Title :
Guest Editors´ Introduction: Software Protection
Author :
Falcarin, P. ; Collberg, Christian ; Atallah, M. ; Jakubowski, M.
Author_Institution :
Software Eng., Univ. of East London, London, UK
Abstract :
A computer system´s security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user´s private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside-we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system- from system administrators down to ordinary users-to compromise that system´s security, we find ourselves in a scenario that has received comparatively little attention. Methods for protecting against MATE attacks are variously known as anti-tamper techniques, digital asset protection, or, more commonly, software protection.
Keywords :
computer network security; industrial property; MATE attack; antitamper technique; computer system security; computer under attack; denial-of-service attack; digital asset protection; eavesdropper; financial reward; man-in-the-middle attack; software protection; system administrator; untrusted entity; user private data; Computer security; Cryptography; Software protection; Special issues and sections; Watermarking; software protectionsecurityprivacy;
Journal_Title :
Software, IEEE