Maliy ◽  

2009 ◽  
Vol 29 (3) ◽  
pp. 817-822
Author(s):  
Li-guo ZHOU ◽  
Xiao-bing XIONG ◽  
Jie SUN

2013 ◽  
Vol 33 (9) ◽  
pp. 2525-2528
Author(s):  
Rui WANG ◽  
Qiuxiang YANG ◽  
Gouxi CHEN ◽  
Qiaomei MA

2013 ◽  
Vol 443 ◽  
pp. 556-560
Author(s):  
Gao Ming He

This paper describes a system; CODESSEAL can provide protection and evaluation to system software. CODESSEAL was designed to protect embedded systems with sufficient expertise and resources to capture attack equipment and manipulator, not only to protect software but also to protect hardware. By using the reconfigurable hardware allows CODESSEAL to provide confidentiality, integrity of security services and a platform-independent program flow without having to redesign the processor. System uses software and data protection technology and designs cycle simulation methods for data analysis. Experimental results show that the protected instructions and data with a high level of safety can be realized a low, which in most cases the performance loss can be reduced to below 10%, so the research of software protection methods of the embedded operating system of hardware compiler has important practical significance.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4393
Author(s):  
JongHyup Lee ◽  
Taekyoung Kwon

The Industrial Internet of Things (IIoT) could enhance automation and analytics in industrial environments. Despite the promising benefits of IIoT, securely managing software updates is a challenging problem for those critical applications. This is due to at least the intrinsic lack of software protection mechanisms in legacy industrial systems. In this paper, to address the challenges in building a secure software supply chain for industrial environments, we propose a new approach that leverages distributed watchdogs with blockchain systems in protecting software supply chains. For this purpose, we bind every entity with a unique identity in the blockchain and employ the blockchain as a delegated authenticator by mapping every reporting action to a non-fungible token transfer. Moreover, we present a detailed specification to clearly define the behavior of systems and to apply model checking.


Sign in / Sign up

Export Citation Format

Share Document