Map
Index
Random
Help
th

QuoteRef: chenY10_2002

topics > all references > ThesaHelp: references c-d



Topic:
hash table and hash functions
Topic:
software maintenance by patching
Topic:
monitored variable

Reference

Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.H., "Oblivious hashing: A stealthy software integrity verification strategy", in Petitcolas, F.A.P. (ed.), Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 2002, Springer, LNCS 2578, pp. 400-414. Google

Quotations
abstract ;;Quote: oblivious hashing is a hash function over assignments and control flows; verify software protection by hashing security-sensitive code paths
abstract+;;Quote: use C's comma operator to syntactically add code to assignments while preserving C semantics


Related Topics up

Topic: hash table and hash functions (41 items)
Topic: software maintenance by patching (27 items)
Topic: monitored variable (28 items)

Collected barberCB 10/04
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.