Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Protecting distributed programs or content, e.g. vending or licensing of copyrighted material; Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
PERMISSIONS AND NOTIFICATIONS FOR CONSTRUCT-MODIFICATION TAGS
#2SYSTEM AND SOLUTION TO OBFUSCATE AND PREVENT THE PATTERN ANALYSIS OF JAVA ARCHIVES
#3PROTECTED DATA PACKAGES
#4METHOD TO PROTECT PROGRAM IN INTEGRATED CIRCUIT
#5METHODS AND APPARATUS DETERMINING DOCUMENT BEHAVIOR BASED ON THE REVERSING ENGINE
#6SOFTWARE OBFUSCATION METHOD USING AN OPAQUE PREDICATE BASED ON MULTIPLYING MIXED BOOLEAN-ARTHMETIC EXPRESSIONS
#7HOTFIX METHOD, APPARATUS, DEVICE AND STORAGE MEDIUM
#8OBFUSCATION FOR PROTECTION OF STREAMING MEDIA AND OTHER DATA FLOWS
#9Resource allocation using modified instances of corresponding records in memory
#10ROBUST TRAJECTORY PREDICTIONS AGAINST ADVERSARIAL ATTACKS IN AUTONOMOUS MACHINES AND APPLICATIONS
#11CODE FLOW PROTECTION WITH ERROR PROPAGATION
#12Audio and/or Physical Electronic Privacy System
#13OBFUSCATING INFORMATION IN CONTENT PRESENTED ON A DISPLAY
#14Security through layers in an intelligent electronic device
#15PERSONAL INFORMATION PROTECTION DEVICE
#16MULTI-LAYERED FRAMEWORK FOR SECURITY OF INTEGRATED CIRCUITS
#17SECURE AND ZERO KNOWLEDGE DATA SHARING FOR CLOUD APPLICATIONS
#18METHOD TO RANDOMIZE ONLINE ACTIVITY
#19MULTI-TRANSFER RESOURCE ALLOCATION USING MODIFIED INSTANCES OF CORRESPONDING RECORDS IN MEMORY
#20APPLICATION-LEVEL SANDBOXING ON DEVICES
#21PROGRAM PROTECTION APPARATUS, PROGRAM PROTECTION METHOD, AND PROGRAM PROTECTION PROGRAM
#22OBFUSCATION DEVICE, OBFUSCATION METHOD, AND OBFUSCATION PROGRAM
#23OBFUSCATION OF EXECUTABLE INSTRUCTION SETS FOR ENHANCED SECURITY
#24Program execution device
#25METHOD AND DEVICE FOR DETECTING FUZZING ANALYSIS ON AN ELECTRONIC DEVICE
#26Computer-based systems configured for automated computer script analysis and malware detection and methods thereof
#27Cloud based machine learning model attack guard
#28A Method of Training a Submodule and Preventing Capture of an AI Module
#29BACKDOOR INSPECTION DEVICE, BACKDOOR INSPECTION METHOD, AND COMPUTER-READABLEMEDIUM
#30AI governance using tamper proof model metrics
#31OBFUSCATION OF QUANTUM CIRCUITS
#32Systems and methods for unpacking protected data from obfuscated code
#33SYSTEMS AND METHODS FOR PREPARING CODE FOR MALICIOUS BEHAVIOR ANALYSIS
#34Systems And Methods For Whitebox Device Binding
#35Partitioning circuits for execution of sequential secure computation code on multiple processors
#36Obfuscated And Secured Computer-Executable Source Code
#37Computer-based systems configured for automated computer script analysis and malware detection and methods thereof
#38Multi-transfer resource allocation using modified instances of corresponding records in memory
#39ON DEMAND CODE DECRYPTION
#40MULTI-PATH LAYER CONFIGURED TO DE-OBFUSCATE LOGS PRODUCED BY MULTI-PATH INPUT-OUTPUT DRIVERS
#41Multi-transfer resource allocation using modified instances of corresponding records in memory
#42SYSTEM AND METHOD FOR SECURELY TRANSFERRING DATA USING ENCRYPTION KEYS
#43IMAGE FORMING APPARATUS CAPABLE OF EXECUTING APPLICATION PROGRAMS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM
#44Web Browser Extension Script Obfuscation System
#45INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE, AND PROGRAM
#46Hardware-based obfuscation of digital data
#47Protection of neural networks by obfuscation of neural network architecture
#48Secure and zero knowledge data sharing for cloud applications
#49Timed unlocking and locking of hardware intellectual properties
#50Source modification engine
#51OBFUSCATING ENCRYPTED REGISTER TRANSFER LOGIC MODEL OF A CIRCUIT
#52System, devices and/or processes for secure computation
#53Obfuscation for protection of streaming media and other data flows
#54METHOD OF EVALUATING ROBUSTNESS OF ARTIFICIAL NEURAL NETWORK WATERMARKING AGAINST MODEL STEALING ATTACKS
#55Method for Executing Secure Code, Corresponding Devices, System and Programs
#56Securing software routines
#57SYSTEM, METHOD, AND COMPUTER-ACCESSIBLE MEDIUM FOR REGISTER-TRANSFER LEVEL LOCKING AGAINST AN UNTRUSTED FOUNDRY
#58AI governance using tamper proof model metrics
#59Computer-based systems configured for automated computer script analysis and malware detection and methods thereof
#60SYSTEMS AND METHODS TO FACILITATE AUTHORIZATION KEY OBFUSCATION VALIDATION
#61Semiconductor device including a normal mode, a debug mode, and a key
#62PROTECTING AN ITEM OF SOFTWARE
#63PROTECTING AN ITEM OF SOFTWARE
#64Protected processing of operations
#65Cyclically dependent checks for software tamper-proofing
#66Application-level sandboxing on devices
#67AI model and data transforming techniques for cloud edge
#68Tamper resistant obfuscation circuit
#69FRAMEWORK FOR PREVENTING SOFTWARE PIRACY IN VIRTUAL MACHINES (VMS) BY USING VIRTUAL HARDWARE ENCRYPTION VERIFICATION
