• DocumentCode
    1460403
  • Title

    Guest Editors´ Introduction: Software Protection

  • Author

    Falcarin, P. ; Collberg, Christian ; Atallah, M. ; Jakubowski, M.

  • Author_Institution
    Software Eng., Univ. of East London, London, UK
  • Volume
    28
  • Issue
    2
  • fYear
    2011
  • Firstpage
    24
  • Lastpage
    27
  • Abstract
    A computer system´s security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user´s private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside-we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system- from system administrators down to ordinary users-to compromise that system´s security, we find ourselves in a scenario that has received comparatively little attention. Methods for protecting against MATE attacks are variously known as anti-tamper techniques, digital asset protection, or, more commonly, software protection.
  • Keywords
    computer network security; industrial property; MATE attack; antitamper technique; computer system security; computer under attack; denial-of-service attack; digital asset protection; eavesdropper; financial reward; man-in-the-middle attack; software protection; system administrator; untrusted entity; user private data; Computer security; Cryptography; Software protection; Special issues and sections; Watermarking; software protectionsecurityprivacy;
  • fLanguage
    English
  • Journal_Title
    Software, IEEE
  • Publisher
    ieee
  • ISSN
    0740-7459
  • Type

    jour

  • DOI
    10.1109/MS.2011.34
  • Filename
    5720710