DocumentCode :
1138647
Title :
Software protection: security´s last stand?
Author :
Stytz, Martin R. ; Whittaker, James A.
Author_Institution :
Air Force Res. Lab., Wright-Patterson AFB, OH, USA
Volume :
1
Issue :
1
fYear :
2003
Firstpage :
95
Lastpage :
98
Abstract :
Given that application software protection is necessary, what form and function should it take? There are three principal forms of protection: watermarking, obfuscation, and application performance degradation. These techniques perform three main functions: detection of attempts to pirate, misuse, or tamper with software, protection of software against those attempts, and alteration of the software to ensure that its functionality degrades in an undetectable manner if protection fails. These defenses are required on hardware ranging from single processors to small computer clusters to traditional supercomputers to wide-area distributed computing.
Keywords :
computer crime; copy protection; security of data; application performance degradation; application software protection; obfuscation; software protection research challenges; watermarking; Application software; Computer networks; Data security; Degradation; Design methodology; Distributed computing; Hardware; Software performance; Software protection; Watermarking;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSECP.2003.1177004
Filename :
1177004
Link To Document :
بازگشت