Papers 2

Date Author Title Presenter

April 2 Aucsmith Tamper Resistant Software: An implementation Tapas

April 4 Nickerson The Encode Solution to Implementing Tamper Resistant Software; Extending Trust into a Hostile Environment; An Introduction to the Mathematics of Hiding Data in Software. TBA

April 4 Jakobsson Discouraging Software Piracy Using Software Aging Ashok Ramasamy

April 9 Proebsting Krakatoa: Decompilation in Java Balamurugan M. Chirtsabesan

April 9 Cifuentes Decompilation of Binary Programs Rathnaprabhu

April 11 Fred Cohen Computer Viruses - Theory and Experiments Martin Stepp

April 11 AVP Computer Virus Classification. Miriam Miklofsky

April 16 Eichin With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. Ginger

April 16 Dark Avenger Various documents on polymorphic viruses, including Mutation Engine Report, Advanced Polymorphism Primer, etc. Danny Mandel

April 23 Aleph One Smashing the Stack for Fun and Profit Kelly Heffner

April 23 Cesare Anti-Debugger Techniques; Linux Anti-Debugger Techniques (Fooling the Debugger). Xiangyu Zhang

April 25 InterTrust Understanding DRM Systems; Golden times for Digital Rights Management? Andrew Huntwork