𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A software protection method based on instruction camouflage

✍ Scribed by Yuichiro Kanzaki; Akito Monden; Masahide Nakamura; Ken'Ichi Matsumoto


Book ID
102821078
Publisher
John Wiley and Sons
Year
2005
Tongue
English
Weight
500 KB
Volume
89
Category
Article
ISSN
1042-0967

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


A new design method of software based on
✍ Naoko Yokoi; Takeshi Kaneko; Yoshinori Iizuka πŸ“‚ Article πŸ“… 1994 πŸ› John Wiley and Sons 🌐 English βš– 937 KB

## Abstract An understanding of state transitions is essential in real‐time software design. However, satisfactory research has not been performed on methodologies to list the necessary states. A method is needed to systematically identify necessary states in order to meet the given requirements. T

A method for applying loop unrolling and
✍ Nobuhiro Kondo; Akira Koseki; Hideaki Komatsu; Yoshiaki Fukazawa πŸ“‚ Article πŸ“… 1998 πŸ› John Wiley and Sons 🌐 English βš– 614 KB

A considerable part of program execution time is consumed by loops, so that loop optimization is highly effective especially for the innermost loops of a program. Software pipelining and loop unrolling are known methods for loop optimization. Software pipelining is advantageous in that the code beco