Preventing Piracy, Reverse Engineering, and Tampering

  • Authors:
  • Gleb Naumovich;Nasir Memon

  • Affiliations:
  • -;-

  • Venue:
  • Computer
  • Year:
  • 2003

Quantified Score

Hi-index 4.10

Visualization

Abstract

As computing becomes pervasive, concerns about data protection have taken on new urgency. What makes securing digital data so difficult is that it is rarely static rather, data is manipulated by software, often in a net-worked environment.Software is increasingly being distributed as mobile code in architecture-independent formats. Using reverse engineering, malicious parties can steal the intellectual property associated with such code with relative ease. Three promising techniques under development--tamper proofing, obfuscation, and watermarking--offer hope for providing more efficient and effective mechanisms for protecting software.