The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2011 vol.28)
pp: 24-27
Christian Collberg , University of Arizona
Mikhail Atallah , Purdue University
Paolo Falcarin , University of East London
ABSTRACT
Software protection is increasingly becoming an important requirement for industrial software development, especially when building systems for military defense, national infrastructure, and medical informatics. Every software vendor should be aware of the potential for attacks against its products and the techniques available to mitigate these attacks. Employing software protection techniques can mean the difference between business survival and failure. The guest editors present this special issue on new tools and techniques for software protection.
INDEX TERMS
software protectionsecurityprivacy
CITATION
Christian Collberg, Mikhail Atallah, Paolo Falcarin, "Guest Editors' Introduction: Software Protection", IEEE Software, vol.28, no. 2, pp. 24-27, March/April 2011, doi:10.1109/MS.2011.34
REFERENCES
1. C. Collberg and J Nagra, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, Addison-Wesley, 2009.
2. B. Wyseur, "White-Box Cryptography," PhD thesis, Computer Security and Industrial Cryptography (COSIC), Dept. of Electrical Engineering, Katholieke Universiteit Leuven, 2009.
3. T. Claburn, "Smart Grid Lacks Smart Security," InformationWeek,24 Mar. 2009; www.informationweek.com/news/infrastructure/ managementshowArticle.jhtml?articleID=216200240 .
4. S.E. Siwek, "Video Games in the 21st Century: The 2010 Report," Entertainment Software Assoc., 2010; www.theesa.com/facts/pdfsVideoGames21stCentury_2010.pdf .
5. B. Barak et al., "On the (Im)possibility of Obfuscating Programs," Advances in Cryptology (CRYPTO 01), LNCS 2139, Springer Verlag, 2001, pp. 1–18.
6. F.B. Cohen, "Operating System Protection through Program Evolution," Computer Security, vol. 12, no. 6, 1993, pp. 565–584.
7. C. Wang, "A Security Architecture for Survivability Mechanisms," PhD thesis, Dept. of Computer Science, Univ. Virginia, 2000.
8. P. Falcarin et al., "Exploiting Code Mobility for Dynamic Binary Obfuscation," to be published in Proc. IEEE World Conf. Internet Security (WorldCIS), Feb. 2011.
9. H. Chang and M.J. Atallah, "Protecting Software Code by Guards," ACM Workshop Security and Privacy in Digital Rights Management, ACM Press, 2001, pp. 160–175.
10. M. Jacob, M.H. Jakubowski, and R. Venkatesan, "Towards Integral Binary Execution: Implementing Oblivious Hashing Using Overlapped Instruction Encodings," Proc. 9th ACM Workshop on Multimedia & Security, ACM Press, 2007, pp. 129–140.
11. R. Scandariato et al., "Application-Oriented Trust in Distributed Computing," Proc. IEEE Int'l Conf. Availability, Reliability and Security (ARES), IEEE Press, 2008, pp. 434–439.
12. R. Kennel and L.H. Jamieson, "Establishing the Genuinity of Remote Computer Systems," Proc. 12th Usenix Security Symp., Usenix Assoc., 2003, pp. 295–310.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool