This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Preventing Piracy, Reverse Engineering, and Tampering
July 2003 (vol. 36 no. 7)
pp. 64-71
Gleb Naumovich, Polytechnic University
Nasir Memon, Polytechnic University

As computing becomes pervasive, concerns about data protection have taken on new urgency. What makes securing digital data so difficult is that it is rarely static?rather, data is manipulated by software, often in a net-worked environment.

Software is increasingly being distributed as mobile code in architecture-independent formats. Using reverse engineering, malicious parties can steal the intellectual property associated with such code with relative ease. Three promising techniques under development--tamper proofing, obfuscation, and watermarking--offer hope for providing more efficient and effective mechanisms for protecting software.

Citation:
Gleb Naumovich, Nasir Memon, "Preventing Piracy, Reverse Engineering, and Tampering," Computer, vol. 36, no. 7, pp. 64-71, July 2003, doi:10.1109/MC.2003.1212692
Usage of this product signifies your acceptance of the Terms of Use.