Secure computational outsourcing techniques
Secure CPU and memory management unit with cryptographic...
Secure execution of downloaded software
Secure virtual machine monitor to tear down a secure...
Single chip computer having integrated MPEG and graphical...
Software self-defense systems and methods
Software self-defense systems and methods
Source code transformation based on program operators
Source code transformation based on program operators
Storage medium, method, and apparatus for creating a...
Storage partitioning
System and method for cloaking software
System and method for data source authentication and...
System and method for obscuring bit-wise and two's...
System and method for thwarting buffer overflow attacks...
System and method for using address bits to affect encryption
System and methods for encrypted execution of computer programs
System for obfuscating computer code upon disassembly
System for persistently encrypting critical software file to...