DocumentCode
1460403
Title
Guest Editors´ Introduction: Software Protection
Author
Falcarin, P. ; Collberg, Christian ; Atallah, M. ; Jakubowski, M.
Author_Institution
Software Eng., Univ. of East London, London, UK
Volume
28
Issue
2
fYear
2011
Firstpage
24
Lastpage
27
Abstract
A computer system´s security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user´s private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside-we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system- from system administrators down to ordinary users-to compromise that system´s security, we find ourselves in a scenario that has received comparatively little attention. Methods for protecting against MATE attacks are variously known as anti-tamper techniques, digital asset protection, or, more commonly, software protection.
Keywords
computer network security; industrial property; MATE attack; antitamper technique; computer system security; computer under attack; denial-of-service attack; digital asset protection; eavesdropper; financial reward; man-in-the-middle attack; software protection; system administrator; untrusted entity; user private data; Computer security; Cryptography; Software protection; Special issues and sections; Watermarking; software protectionsecurityprivacy;
fLanguage
English
Journal_Title
Software, IEEE
Publisher
ieee
ISSN
0740-7459
Type
jour
DOI
10.1109/MS.2011.34
Filename
5720710
Link To Document