Title :
Software protection: security´s last stand?
Author :
Stytz, Martin R. ; Whittaker, James A.
Author_Institution :
Air Force Res. Lab., Wright-Patterson AFB, OH, USA
Abstract :
Given that application software protection is necessary, what form and function should it take? There are three principal forms of protection: watermarking, obfuscation, and application performance degradation. These techniques perform three main functions: detection of attempts to pirate, misuse, or tamper with software, protection of software against those attempts, and alteration of the software to ensure that its functionality degrades in an undetectable manner if protection fails. These defenses are required on hardware ranging from single processors to small computer clusters to traditional supercomputers to wide-area distributed computing.
Keywords :
computer crime; copy protection; security of data; application performance degradation; application software protection; obfuscation; software protection research challenges; watermarking; Application software; Computer networks; Data security; Degradation; Design methodology; Distributed computing; Hardware; Software performance; Software protection; Watermarking;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSECP.2003.1177004