#70Controlling access to digital assets
#71Vehicle surveillance device and vehicle surveillance method
#72Generation of optimal program variation
#73All-digital camouflage circuit
#74Software tamper resistance
#75Procedural code generation for challenge code
#76Compiler device with masking function
#77Secure automated issue detection
#78Constraint guided hybrid fuzzing test system for application programs
#79Anti cloning for white box protected data
#80SYSTEMS, METHODS, AND STORAGE MEDIA FOR CREATING SECURED TRANSFORMED CODE FROM INPUT CODE USING A NEURAL NETWORK TO OBSCURE A TRANSFORMATION FUNCTION
#81Systems, methods, and storage media for creating secured computer code having entangled transformations
#82Systems and methods for logic circuit replacement with configurable circuits
#83Secure 3D printing
#84Automated source code log generation
#85Method for processing data
#86Securing virtual-machine software applications
#87Secure 3D printing
#88Security handling during application code branching
#89Big data distributed processing and secure data transferring with obfuscation
#90Big data distributed processing and secure data transferring with fault handling
#91Program execution device
#92Hardware intellectual property protection through provably secure state-space obfuscation
#93Method and system for determining affiliation of software to software families
#94METHOD TO SECURE A SOFTWARE CODE PERFORMING ACCESSES TO LOOK-UP TABLES
#95Device for automatically identifying anti-analysis techniques by using signature extraction and method therefor
#96Method to secure a software code
#97Method and system for signing an artificial intelligence watermark using implicit data
#98Method and system for signing an artificial intelligence watermark using a kernel
#99Method and apparatus for data obfuscation
#100Device and Method for GPU-based Watermarking
#101PROVIDING RESTRICTIONS IN COMPUTER-GENERATED REALITY RECORDINGS
#102Securing software routines
#103Device and method for bypassing analysis evasion technique, and recording medium for a program for performing the same
#104Hacker-resistant anti-debug system
#105Reverse engineering data analysis system, and integrated circuit component data processing tool and method thereof
#106Systems and methods for obfuscating web content
#107Mechanism for providing obfuscated code to web application clients
#108Method and apparatus for storing and processing application program information
#109SYSTEM AND METHOD FOR AUTOMATIC SECURE DELIVERY OF MODEL
#110Secure logic locking and configuration with camouflaged programmable micro netlists
#111PROACTIVE SECURITY SYSTEM BASED ON CODE POLYMORPHISM
#112Techniques for securely executing code that operates on encrypted data on a public computer
#113ENABLING AN ENCRYPTED SOFTWARE MODULE IN A CONTAINER FILE
#114System, program, method, and server for performing communication
#115Secure and zero knowledge data sharing for cloud applications
#116Physically unclonable camouflage structure and methods for fabricating same
#117OBFUSCATED SHIFT REGISTERS FOR INTEGRATED CIRCUITS
#118Protecting a software program against tampering
#119Communication device, communication system, and recording medium
#120Systems, methods, and storage media for obfuscating a computer program by representing the control flow of the computer program as data
#121METHOD OF SELECTING SOFTWARE FILES
#122System for Obfuscating Content in Shared Documents
#123FIRMWARE SECURITY
#124Determining information leakage of computer-readable programs
#125Method for concealing data and data obfuscation device using the same
#126Application-level sandboxing on devices
#127Program execution device
#128System and method for automated on-screen sensitive data identification and obfuscation
#129Methods for securely storing sensitive data on mobile device
#130Computer program code obfuscation methods and systems
#131Lightweight dispatcher for program control flow flattening
#132Encoding optimization for obfuscated media
#133Generating a test sequence of code based on a directed sequence of code and randomly selected instructions
#134Dynamic modeling for opaque code during static analysis
#135Method for processing data
#136Proactive security system based on code polymorphism
#137Reflection based endpoint security test framework
#138SECURE CALLING CONVENTION SYSTEM AND METHODS
#139Integrated circuit identification
#140Integrated circuit identification
#141Method for Providing a Security-Critical Software Application on a Computer Unit
#142Preventing software application tampering
#143Protecting obfuscated circuits against attacks that utilize test infrastructures
#144Leak protection of executables with debug information
#145Mutual authentication of software layers
#146System and method for watermarking software
#147Assignment device, assignment method, and assignment program
