Access the full text.
Sign up today, get DeepDyve free for 14 days.
J. Eloff, M. Eloff (2003)
Information security management: a new paradigm
Edward Dekker, J. Newcomer (1999)
Developing Windows NT Device Drivers: A Programmer's Handbook
D. Venugopal, Guoning Hu (2008)
Efficient signature based malware detection on mobile devicesMob. Inf. Syst., 4
J. Daemen, V. Rijmen (2002)
The Design of Rijndael: AES - The Advanced Encryption Standard
Art Baker, J. Lozano (2000)
Windows® 2000 device driver book: a guide for programmers, second edition, the
James Cseri (2003)
Windows XP Embedded Step by Step
L. Barolli, Hui-Huang Hsu, Y. Shibata (2008)
Mobile systems and applicationsMob. Inf. Syst., 4
L. Barnard, R. Solms (2000)
A Formalized Approach to the Effective Selection and Evaluation of Information Security ControlComput. Secur., 19
E. Bott, Carl Siechert (2001)
Microsoft Windows XP Inside out
Maytham Safar, Hussain Sawwan, Mahmoud Taha, Talal Al-Fadhli (2008)
Virtual social networks online and mobile systems2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)
Thomas Peltier (2001)
Information Security Risk Analysis
(2002)
Complete Guide to Microsoft Windows XP
K. Otwell, B. Aldridge (1989)
The role of vulnerability in risk management[1989 Proceedings] Fifth Annual Computer Security Applications Conference
A. Durresi, M. Denko (2009)
Advances in mobile communications and computingMob. Inf. Syst., 5
Rajeev Nagar (1997)
Windows NT file system internals - a developer's guide: building NT file system drivers
Art Baker (1996)
The Windows NT Device Driver Book: A Guide for Programmers
The commensurate number of the attacks and infringement targeting a vulnerability of the game service has been increasing constantly, due to the dramatic growth and expansion of the impact of the game industry. However, there exist no subsequent researches for the differentiated technology, which is to prevent the reverse function of the game service. Therefore, in this study, we examined the current status of infringement toward online game services which are provided in the market currently and designed the proper technical measures ('Software Tamper Resistance') for a manipulation of the game service which is the most vulnerable part. In detail, we have encrypted an execution file and decrypted it in real time process. After that we implemented antibebugging, disassemble, and antidump technology.
Mobile Information Systems – IOS Press
Published: Jan 1, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.