Exploiting self-modification mechanism for program protection Y Kanzaki, A Monden, M Nakamura, K Matsumoto Proceedings 27th Annual International Computer Software and Applications …, 2003 | 113 | 2003 |
Queue-based cost evaluation of mental simulation process in program comprehension M Nakamura, A Monden, T Itoh, K Matsumoto, Y Kanzaki, H Satoh Proceedings. 5th International Workshop on Enterprise Networking and …, 2004 | 40 | 2004 |
Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model Y Kanzaki, A Monden, C Collberg 1st International Workshop on Software Protection (SPRO 2015), 31-37, 2015 | 25 | 2015 |
A software protection method based on instruction camouflage Y Kanzaki, A Monden, M Nakamura, KI Matsumoto Electronics and Communications in Japan (Part III: Fundamental Electronic …, 2006 | 24 | 2006 |
Software obfuscation from crackers' viewpoint. H Yamauchi, Y Kanzaki, A Monden, M Nakamura, K Matsumoto ACST, 286-291, 2006 | 18 | 2006 |
A goal-oriented approach to software obfuscation A Monden, M Nakamura, H Tamada IJCSNS 8 (9), 59, 2008 | 15 | 2008 |
On preventing symbolic execution attacks by low cost obfuscation T Seto, A Monden, Z Yücel, Y Kanzaki 2019 20th IEEE/ACIS International Conference on Software Engineering …, 2019 | 6 | 2019 |
Protecting secret information in software processes and products Y Kanzaki Ph. D. dissertation, Nara Institute of Science and Technology, 2006 | 6 | 2006 |
A software protection method based on time-sensitive code and self-modification mechanism Y Kanzaki, A Monden Proceedings of the IASTED International Conference, 2010 | 5 | 2010 |
Pinpointing and hiding surprising fragments in an obfuscated program Y Kanzaki, C Thomborson, A Monden, C Collberg Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-9, 2015 | 4 | 2015 |
Characterizing dynamics of information leakage in security-sensitive software process Y Kanzaki, H Igaki, M Nakamura, A Monden, K Matsumoto Conferences in Research and Practice in Information Technology Series 108 …, 2005 | 3 | 2005 |
Java クラスファイルからプログラム指紋を抽出する方法の提案 玉田春昭, 神崎雄一郎, 中村匡秀, 門田暁人, 松本健一 情報処理学会研究報告コンピュータセキュリティ (CSEC) 2003 (74 (2003-CSEC-022)), 127-133, 2003 | 3 | 2003 |
Evaluation of Software Obfuscation Based on the Randomness of Instructions. A Futamura, A Monden, H Tamada, Y Kanzaki, M Nakamura, ... Computer Software 30 (3), 18-24, 2013 | 2 | 2013 |
Quantitative analysis of information leakage in security-sensitive software processes Y Kanzaki, H Igaki, M Nakamura, A Monden, K Matsumoto Information and Media Technologies 1 (1), 121-133, 2006 | 1 | 2006 |
Reliability Evaluation Framework for Obfuscating Transformations in Program Code. T Kitaoka, Y Kanzaki, T Ishio, K Shimari, K Matsumoto コンピュータ ソフトウェア 40 (4), 4_37-4_46, 2023 | | 2023 |
動的バースマークの自動抽出に向けて~ 比較ソフトウェアの入力からの実行系列の自動抽出~ C Alejandro, H Tamada, Y Kanzaki | | 2023 |
Software Reuse Detection Focusing on Text in Binary Code S Watanabe, A Monden, H Tamada, Y Kanzaki IEICE Technical Report; IEICE Tech. Rep. 116 (277), 79-84, 2016 | | 2016 |
An instruction folding method to prevent reverse engineering in java platform T Ohdo, H Tamada, Y Kanzaki, A Monden 2013 14th ACIS International Conference on Software Engineering, Artificial …, 2013 | | 2013 |
奈良先端科学技術⼤ 学院⼤ 学 学術リポジトリ M Nakamura, A Tanaka, H Igaki, H Tamada, K Matsumoto | | 2006 |
Obfuscating Cipher Programs against Primary Attacking Tasks H Yamauchi, Y Kanzaki, A Monden, M Nakamura, K Matsumoto IEICE Technical Report; IEICE Tech. Rep. 105 (490), 25-30, 2005 | | 2005 |