#148Method for the computer-aided obfuscation of program code
#149Obfuscating programs using matrix tensor products
#150Method for concealing data and data obfuscation device using the same
#151Method for training and testing obfuscation network capable of processing data to be concealed for privacy, and training device and testing device using the same
#152TIERED CODE OBFUSCATION IN A DEVELOPMENT ENVIRONMENT
#153Integrity of on demand code decryption
#154Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content
#155Method to secure a software code
#156Preventing unauthorized access to secured information systems by injecting device data collectors
#157SECURITY METHODS AND SYSTEMS BY CODE MUTATION
#158Debuggable obfuscated script
#159AUTHENTICATED BYPASS OF DEFAULT SECURITY COUNTERMEASURES
#160Security through layers in an intelligent electronic device
#161SECURELY PERFORMING A SENSITIVE OPERATION USING A NON-SECURE TERMINAL
#162Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers
#163Secure execution of enterprise applications on mobile devices
#164Program execution device
#165Protecting the input/output of modular encoded white-box RSA
#166Software algorithm security
#167INTERCEPTING AND INJECTING CALLS INTO OPERATIONS AND OBJECTS
#168Method and apparatus for anti-repackaging
#169ENHANCED SECURITY FOR MULTIPLE NODE COMPUTING PLATFORM
#170Systems and methods for creating individualized processing chips and assemblies
#171Efficient obfuscation of program control flow
#172Debuggable obfuscated script
#173Integrated circuit, control device, information distribution method, and information distribution system
#174Reverse engineering data analysis system, and integrated circuit component data processing tool and method thereof
#175Automated fuzzing based on analysis of application execution flow
#176METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR EXECUTING A LOGIC ON A COMPUTING DEVICE AND PROTECTING THE LOGIC AGAINST REVERSE ENGINEERING
#177Method and apparatus to dynamically encode data at runtime
#178Method and apparatus to secure and protect data-centers and generalized utility-based cloud computing environments from uninvited guests in the form of both hardware and software
#179Apparatus and method for providing security and apparatus and method for executing security to protect code of shared object
#180Apparatus and method of providing security and apparatus and method of executing security for common intermediate language
#181On demand code decryption
#182Software protection through code and control flow data hiding and obfuscation
#183Device and method for GPU-based watermarking
#184Electronic device including a digital circuit for accessing encrypted data in a memory and corresponding method to access encrypted data in a memory
#185Secure application monitoring
#186Software tampering detection and reporting process
#187Methods and systems of disassembling executable code
#188AI model and data transforming techniques for cloud edge
#189Systems and processes for executing private programs on untrusted computers
#190Securing applications on mobile devices
#191Software intellectual property protection systems and methods for embedded platforms
#192Dynamic functional obfuscation
#193Logic encryption for integrated circuit protection
#194Program randomization for cyber-attack resilient control in programmable logic controllers
#195Method and system for enhancing the security of a transaction
#196Secure code optimization method and system
#197Mobile device having trusted execution environment
#198Memory system including data obfuscation
#199Hiding of a program execution
#200Device, system and method for token based outsourcing of computer programs
#201NATIVE CODE AUTHORIZATION VERIFICATION LIBRARY
#202Secure logic locking and configuration with camouflaged programmable micro netlists
#203Integrated circuit identification
#204Integrated circuit identification
#205Method and system for evaluating security of application
#206Systems and method for securely sharing and executing data and models
#207Web application protection
#208Methods for controlling access to digital assets
#209Method for Providing a Security-Critical Software Application on a Computer Unit
#210Methods and related apparatus for managing access to digital assets
#211Program execution device
#212Method for processing data
#213Zero-knowledge databases
#214System, method and computer-accessible medium providing secure integrated circuit camouflaging for minterm protection
#215Software diversification in external contexts
#216METHOD FOR AUTHENTICATING A USER VIA A NON-SECURE TERMINAL
#217METHOD FOR SECURELY TRANSMITTING A SECRET DATA TO A USER OF A TERMINAL
#218METHOD FOR SECURING A TRANSACTION PERFORMED FROM A NON-SECURE TERMINAL
#219Protecting a computer program against reverse engineering
#220Integrated security and data redundancy
#221System and method for code obfuscation of application
