Exploiting self-modification mechanism for program protection Y Kanzaki, A Monden, M Nakamura, K Matsumoto Proceedings 27th Annual International Computer Software and Applications …, 2003 | 115 | 2003 |
Queue-based cost evaluation of mental simulation process in program comprehension M Nakamura, A Monden, T Itoh, K Matsumoto, Y Kanzaki, H Satoh Proceedings. 5th International Workshop on Enterprise Networking and …, 2004 | 41 | 2004 |
Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model Y Kanzaki, A Monden, C Collberg 1st International Workshop on Software Protection (SPRO 2015), 31-37, 2015 | 26 | 2015 |
A software protection method based on instruction camouflage Y Kanzaki, A Monden, M Nakamura, KI Matsumoto Electronics and Communications in Japan (Part III: Fundamental Electronic …, 2006 | 25 | 2006 |
Software obfuscation from crackers' viewpoint. H Yamauchi, Y Kanzaki, A Monden, M Nakamura, K Matsumoto ACST, 286-291, 2006 | 19 | 2006 |
A goal-oriented approach to software obfuscation A Monden, M Nakamura, H Tamada IJCSNS 8 (9), 59, 2008 | 15 | 2008 |
On preventing symbolic execution attacks by low cost obfuscation T Seto, A Monden, Z Yücel, Y Kanzaki 2019 20th IEEE/ACIS International Conference on Software Engineering …, 2019 | 8 | 2019 |
A software protection method based on time-sensitive code and self-modification mechanism Y Kanzaki, A Monden Proceedings of the IASTED International Conference, 2010 | 6 | 2010 |
Protecting secret information in software processes and products Y Kanzaki Nara Institute of Science and Technology, 2006 | 6 | 2006 |
Pinpointing and hiding surprising fragments in an obfuscated program Y Kanzaki, C Thomborson, A Monden, C Collberg Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-9, 2015 | 5 | 2015 |
Characterizing dynamics of information leakage in security-sensitive software process Y Kanzaki, H Igaki, M Nakamura, A Monden, K Matsumoto Conferences in Research and Practice in Information Technology Series 108 …, 2005 | 3 | 2005 |
Java クラスファイルからプログラム指紋を抽出する方法の提案 玉田春昭, 神崎雄一郎, 中村匡秀, 門田暁人, 松本健一 情報処理学会研究報告コンピュータセキュリティ (CSEC) 2003 (74 (2003-CSEC-022)), 127-133, 2003 | 3 | 2003 |
Evaluation of Software Obfuscation Based on the Randomness of Instructions. A Futamura, A Monden, H Tamada, Y Kanzaki, M Nakamura, ... Computer Software 30 (3), 18-24, 2013 | 2 | 2013 |
Reliability Evaluation Framework for Obfuscating Transformations in Program Code. T Kitaoka, Y Kanzaki, T Ishio, K Shimari, K Matsumoto コンピュータ ソフトウェア 40 (4), 4_37-4_46, 2023 | 1 | 2023 |
Quantitative analysis of information leakage in security-sensitive software processes Y Kanzaki, H Igaki, M Nakamura, A Monden, K Matsumoto Information and Media Technologies 1 (1), 121-133, 2006 | 1 | 2006 |
Initial Investigation of Behavioral Changes of Obfuscated Programs Caused by Code Optimization T Kitaoka, Y Kanzaki, T Ishio, K Shimari, K Matsumoto 2024 IEEE 35th International Symposium on Software Reliability Engineering …, 2024 | | 2024 |
動的バースマークの自動抽出に向けて~ 比較ソフトウェアの入力からの実行系列の自動抽出~ C Alejandro, H Tamada, Y Kanzaki | | 2023 |
Software Reuse Detection Focusing on Text in Binary Code S Watanabe, A Monden, H Tamada, Y Kanzaki IEICE Technical Report; IEICE Tech. Rep. 116 (277), 79-84, 2016 | | 2016 |
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program C Collberg, Y Kanzaki, A Monden, C Thomborson Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015 | | 2015 |
Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model C Collberg, Y Kanzaki, A Monden 2015 IEEE/ACM 1st International Workshop on Software Protection, 2015 | | 2015 |