#222Reliable selection of security countermeasures
#223Method for securely transmitting a secret data to a user of a terminal
#224Method and system for protecting computerized systems from malicious code by means of mutable instructions
#225SOFTWARE DUPLICATION PREVENTION SYSTEM
#226Method for Protecting Dex File from Decompilation in Android System
#227Binary merging device, method, and computer program
#228System and method for authenticating and enabling functioning of a manufactured electronic device
#229Data protection
#230Methods and systems for binary scrambling
#231Software protection against differential fault analysis
#232Preventing unauthorized access to secured information systems by injecting device data collectors
#233Memory fractionation software protection
#234Using instrumentation code to detect bots or malware
#235Static analysis based on abstract program representations
#236Program execution device
#237Secure and zero knowledge data sharing for cloud applications
#238APPARATUS FOR OBFUSCATING AND RESTORING PROGRAM EXECUTION CODE AND METHOD THEREOF
#239Dynamic security module terminal device and method of operating same
#240Application Code Hiding Apparatus by Modifying Code in Memory and Method of Hiding Application Code Using the Same
#241Secret shared random access machine
#242Method of writing data to a memory device and reading data from the memory device
#243Dynamic security module server device and method of operating same
#244Method and apparatus for generating dynamic security module
#245Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content
#246Method for processing data
#247Physically unclonable camouflage structure and methods for fabricating same
#248Application Code Hiding Apparatus Using Dummy Code And Method Of Hiding Application Code Using The Same
#249Simple obfuscation of text data in binary files
#250CPU obfuscation for cloud applications
#251Tiered code obfuscation in a development environment
#252Method of protecting computer program code
#253Robust device authentication
#254Non-malleable obfuscator for sparse functions
#255Tiered code obfuscation in a development environment
#256Identifying data usage via active data
#257System, apparatus and method for License Key permutation
#258Method, apparatus, system and non-transitory computer readable medium for code protection
#259INCREMENTALLY POLYMORPHING CODE FOR ENHANCED RESISTANCE TO REVERSE ENGINEERING
#260Fast memory initialization
#261Device and method for executing protected iOS software modules
#262Managing heterogeneous product features using a unified license manager
#263Protecting an item of software
#264Protecting threat indicators from third party abuse
#265Mobile Device And Method Of Operating Mobile Device
#266METHOD FOR SECURING AN APPLICATION AND DATA
#267Method and apparatus for preventing application from being deciphered
#268Deterministic identifiers for source code elements
#269Cryptographic program diversification
#270Optimizing and protecting software
#271CPU obfuscation for cloud applications
#272Systems and methods for switching emulation of an executable file
#273Secure entry and exit for software modules protected by controlled encryption key management
#274Method for protecting a computer program from being influenced, and computer system
#275Program execution device
#276ANTI-REVERSE ENGINEERING UNIFIED PROCESS
#277Data processing systems
#278Zero-knowledge databases
#279Device location history anonymization based on stop decision
#280Balanced encoding of intermediate values within a white-box implementation
#281Encoding values by pseudo-random mask
#282Method for processing data
#283Method of obfuscating a code
#284Secure handling of memory caches and cached software module identities for a method to isolate software modules by means of controlled encryption key management
#285Automated and personalized protection system for mobile applications
#286Code Obfuscation Device Using Indistinguishable Identifier Conversion And Method Thereof
#287Diversifying Control Flow of White-Box Implementation
#288System and method for authenticating and enabling functioning of a manufactured electronic device
#289Systems and methods for accessing computational resources in an open environment
#290Apparatus and method for managing gaming engine file in a mobile platform
#291Zero-knowledge databases
#292System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms
#293Sharing and executing sensitive logic semantics
#294Protecting the input/output of modular encoded white-box RSA/ECC
#295White-box elliptic curve point multiplication
#296White-box modular exponentiation
#297Array indexing with modular encoded values
#298Obscuring Software Code With Split Variables
#299Cooperative static and dynamic analysis of web application code for finding security vulnerabilities
#300Program protection device